Join FoxPointe Solutions for our 12th Annual Compliance Bootcamp. Coming to Albany, NYC, and Rochester. Register now to secure your spot.
Home / Blog / Data Security
Receive articles and resources from the information risk management experts at FoxPointe.
Artificial intelligence (AI) has been a trending topic that we have been exploring and discussing as it continues to rapidly advance technologically. One thing to keep in mind as AI advances, is how this impacts professional settings. An organization must understand the advantages and disadvantages that AI can bring into...
In today’s digital landscape, where cybersecurity threats are constantly evolving, organizations face the challenge of staying ahead of malicious actors while managing limited resources and expertise. One solution gaining momentum is outsourcing cybersecurity functions to specialized external providers. What is outsourcing? The use of outsourcing is the practice of contracting...
Why Your Organization Needs a Gap Assessment Today and the Top Benefits of Partnering with a QSA The Payment Card Industry Security Standards Council (PCI SSC) has released version 4 of the Data Security Standard (DSS). This is the first major update to the standard since PCI DSS v3.0 was...
In today’s rapidly evolving digital landscape, the protection of sensitive information and the preservation of digital assets have become paramount, as has a full and accurate understanding of the controls in place. As organizations navigate the intricate realm of cybersecurity, the role of a Chief Information Security Officer (CISO) has...
This article was written by Kevin Testo, Industry Leader, Human Services, The Bonadio Group & Carl Cadregari, Executive Vice President, FoxPointe Solutions. By the simple nature of their operations, human service organizations possess abundant amounts of protected personal information in electronic format. As confirmed by the U.S. Department of Health...
Today’s organizations face numerous cybersecurity challenges, and one of the most insidious threats is social engineering. Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses; however, social engineering leverages human reactions and psychology to gather information and perform attacks. This article aims to shed light on the key principles...
What is Encryption? Encryption is often utilized to protect and hide user information from hackers. However, understanding what encryption is and how it works may be daunting. By looking at the first forms of encryption, we can simplify and understand modern encryption. The simplest form of encryption is referred to...
The Cybersecurity and Infrastructure Security Agency (CISA) defines Multi-factor authentication (MFA) as: “a layered approach to securing data and applications where a system requires a user to present a combination of two or more credentials to verify a user’s identity for login. MFA increases security because even if one credential...
By: Emily Mosack, Security Consultant at FoxPointe Solutions The end of the year and start of the new year mean tax season is approaching quickly. Tax season is one of the most active times for scammers. Thousands of people have become victims of tax scams and have lost millions of...
This article was written by Ryan Bigelow, Director at FoxPointe Solutions Background In the class action lawsuit Martin v. Safeway Inc., the plaintiff (Martin) alleged that Safeway printed receipts for credit or debit card transactions at its gas stations displaying first six (6) and last four (4) digits of payment...
In this day and age, the importance of having proper security controls in place is critical in order to reduce or mitigate the risk of cyberattacks. Due to the recent global pandemic, security breaches have become more apparent. An organization should understand the criticality of having strong access management in...
Managing a Remote Workforce COVID 19 forced many organizations into supporting a remote work force with little time to create a well-developed and documented remote work plan. Now that the initial rush to arrange the necessary logistics for remote work has passed, it is important to continually review remote work...