FoxPointe Security Hub

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

This article was written by Dominic Brugno, Intern. In today’s fast-paced business and IT environment, seamless and efficient asset management are crucial for maintaining operational efficiency and ensuring the security of valuable company resources. As organizations grow and reliance on technology increases, the need for robust asset tagging, tracking, and...

This article was written by Christopher Salone, Director, FoxPointe Solutions. Artificial Intelligence (AI) is no longer a buzzword—it’s a business imperative. For financial institutions, AI offers real, measurable impact across a variety of functions, from streamlining internal operations to enhancing customer experience and safeguarding critical assets. Let’s explore the practical...

This article was written by Ryan Bigelow, Director FoxPointe Solutions. It’s hard to believe that PCI DSS v4 (now 4.0.1) has already been out for three years. The standard was officially released to the public on March 31, 2022. With it came a transition period to allow organizations time to...

This article was written by Emily Mosack, Security Analyst with FoxPointe Solutions at The Bonadio Group. As remote work continues to evolve from a temporary solution to a long-term business strategy, the importance of securing a remote workforce has never been more critical. While remote work brings flexibility and convenience,...

This article was written by Kate Gottermeier, Certified Fraud Examiner. In today’s digital landscape, where data breaches and cyber threats loom large, cybersecurity IT consultants play a crucial role in safeguarding businesses from potential risks. The evolution of technology has not only increased connectivity but also expanded the attack surface,...

Cybersecurity is more important than ever given today’s digital age. It is critical that organizations of all sizes make the protection of their systems and data a top priority. One of the top ways to enhance cybersecurity is through establishing and implementing a robust employee training program for new and...

The European Union’s Digital Operational Resilience Act (DORA) officially went into effect on January 17, 2025, marking a significant step in strengthening the IT security and operational resilience of financial institutions. This regulation sets a new standard for banks, insurance companies, investment firms, and other financial entities, ensuring they can...

This article was written by Deb Bond, Consulting Manager. Data Privacy can be best defined as the protection of personal data from those who should not have access to it and the ability to individuals to determine who can access their personal information. AI’s Impact on Informational Privacy The use...

This article was written by James Farr, Consulting Manager. The State University of New York (SUNY) has introduced an updated Information Security Policy (ISP) aimed at creating a cohesive cybersecurity framework across all its campuses. With the rise in cyber threats and increasing regulatory demands, this policy provides a structured...

This article was written by James Normand, Security Analyst. As organizations operate and grow, so too does the amount of data that they’re responsible for. Properly managing and safeguarding organizational and customer data can help ensure compliance with GDPR, CCPA, GLBA, and regional laws. Failure to implement and maintain secure...