FoxPointe Security Hub

Uncategorized

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

This article was written by nbsp Heather Brownson Recently the NYS Office for People with Developmental Disabilities OPWDD has been placing a stronger focus on Incident Management primarily surrounding timely completion of investigations of reportable incidents The following is a high level overview of OPWDD s Part 624 Regulations OPWDD...

This article was written by James Farr Senior Security Consultant Privacy vs Security Privacy and security often work hand in hand to support each other but each has its own distinct role nbsp Data privacy includes policies and procedures that define how information is gathered stored accessed and destroyed nbsp...

This article was written by Ryan Bigelow Director at FoxPointe Solutions The Payment Card Industry Security Standards Council PCI SSC has released version 4 of the Data Security Standard DSS This is the first major update to the standard since PCI DSS v3 0 was issued in November 2013 With...

This article was written by Brandon Agostinelli Managing Security Consultant at FoxPointe Solutions a division of The Bonadio Group With 2024 upon us it is time for us to assess the current trends across the cybersecurity landscape identify new risks and new solutions and speculate about what next year may...

This article was written by nbsp Carl Cadregari Executive Vice President FoxPointe Solutions nbsp amp nbsp Brandon Agostinelli Managing Security Consultant at FoxPointe Solutions Without a doubt supporting the continually cyber attacked infrastructures of our healthcare providers is on the minds of every person in leadership roles at every health...

This article was written by Heather Brownson Senior Consultant Compliance Solutions Division of The Bonadio Group Maintaining an effective compliance program should be a key component within any organization s overarching strategy In this article we will be reviewing the importance of maintaining an effective compliance program and ways in...

This article was written by James Farr Senior Security Consultant The sky is falling and Artificial Intelligence AI is the reason or so it has been said nbsp In reality threats from phishing malware and data exfiltration have been around for years The introduction of AI is just the next...

This article was written by Jessica Ramirez Senior Consultant at FoxPointe Solutions Many organizations understand that SOC compliance has become an invaluable resource in providing assurance to your clients that you are doing everything possible to keep their data and systems safe in a world were threats of cyberattacks loom...

The article was written by Emily Mosack Security Analyst with FoxPointe Solutions at The Bonadio Group As organizations grow utilizing third parties or outside sources becomes increasingly common nbsp Vendor Risk Management VRM is vital to keeping your organization safe from the rising risk of security breaches VRM is the...

It comes as no surprise that the United States Department of Defense DoD is an increasingly more frequent target of complex cybersecurity attacks nbsp In an effort to combat this increase in likelihood of attacks the DoD created a cybersecurity program called the Cybersecurity Maturity Model Certification or CMMC to...