FoxPointe Security Hub

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

All organizations can face a disastrous outcome to a ransomware event including the governmental entities An outbreak is a painful event especially with the critical role these agencies have The disruption of essential services to the public health care water amp sewerage education transportation and other vital amenities can be...

The Bonadio Group and their cybersecurity division FoxPointe Solutions highly recommends and encourages that our customers invest in an ongoing compliance solution that can help support its company s internal controls and compliance requirements before an internal audit is performed by an independent third party Not only does an effective...

By Christopher Salone CISA CCSFP MBA This past year proved to be a year of rapid development for the cybersecurity and IT landscape As new threats emerged others continued to develop and evolve Throughout the year the FFIEC in an effort to help its institutions combat these threats issued new...

The ever growing threat landscape and wide accessibility to the internet around the globe have made it easy for malicious actors to launch cyber attacks and exploit vulnerabilities within an organization Big or small organizations that possess data can be at risk to cyber criminals who want to gain access...

This article was written by Andrew Parks amp James Merritt Apache Log4j is an open source library that is utilized by applications to facilitate logging requests On December 9th 2021 a vulnerability was reported CVE 2021 44228 from the National Vulnerability Database that impacts applications leveraging Apache Log4j versions 2...

Overview Typically the two primary goals of a company s Payment Card Industry PCI governance program are to meet the intent of applicable controls and reduce the scope of PCI Data Security Standards DSS requirements enforced on the company s environment However many companies do not meet the guidance requirements...

On July 13 2021 the Board of Governors of the Federal Reserve System Federal Reserve the Federal Deposit Insurance Corporation FDIC and the Office of the Comptroller of the Currency OCC and together with the Federal Reserve and the FDIC the Agencies requested comments on nbsp proposed interagency guidance nbsp...

All fraud begins with a line of thinking that follow three major factors Opportunity Rationalization and Pressures Rationalization is the excuse an individual uses to provide comfort or assurance that they need to commit fraud An example of this could be I ll put the money back I just need...

In October 2020 the Federal Reserve Banks FRB posted an announcement to their website titled Announcing the FedLine Solutions Security and Resiliency Assurance Program nbsp The FRB s FedLine Solutions are a critical component of the U S payment system nbsp FedLine is a suite of payment solutions designed to...

Phishing is defined as a form of social engineering that use email or malicious websites to solicit personal information by posing as a trustworthy organization When users respond with the requested information attackers can use it to gain access to the accounts Phishing is often in the news with good...