FoxPointe Security Hub

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

This article was written by Heather Brownson, Senior Consultant, Compliance Solutions Division of The Bonadio Group. Maintaining an effective compliance program should be a key component within any organization’s overarching strategy. In this article, we will be reviewing the importance of maintaining an effective compliance program and ways in which...

This article was written by James Farr, Senior Security Consultant. The sky is falling and Artificial Intelligence (AI) is the reason, or so it has been said. In reality, threats from phishing, malware, and data exfiltration have been around for years. The introduction of AI is just the next phase...

This article was written by Paul Mayer, June Crawford, and Heather Brownson To celebrate this year’s Corporate Compliance & Ethics Week (11/5-11/11 2023), The Compliance Solutions team at FoxPointe Solutions, a division of The Bonadio Group, wanted to share a few important reminders related to New York State’s mandatory compliance...

This article was written by Jessica Ramirez, Senior Consultant at FoxPointe Solutions. Many organizations understand that SOC compliance has become an invaluable resource in providing assurance to your clients that you are doing everything possible to keep their data and systems safe in a world were threats of cyberattacks loom...

The article was written by Emily Mosack- Security Analyst with FoxPointe Solutions at The Bonadio Group As organizations grow, utilizing third parties or outside sources becomes increasingly common. Vendor Risk Management (VRM) is vital to keeping your organization safe from the rising risk of security breaches. VRM is the practice...

It comes as no surprise that the United States Department of Defense (DoD) is an increasingly more frequent target of complex cybersecurity attacks. In an effort to combat this increase in likelihood of attacks, the DoD created a cybersecurity program, called the Cybersecurity Maturity Model Certification or CMMC, to further...

This article was written by Brendan Horton, Security Analyst. Cloud security encompasses the policies, technologies, and practices designed to protect cloud-based resources, including data, applications, and infrastructure, from a wide range of cyber threats. Cloud computing has become the technology of choice for organizations wanting scalability and flexibility to meet...

This article was written by Kate Gottermeier MPA, CFE, Senior Consultant at The Bonadio Group It’s no surprise in this era of impressive technological advancement that fraudsters are cooking up more creative and elaborate schemes to grab funds. Accountants and investigators need up to date knowledge, skills, and tools more...

In today’s rapidly evolving digital landscape, the protection of sensitive information and the preservation of digital assets have become paramount, as has a full and accurate understanding of the controls in place. As organizations navigate the intricate realm of cybersecurity, the role of a Chief Information Security Officer (CISO) has...

On July 26, 2023, the U.S. Securities and Exchange Commission (SEC) adopted rules regarding Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies. The SEC has developed these rules to require registrants to disclose all material cybersecurity incidents on the new Item 1.05 of Form 8-K. Additionally, the...