FoxPointe Security Hub

Uncategorized

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

Incident Management Efficiency This article was written by Heather Brownson. Recently, the NYS Office for People with Developmental Disabilities (OPWDD) has been placing a stronger focus on Incident Management, primarily surrounding timely completion of investigations of reportable incidents. The following is a high-level overview of OPWDD’s Part 624 Regulations. OPWDD...

This article was written by James Farr, Senior Security Consultant Privacy vs. Security Privacy and security often work hand in hand to support each other, but each has its own distinct role. Data privacy includes policies and procedures that define how information is gathered, stored, accessed, and destroyed. Security is...

Why Your Organization Needs a Gap Assessment Today and the Top Benefits of Partnering with a QSA This article was written by Ryan Bigelow, Director at FoxPointe Solutions. The Payment Card Industry Security Standards Council (PCI SSC) has released version 4 of the Data Security Standard (DSS). This is the...

This article was written by Brandon Agostinelli- Managing Security Consultant at FoxPointe Solutions, a division of The Bonadio Group With 2024 upon us, it is time for us to assess the current trends across the cybersecurity landscape, identify new risks and new solutions, and speculate about what next year may...

This article was written by Carl Cadregari, Executive Vice President, FoxPointe Solutions & Brandon Agostinelli, Managing Security Consultant at FoxPointe Solutions. Without a doubt, supporting the continually cyber-attacked infrastructures of our healthcare providers is on the minds of every person in leadership roles at every health system. Anything that can...

This article was written by Heather Brownson, Senior Consultant, Compliance Solutions Division of The Bonadio Group. Maintaining an effective compliance program should be a key component within any organization’s overarching strategy. In this article, we will be reviewing the importance of maintaining an effective compliance program and ways in which...

This article was written by James Farr, Senior Security Consultant. The sky is falling and Artificial Intelligence (AI) is the reason, or so it has been said. In reality, threats from phishing, malware, and data exfiltration have been around for years. The introduction of AI is just the next phase...

This article was written by Jessica Ramirez, Senior Consultant at FoxPointe Solutions. Many organizations understand that SOC compliance has become an invaluable resource in providing assurance to your clients that you are doing everything possible to keep their data and systems safe in a world were threats of cyberattacks loom...

The article was written by Emily Mosack- Security Analyst with FoxPointe Solutions at The Bonadio Group As organizations grow, utilizing third parties or outside sources becomes increasingly common. Vendor Risk Management (VRM) is vital to keeping your organization safe from the rising risk of security breaches. VRM is the practice...

It comes as no surprise that the United States Department of Defense (DoD) is an increasingly more frequent target of complex cybersecurity attacks. In an effort to combat this increase in likelihood of attacks, the DoD created a cybersecurity program, called the Cybersecurity Maturity Model Certification or CMMC, to further...