FoxPointe Security Hub

Archive

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

The healthcare industry is one of the biggest targets of cybersecurity attacks, both domestically and internationally. With the amount of private data that these organizations have, including protected health information (PHI), healthcare organizations should learn from previous attacks and/or mistakes and remain diligent to combat threats or quickly respond to...

Two weeks ago, the United States launched an air strike targeted at the Iranian Military and subsequently led to the assassination of the Iranian military leader Qassem Soleimani. In a response from Esmail Ghaani, Soleimani’s replacement as the head of the Iranian Army, promised harsh revenge against the United States....

Last week, the Department of the Treasury Financial Sector Cyber Information Group (CIG) and the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) released a joint alert focused on notifying financial institutions that an increasing number of cyberattacks utilizing the Dridex malware and several variants of that malware are...

On the heels of New York passing the Stop Hacks and Improve Electronic Data Security (SHIELD) Act in September 2019, the IRS issued a warning to tax preparers and accounting firms to ensure that they appropriately secure their customer data against the “evolving” and “sophisticated” techniques used by cybercriminals to...

Recently, HITRUST established a new quality assurance (QA) subcommittee of its Board of Directors and introduced several new assurance advisories. These updates impact Certified Common Security Framework Practitioners (CCSFP), individuals who have completed and maintained training and certification through HITRUST; HITRUST Authorized External Assessors, organizations (including CPA firms) that have...

Written by Tim Ball, CFE, Principal at The Bonadio Group, and John G. Roman, Jr., CISSP, CIO at The Bonadio Group In the not so distant past, the threat of a person or people stealing money or assets from your business was limited to a lack of physical security or...

Today marks the beginning of National Cybersecurity Awareness Month. From CEOs to college students, cybersecurity is on everyone’s radar; and cyberattacks aren’t going away anytime soon. For businesses, it’s not a matter of if a breach will occur but when – an incident is inevitable. Therefore, it’s more important than...

Don’t hesitate to develop and implement a cybersecurity response plan this school year. These days, it’s more likely than not that when you open your daily newspaper or scroll through your newsfeed, you’ll see coverage of a cyberattack impacting both businesses and consumers. Recently, a number of these cybercrimes have...

In July, I had the opportunity to attend the International Conference on Cyber Security (ICCS), a meeting held every other year at Fordham University’s Lincoln Center campus. This gathering offers enterprise risk management, cybersecurity law enforcement and private sector professionals from throughout the world a chance to connect, converse, and...

Microsoft is currently urging Windows 10 users to update their systems to address severe vulnerabilities. Despite the warning, many Windows users will undoubtedly be infected by malware exploiting these weaknesses in the system. Here are four things all Windows users need to know about this imperative update.  The biggest issue...