FoxPointe Security Hub

information technology

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

This article was written by Brendan Horton Security Analyst at The Bonadio Group Small or large it is not uncommon to hear about a new sophisticated attack carried out on an organization nbsp In the era of digital change it is no surprise that threat actors have begun exploiting new...

This blog was written and produced by Nick Cozzolino CISSP Director of Information Security at The Bonadio Group FoxPointe Solutions is The Bonadio Group 8217 s dedicated cybersecurity division Looking to get in touch with Nick Reach out today Nick Cozzolino ncozzolino bonadio com Data is the new oil We...

Is your organization involved in HITRUST or looking to take that path in the near future If so there are some important changes to be aware of that may change your timeline and approach Throughout each year HITRUST releases Advisories as needed in one of two categories Assurance Change Advisories...

What is a SOC 1 Report A SOC 1 report also known as the Statement on Standards for Attestation Engagements SSAE 18 focuses on a service organization s controls that are likely to be relevant to an audit of a user entity s customer s financial statements SOC 1 reports...

The year 2020 will be forever remembered for the impacts of how the global pandemic forced the adoption of innovative production logistics and workforce solutions Many best practices emerged from the experiences of COVID 19 we continue to learn that these new methods can pay significant dividends in 2021 and...

In our increasingly digital world individual s personal information resides on hundreds if not thousands of servers across the globe resulting in a huge rise in identity theft Defined as the crime of obtaining the personal or financial information of another person to use their identity to commit fraud or...