Upcoming Webinar: Strengthening Compliance in Long-Term Care- A Practical Compliance & HIPAA Guide for Nursing Homes. Learn More.
Receive articles and resources from the information risk management experts at FoxPointe.
The Employee Retirement Income Security Act of 1974 (ERISA) is a federal law that establishes minimum protection requirements for retirement and health insurance plans established voluntarily by private industries nationwide. Plans covered by ERISA often hold substantial monetary assets and maintain personal data on participants. As you can imagine, this...
The cybersecurity risk to family offices is extremely high in the current environment. According to recent data from Deloitte, 43% of family offices globally have experienced a cyberattack over the past 12–24 months, and 25% have experienced three or more attacks. Those based in North America are the most likely...
Insider threats pose a significant risk to organizations, involving individuals with access to critical systems and data. These threats can come from malicious insiders intent to cause harm, careless employees who unknowingly compromise security, or those whose credentials have been stolen by external attackers. Unlike external threats, insider attacks can...
Multi-Factor Authentication (MFA) is a comprehensive approach to authenticating users, relying on two or more credentials to verify an individual’s identity. Typically, these credentials are chosen to be: Something you know (i.e., a memorized password) Something you have (i.e., a physical access badge or smartphone) Something you are (i.e., a...
Introduction Fraud risk mitigation is crucial in business operations to safeguard assets, maintain financial integrity, and uphold the trust of stakeholders. The impact of fraud can be devastating, leading to significant financial losses, reputational damage, and legal consequences. Implementing robust fraud risk mitigation strategies helps to prevent and detect fraudulent...
In today’s business world, companies depend on third-party vendors for everything from IT support to supply chain logistics. While these partnerships offer many benefits and efficiencies, they also come with added risks. Effective Vendor Risk Management helps businesses continually identify and manage risks, protecting them from potential security breaches and...
Remote workers come with many benefits, such as improved work life balance and increased productivity. However, there are some security risks that are unique to employees working remotely. A better understanding of the potential risks can develop procedures to better protect your business. Personal Computers A company owned computer likely...
Recently, the Federal Deposit Insurance Corporation (FDIC), the Board of Governors of the Federal Reserve System (FRB), and the Office of the Comptroller of the Currency (OCC) issued the Third-Party Risk Management: A Guide for Community Banks (the guide). A community bank’s reliance on third parties does introduce operational, compliance,...
Purchasing or selling a business is fraught with complexities, from financial statement due diligence, to ensuring that the right resources are in place before, during, and after the transaction. Legal and even environmental considerations also can be complex, time consuming, and resource intensive. One area that often gets overlooked is...
Whether they’re ensuring high quality care and patient safety, managing costs or complying with regulations, healthcare organizations have a lot to consider in order to run properly. One strategic tool that healthcare organizations can adopt to enhance efficiency is Artificial Intelligence (AI). AI is revolutionizing industries worldwide, and healthcare is...
As organizations grow, utilizing third parties or outside sources becomes increasingly common. Vendor Risk Management (VRM) is vital to keeping your organization safe from the rising risk of security breaches. VRM is the practice of ensuring that the use of service providers (third-party vendors) does not create a negative impact...