FoxPointe Security Hub

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

Third Party Risk Management HITRUST puts on regular webinars to help educate individuals on the components, tools, and programs offered by the organization. As a HITRUST CSF Assessor, we make it a point to attend these webinars to stay up-to-date on the latest information. The webinar I listened to on...

Accounting Firm Cybersecurity On the heels of New York passing the Stop Hacks and Improve Electronic Data Security (SHIELD) Act in September 2019, the IRS issued a warning to tax preparers and accounting firms to ensure that they appropriately secure their customer data against the “evolving” and “sophisticated” techniques used...

HITRUST New Release Recently, HITRUST established a new quality assurance (QA) subcommittee of its Board of Directors and introduced several new assurance advisories. These updates impact Certified Common Security Framework Practitioners (CCSFP), individuals who have completed and maintained training and certification through HITRUST; HITRUST Authorized External Assessors, organizations (including CPA...

Cybersecurity Experts & Forensic Accountants Written by Tim Ball, CFE, Principal at The Bonadio Group, and John G. Roman, Jr., CISSP, CIO at The Bonadio Group In the not so distant past, the threat of a person or people stealing money or assets from your business was limited to a...

National Cybersecurity Awareness Month Today marks the beginning of National Cybersecurity Awareness Month. From CEOs to college students, cybersecurity is on everyone’s radar; and cyberattacks aren’t going away anytime soon. For businesses, it’s not a matter of if a breach will occur but when – an incident is inevitable. Therefore,...

Mitigate Cybersecurity Risks in Education Don’t hesitate to develop and implement a cybersecurity response plan this school year. These days, it’s more likely than not that when you open your daily newspaper or scroll through your newsfeed, you’ll see coverage of a cyberattack impacting both businesses and consumers. Recently, a...

International Conference on Cyber Security In July, I had the opportunity to attend the International Conference on Cyber Security (ICCS), a meeting held every other year at Fordham University’s Lincoln Center campus. This gathering offers enterprise risk management, cybersecurity law enforcement and private sector professionals from throughout the world a...

Windows Update Microsoft is currently urging Windows 10 users to update their systems to address severe vulnerabilities. Despite the warning, many Windows users will undoubtedly be infected by malware exploiting these weaknesses in the system. Here are four things all Windows users need to know about this imperative update. The...

Data Breach Legislation As cyber threats evolve and grow, it’s not a matter of if a cyberattack will occur but when – or worse, has it already happened, and you just don’t know it? As a result of the ever-changing technology landscape and the increasing frequency of breaches, the New...

Cybersecurity With the increasing number of security and data breaches being identified, cybersecurity has gained global and local attention. Increased emphasis and scrutiny from regulators, including the Federal Financial Institutions Examination Council (FFIEC), will be bringing cybersecurity awareness to the forefront of annual audits and reviewing every day risk management...