FoxPointe Security Hub

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

By Brandon Agostinelli, CISA, CCSFP; Christopher Salone, MBA, CISA, CCSFP; and Carl Cadregari, CISA, CTPRP What is the Zero Trust Architecture? As our world changes and evolves, so does the way organizations operate. Business models change, and infrastructures and networks grow and become more complex. In the past, perimeter-based architecture...

Cybersecurity Challenges in an Interconnected World In the ever-changing ecosystems that organizations operate in, business needs can change as rapidly as the weather. It’s abundantly clear that organizations must be agile so they can adapt and react to the business storms on the horizon. Budgetary constraints and increased transaction velocity...

Brandon Agostinelli – September 12, 2022 Managing Medical Devices Cybersecurity Within the healthcare industry, there is a variety of environments that utilize many different types of medical devices to deliver services to patients. As reliance on technology within the healthcare industry continues to grow, an increase in information security risk...

Remaining Cyber Secure While Traveling On September 15, 2022, WebMD, a credible medical news source, issued a statement that the end of the COVID-19 pandemic is approaching. The WebMD news brief noted that the World Health Organization reported COVID-19 deaths dropping to their lowest count since March 2020. With the...

Cybersecurity Awareness Month Every October since 2004 marks National Cybersecurity Awareness Month. This month raises awareness about the importance of cybersecurity and how to protect yourself from cybercrime. Use multi-factor authentication wherever possible. Traditional authentication requires an ID and password, multi-factor requires an additional layer of protection such as entering...

This article was written by Brendan Horton, Security Analyst at The Bonadio Group   Small or large, it is not uncommon to hear about a new sophisticated attack carried out on an organization. In the era of digital change, it is no surprise that threat actors have begun exploiting new...

Managing a Remote Workforce COVID 19 forced many organizations into supporting a remote work force with little time to create a well-developed and documented remote work plan. Now that the initial rush to arrange the necessary logistics for remote work has passed, it is important to continually review remote work...

New York State Department of Financial Services (NYSDFS) has proposed several changes to the existing 23 NYCRR Part 500 – Cybersecurity Requirements for Financial Services Companies (the Cybersecurity Regulation or Part 500). They include items such as: Classification of “Class A” companies, which are those with over 2,000 employees or...

New Cyber Incident Reporting The NCUA has proposed a new Cyber Incident Reporting Rule. This proposal comes on the heels of the Federal Banking Agencies Incident Reporting Rule that went into effect earlier this year. The proposed NCUA regulation would require federally charted credit unions (also applies to state-chartered, federally...

Benefits of a vCISO Cyberattacks and data security breaches continue to grow at a record pace year after year. According to recent surveys, over 60% of cybersecurity professionals saw an increase in cyberattacks and security breaches related to the pandemic. In order to defend against these attacks, businesses need to...