Receive articles and resources from the information risk management experts at FoxPointe.
Beware of methods like pretexting, ransomware, and stolen devices threatening your business security this year. Read the Full Article
...This article was written by Carl Cadregari, Executive Vice President. Regardless of the industry in which they operate, organizations have likely witnessed the wave of destructive MOVEit breaches sweeping the globe during recent months. As a result, many organizations may be left wondering what they need to understand about the...
This article was written by Paul Mayer, Executive Vice President. The New York State Office of the Medicaid Inspector General (OMIG) considers an “effective compliance program” to be a compliance initiative that is adopted and implemented by the health-care provider that, at a minimum, satisfies compliance program requirements and is...
Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses. However, one popular cyber-attack method known as social engineering leverages human psychology to gather information and perform attacks instead. Read the Full Article
...Chris Salone talks about the U.S. Securities and Exchange Commission/s (SEC) proposed new rules and amendments that standardize cybersecurity-incident reporting and risk-management strategies. You will be prompted for log in information. Read the article here on CNYBJ
...“AI-driven cybersecurity threats are developing at a place that we have not seen before due to advancements in machine learning and the ability to amplify existing attack methodologies,” said Brendan Horton, a Security Analyst, click to read more. The RBJ does require a log in. Read the Full Article
...No organization is safe from the threats of a cyberattack, including banks and credit unions, and the risk of cyber incidents is only heightening. Read more from Managing Security Consultant Chris Salone.
...An Interview With Tyler Gallagher, CEO and Founder of Regal Assets Click here for the original interview As part of our series about “5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity”, I had the pleasure of interviewing Charlie Wood, Executive Vice President for...
John Roman contributes his insights on how to take advantage of free webinars for additional learning opportunities. Cheap and free cybersecurity training: 8 ways to build skills without breaking the bank
...Cyberattacks are a growing threat to small businesses. John Roman contributes his insights on pages 11 and 12 on four ways small to mid-sized businesses can prevent themselves against such attacks. Read the Article Please note: access to this article requires a subscription. You will be prompted for log-in information.
...