FoxPointe Security Hub

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

This article was written by James Normand, Security Consultant at FoxPointe Solutions Cybercrime events cost affected organizations trillions of dollars annually and the monetary damage caused by these incidents is increasing year over year. Many well-known organizations have acknowledged the unfortunate rise in cybersecurity incidents and the importance of appropriate...

This article was written by Kevin Testo, Industry Leader, Human Services, The Bonadio Group & Carl Cadregari, Executive Vice President, FoxPointe Solutions. By the simple nature of their operations, human service organizations possess abundant amounts of protected personal information in electronic format. As confirmed by the U.S. Department of Health...

Today’s organizations face numerous cybersecurity challenges, and one of the most insidious threats is social engineering. Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses; however, social engineering leverages human reactions and psychology to gather information and perform attacks. This article aims to shed light on the key principles...

How can an organization know if they are prepared to handle the many facets of a cybersecurity incident? We check the news all the time and see headlines of the latest data breach, or ransomware outbreak, but what if that happened to you? Would your team be able to identify...

Yesterday, the Board of Governors of the Federal Reserve System (Federal Reserve), the Federal Deposit Insurance Corporation (FDIC), and the Office of the Comptroller of the Currency (OCC, and together with the Federal Reserve and the FDIC, the Agencies), finalized previously proposed interagency guidance on how banking organizations should manage...

This article was written by Ryan Krawczyk Security Consultant I at FoxPointe Solutions What is Encryption? Encryption is often utilized to protect and hide user information from hackers. However, understanding what encryption is and how it works may be daunting. By looking at the first forms of encryption, we can...

This article was written by Ryan Krawczyk, Security Consultant I at FoxPointe Solutions Man-in-the-Middle Attack Phishing and malware attacks have become well known methods of cyber security attacks. But there is another, less common, but equally dangerous method of attacking: Man-in-the-Middle or Eavesdropping attacks. A Man-in-the-middle attack involves an individual...

This article was written by Christopher Salone, CISA, CCSFP, MBA As another year passes, more cybersecurity laws and regulations for financial institutions are proposed and or updated. Let’s recap the last twelve months and look at some of the most impactful cyber regulatory updates that, whether coming soon or are...

This article was written by Jessica Ramirez, Security Consultant at FoxPointe Solutions. In 2018, one of the most well-known side-channel attacks was discovered. The Spectre and Meltdown attack was noteworthy because of how the exploitation affected almost every modern computer processor using software alone, making it difficult to detect. There...

This article was written by Christopher Salone, CISA, CCSFP, MBA After years of presenting to Audit Committees, you develop effective ways of communicating not only the results of your IT Audits, but also the health and state of the Organization as a whole. Frequently, I find that at the end...