Receive articles and resources from the information risk management experts at FoxPointe.
The cyber-threat landscape has evolved dramatically over recent years, becoming more sophisticated and unpredictable. Organizations worldwide face an array of challenges—from advanced persistent threats and ransomware attacks to insider threats and vulnerabilities introduced by remote work. In this context, traditional security models that rely on perimeter defenses are no longer...
This article was written by Brendan Horton, Senior Consultant. In today’s dynamic and increasingly complex cyber landscape, organizations need a holistic, strategic approach that brings together people, processes, and technology. At FoxPointe Solutions, we understand that effective cybersecurity is about more than technical solutions; it’s about integrating expertise, structured processes,...
Cyber liability insurance can be a critical weapon in your war against cyber criminals. We often get asked by our clients, “Do I really need cyber liability insurance?” It is often prefaced with the comment ‘I have general business insurance coverage and a really good IT team.’ The short answer...
This article was written by James Farr, Consulting Manager & Jack Hunter, Intern. Multi-Factor Authentication (MFA) is a comprehensive approach to authenticating users, relying on two or more credentials to verify an individual’s identity. Typically, these credentials are chosen to be: Something you know (i.e., a memorized password) Something you...
Since 2004, October has been marked as National Cybersecurity Awareness Month. This month raises awareness about the importance of cybersecurity and how to protect yourself from cybercrime. Perform third-party due diligence on all critical vendors. Ensure that they have either a SOC2 report or a similar certification that covers the...
A SOC 3 report, also known as the Statement on Standards for Attestation Engagements (SSAE) 21, focuses on a service organization’s controls that are likely relevant to examining a user entity’s (customer’s) service commitments and system requirements. SOC 3 reports cover a service organization’s security, availability, processing integrity, confidentiality, and...
Based on Verizon’s 2024 Data Breach Investigations Report, the public administration, finance, professional, manufacturing, and education industries are the most popular targets for cyber criminals. The most common attacks occur through ransomware, phishing emails, desktop sharing, virtual private networks, and web applications. All of which have led to an increased...
By James Normand, Security Analyst Ensuring the security of data and computer systems is an ongoing battle for all businesses operating in the digital age. The stakes have always been high with a company’s reputation and financial stability on the line. Over the past few years, large data breaches have...
The SEC has released adopted amendments to Regulation S-P and formalized them in a final rule to address cybersecurity risks. They also released a companion fact sheet, which helps outline the impacts of the final rule and it’s requirements that covered institutions (including broker-dealers, investment companies, and certain other financial...
Discover how to effectively assess and mitigate risks for these vendors. Now that you have stood up processes for onboarding 3rd parties, it is time to consider the same for 4th parties. What? Another vendor group I have to worry about? Have you thought about 4th parties? These entities are...