FoxPointe Security Hub

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

It comes as no surprise that the United States Department of Defense DoD is an increasingly more frequent target of complex cybersecurity attacks nbsp In an effort to combat this increase in likelihood of attacks the DoD created a cybersecurity program called the Cybersecurity Maturity Model Certification or CMMC to...

This article was written by Brendan Horton Security Analyst Cloud security encompasses the policies technologies and practices designed to protect cloud based resources including data applications and infrastructure from a wide range of cyber threats nbsp Cloud computing has become the technology of choice for organizations wanting scalability and flexibility...

Every October since 2004 marks National Cybersecurity Awareness Month This month raises awareness about the importance of cybersecurity and how to protect yourself from cybercrime Use multi factor authentication wherever possible Traditional authentication requires an ID and password multi factor requires an additional layer of protection such as entering a...

This article was written by Kate Gottermeier MPA CFE Senior Consultant at The Bonadio Group It s no surprise in this era of impressive technological advancement that fraudsters are cooking up more creative and elaborate schemes to grab funds Accountants and investigators need up to date knowledge skills and tools...

In today 8217 s rapidly evolving digital landscape the protection of sensitive information and the preservation of digital assets have become paramount as has a full and accurate understanding of the controls in place nbsp As organizations navigate the intricate realm of cybersecurity the role of a Chief Information Security...

On July 26 2023 the U S Securities and Exchange Commission SEC adopted rules regarding nbsp Cybersecurity Risk Management Strategy Governance and Incident Disclosure by Public Companies The SEC has developed these rules to require registrants to disclose all material cybersecurity incidents on the new Item 1 05 of Form...

This article was written by James Normand Security Consultant at FoxPointe Solutions Cybercrime events cost affected organizations trillions of dollars annually and the monetary damage caused by these incidents is increasing year over year nbsp Many well known organizations have acknowledged the unfortunate rise in cybersecurity incidents and the importance...

This article was written by Kevin Testo Industry Leader Human Services The Bonadio Group amp Carl Cadregari Executive Vice President FoxPointe Solutions By the simple nature of their operations human service organizations possess abundant amounts of protected personal information in electronic format As confirmed by the U S Department of...

Today s organizations face numerous cybersecurity challenges and one of the most insidious threats is social engineering nbsp Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses however social engineering leverages human reactions and psychology to gather information and perform attacks nbsp This article aims to shed light on...

How can an organization know if they are prepared to handle the many facets of a cybersecurity incident We check the news all the time and see headlines of the latest data breach or ransomware outbreak but what if that happened to you Would your team be able to identify...