Receive articles and resources from the information risk management experts at FoxPointe.
In the United States, healthcare continues to sit at the bullseye of cybercrime. The FBI’s 2024 Internet Crime Report and the American Hospital Association’s analysis of that report show that the health sector suffered more reported cyberthreats than any other critical infrastructure vertical that year, totaling 444 incidents that combined...
We are excited to announce our new strategic partnership with Guardz, a unified AI-driven platform to help businesses identify and reduce digital risk. FoxPointe’s partnership with Guardz will empower Managed Service Providers to deliver stronger and more scalable cybersecurity protection while giving their customers enterprise-grade security without added complexity. By...
Every January, Data Privacy Week serves as a reminder that data privacy is not just a technical concern, it’s a personal, organizational, and societal issue. As technology continues to shape how we live and work, the amount of data we generate has grown exponentially. So has the importance of protecting...
Introduction and Abstract In an era of evolving cyber practices and new technology, the way we authenticate users must evolve as attackers do. For decades, passwords have been the standard defense, yet today they are the weakest link in securing any system. Recognizing this, the National Institute of Standards and...
In today’s complex regulatory landscape, organizations often face overlapping compliance demands. SOC 2, governed by the American Institute of Certified Public Accountants (AICPA), evaluates controls related to the Trust Services Criteria (TSC). ISO (International Organization for Standardization) 27001, on the other hand, is an international standard for establishing, implementing, and...
A SOC 2 examination is an attest engagement that assesses an organization’s suitable design (Type 1) and the operational effectiveness (Type 2) of its internal controls to meet its service commitment and system requirements under the American Institute of Certified Public Accountants’ trust services criteria including security, availability, processing integrity,...
Compliance is critical for organizations that want to operate securely and confidently, but it’s not something you have to tackle alone. That’s why Synergy IT Solutions and FoxPointe Solutions are teaming up to provide a comprehensive approach to achieving compliance requirements. In our projects, Synergy focuses on managing compliance from...
For both cybersecurity experts and organizational leaders, remaining stagnant is not viable. Actively striving for ongoing improvement and innovation is essential to protect organizations from the constantly evolving risks inherent in a cyber-driven environment. Fostering a culture of ongoing research and advancement involves motivating teams to learn from achievements and...
Happy Compliance Week! As we look back and reflect on our compliance programs during Compliance Week 2025, it is a good time for us here at The Bonadio Group to share some of our top findings over the course of the year. You cannot use a “set it and forget...
Abstract Agentic AI is rapidly moving from concept to enterprise adoption, bringing new risks that traditional compliance frameworks were not designed to address. ISO/IEC 42001, the world’s first AI governance standard, is emerging as the go-to framework for organizations that want to manage AI responsibly. At the same time, PCI...
Unless you just woke up from a 5-year coma, you’ve no doubt heard of how artificial intelligence (AI) and large language models (LLM) have ushered in an era of enhanced productivity, creativity, and shareholder value. AI agents and LLMs are being developed and employed across the globe for use by...
This Article is written by Geoffrey Lange, Sales Executive and Higher Education Leader. As cyber threats evolve, your policy should too. Cyberattacks are no longer a distant possibility—they’re a near certainty. According to Forbes, small and mid-sized businesses (SMBs) should seriously consider cyber insurance because: 1. Cyberattacks are inevitable –...