Join FoxPointe Solutions for our 12th Annual Compliance Bootcamp. Coming to Albany, NYC, and Rochester. Register now to secure your spot.

FoxPointe Security Hub

Cybersecurity

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

The cybersecurity risk to family offices is extremely high in the current environment. According to recent data from Deloitte, 43% of family offices globally have experienced a cyberattack over the past 12–24 months, and 25% have experienced three or more attacks. Those based in North America are the most likely...

In today’s fast-paced business and IT environment, seamless and efficient asset management are crucial for maintaining operational efficiency and ensuring the security of valuable company resources. As organizations grow and reliance on technology increases, the need for robust asset tagging, tracking, and management systems becomes increasingly important. Traditional methods of...

As remote work continues to evolve from a temporary solution to a long-term business strategy, the importance of securing a remote workforce has never been more critical. While remote work brings flexibility and convenience, it also introduces unique cybersecurity challenges that businesses must address to safeguard sensitive data and maintain...

In today’s digital landscape, where data breaches and cyber threats loom large, cybersecurity IT consultants play a crucial role in safeguarding businesses from potential risks. The evolution of technology has not only increased connectivity but also expanded the attack surface, making it imperative for consultants to leverage advanced data analytics...

Cybersecurity is more important than ever given today’s digital age. It is critical that organizations of all sizes make the protection of their systems and data a top priority. One of the top ways to enhance cybersecurity is through establishing and implementing a robust employee training program for new and...

The European Union’s Digital Operational Resilience Act (DORA) officially went into effect on January 17, 2025, marking a significant step in strengthening the IT security and operational resilience of financial institutions. This regulation sets a new standard for banks, insurance companies, investment firms, and other financial entities, ensuring they can...

Data Privacy can be best defined as the protection of personal data from those who should not have access to it and the ability to individuals to determine who can access their personal information. AI’s Impact on Informational Privacy The use of Artificial Intelligence (AI) has become widespread and almost...

The State University of New York (SUNY) has introduced an updated Information Security Policy (ISP) aimed at creating a cohesive cybersecurity framework across all its campuses. With the rise in cyber threats and increasing regulatory demands, this policy provides a structured approach to protect SUNY’s critical data and digital infrastructure...

The cyber-threat landscape has evolved dramatically over recent years, becoming more sophisticated and unpredictable. Organizations worldwide face an array of challenges—from advanced persistent threats and ransomware attacks to insider threats and vulnerabilities introduced by remote work. In this context, traditional security models that rely on perimeter defenses are no longer...

In today’s dynamic and increasingly complex cyber landscape, organizations need a holistic, strategic approach that brings together people, processes, and technology. At FoxPointe Solutions, we understand that effective cybersecurity is about more than technical solutions; it’s about integrating expertise, structured processes, and the right technology to build a truly resilient...

Cyber liability insurance can be a critical weapon in your war against cyber criminals. We often get asked by our clients, “Do I really need cyber liability insurance?” It is often prefaced with the comment ‘I have general business insurance coverage and a really good IT team.’ The short answer...

Multi-Factor Authentication (MFA) is a comprehensive approach to authenticating users, relying on two or more credentials to verify an individual’s identity. Typically, these credentials are chosen to be: Something you know (i.e., a memorized password) Something you have (i.e., a physical access badge or smartphone) Something you are (i.e., a...