FoxPointe Security Hub

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

Based on Verizon’s 2024 Data Breach Investigations Report, the public administration, finance, professional, manufacturing, and education industries are the most popular targets for cyber criminals. The most common attacks occur through ransomware, phishing emails, desktop sharing, virtual private networks, and web applications. All of which have led to an increased...

Maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA) Security and Breach rules is not a one-time effort. It’s an ongoing project that spans the entire life of your organization. With the rise of new and emerging changes in work environments, evolving technologies, and increasingly sophisticated criminal methods,...

This article was written by Courtney Caryl & Allison Stowers.   A SOC 1 report, also known as the Statement on Standards for Attestation Engagements (SSAE) 21, focuses on a service organization’s controls that are likely to be relevant to an examination of a user entity’s (customer’s) financial statements. SOC...

By Brendan Horton, Analyst In today’s business world, companies depend on third-party vendors for everything from IT support to supply chain logistics. While these partnerships offer many benefits and efficiencies, they also come with added risks. Effective Vendor Risk Management helps businesses continually identify and manage risks, protecting them from...

The European Union’s General Data Protection Regulation (GDPR) sets a high standard in the world of global data privacy and security. Known for its strict requirements and robust enforcement, the GDPR poses a considerable challenge for companies within its reach. However, for businesses planning to expand into the United States,...

In this article, we will be reviewing the benefits of Outsourced Compliance Services and how to make them work for your agency....

By James Normand, Security Analyst Ensuring the security of data and computer systems is an ongoing battle for all businesses operating in the digital age. The stakes have always been high with a company’s reputation and financial stability on the line. Over the past few years, large data breaches have...

Due diligence is an integral part of any M&A transaction. During this phase of the transaction, the parties outline internal and external risk factors, mitigate various issues, and lay out their acquisition strategy....

By Jessica Ramirez Artificial intelligence (AI) has been a trending topic that we have been exploring and discussing as it continues to rapidly advance technologically. One thing to keep in mind as AI advances, is how this impacts professional settings. An organization must understand the advantages and disadvantages that AI...

By Ryan Krawczyk, Senior Consultant Remote workers come with many benefits, such as improved work life balance and increased productivity. However, there are some security risks that are unique to employees working remotely. A better understanding of the potential risks can develop procedures to better protect your business. Personal Computers...