FoxPointe Security Hub

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

This article was written by Charlie Wood, FoxPointe Practice Leader Purchasing or selling a business is fraught with complexities, from financial statement due diligence, to ensuring that the right resources are in place before, during, and after the transaction. Legal and even environmental considerations also can be complex, time consuming,...

This article was written by Jeffery Travis, Director, FoxPointe Solutions. Whether they’re ensuring high quality care and patient safety, managing costs or complying with regulations, healthcare organizations have a lot to consider in order to run properly. One strategic tool that healthcare organizations can adopt to enhance efficiency is Artificial...

The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) recently released a Notice of Proposed Rule Making (NPRM) detailing the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA). This proposal mandates that companies report cybersecurity incidents and ransomware payments within strict timelines. Public comments on the NPRM are...

Is your Credit Union in the know about the recent cybersecurity requirements mandated by the New York State Department of Financial Services (DFS) that may affect operations? DFS has made significant amendments to its Cybersecurity Regulation, 23 NYCRR Part 500. The rule is final and effective as of November 1,...

Discover how to effectively assess and mitigate risks for these vendors. Now that you have stood up processes for onboarding 3rd parties, it is time to consider the same for 4th parties. What? Another vendor group I have to worry about? Have you thought about 4th parties? These entities are...

Outsourcing Cybersecurity Functions This article was written by Emily Mosack In today’s digital landscape, where cybersecurity threats are constantly evolving, organizations face the challenge of staying ahead of malicious actors while managing limited resources and expertise. One solution gaining momentum is outsourcing cybersecurity functions to specialized external providers. What is...

You may have read recently that the number of instances of ransomware has declined. While the overall count of malicious and damaging infections may be waning, the impact of an attack is certainly not. Case in point: the BlackCat attack on Change Healthcare. The attack on February 21st has had...

Your organization and its risk management leaders face disturbances on multiple levels every day, encompassing cybersecurity, privacy, regulatory management, and focused and widespread malicious actions and actors, technological weaknesses, organizational apathy, human errors, etc. Preparation, assessment, and pragmatic execution of the needed controls are vital to address these disruptions and...

Incident Management Efficiency This article was written by Heather Brownson. Recently, the NYS Office for People with Developmental Disabilities (OPWDD) has been placing a stronger focus on Incident Management, primarily surrounding timely completion of investigations of reportable incidents. The following is a high-level overview of OPWDD’s Part 624 Regulations. OPWDD...

This article was written by James Farr, Senior Security Consultant Privacy vs. Security Privacy and security often work hand in hand to support each other, but each has its own distinct role. Data privacy includes policies and procedures that define how information is gathered, stored, accessed, and destroyed. Security is...