FoxPointe Security Hub

Uncategorized

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

This article was written by James Normand, Security Consultant at FoxPointe Solutions With the rise of ChatGPT, deepfakes, and AI-generated art, many people are being exposed to the black box that is advanced computer science. While the inner workings of AI algorithms are known to their developers, the tools that...

SOC2 Fireside Chat with Charlie Wood of FoxPointe Solutions, a division of The Bonadio Group, Reg Harnish of OrbitalFire and Matt Farry of RealCISCO.

...

By: Emily Mosack, Security Consultant at FoxPointe Solutions Must Knows for Tax Season The end of the year and start of the new year mean tax season is approaching quickly. Tax season is one of the most active times for scammers. Thousands of people have become victims of tax scams...

This article was written by Ryan Bigelow, Director at FoxPointe Solutions Background In the class action lawsuit Martin v. Safeway Inc., the plaintiff (Martin) alleged that Safeway printed receipts for credit or debit card transactions at its gas stations displaying first six (6) and last four (4) digits of payment...

This article was written by Jessica Ramirez, Security Consultant at FoxPointe Solutions. In this day and age, the importance of having proper security controls in place is critical in order to reduce or mitigate the risk of cyberattacks. Due to the recent global pandemic, security breaches have become more apparent....

Cybersecurity Careers So, what do cybersecurity professionals do? According to Indeed, “working in cybersecurity means protecting company networks, data and various systems from digital attack.” Positions within cybersecurity can range from IT roles such as support specialist and infrastructure specialist, to more consulting roles such as analyst and consultant. As...

By Brandon Agostinelli, CISA, CCSFP; Christopher Salone, MBA, CISA, CCSFP; and Carl Cadregari, CISA, CTPRP What is the Zero Trust Architecture? As our world changes and evolves, so does the way organizations operate. Business models change, and infrastructures and networks grow and become more complex. In the past, perimeter-based architecture...

Managing a Remote Workforce COVID 19 forced many organizations into supporting a remote work force with little time to create a well-developed and documented remote work plan. Now that the initial rush to arrange the necessary logistics for remote work has passed, it is important to continually review remote work...

New Cyber Incident Reporting The NCUA has proposed a new Cyber Incident Reporting Rule. This proposal comes on the heels of the Federal Banking Agencies Incident Reporting Rule that went into effect earlier this year. The proposed NCUA regulation would require federally charted credit unions (also applies to state-chartered, federally...

This article was written by Jamie Normand, Security Consultant – FoxPointe Solutions Cybersecurity Jurisdiction Data privacy and protection regulations are becoming increasingly common worldwide. This month marks four years since the European Union’s General Data Protection Regulation (GDPR) took effect. During the GDPR’s first four years, more than $1.5 Billion...