Skip to main content
FoxPointe FoxPointe
  • Services
    • Cyber Risk, Assurance and Compliance
    • IT Audit
    • Penetration Testing
    • General Consulting
    • Virtual Chief Information Security Officer (vCISO)
  • About Us
    • Management Team
    • Credentials
    • Careers
  • Resources
    • Events
    • News
    • Videos
    • Whitepapers
  • Blog
  • Contact Us
FoxPointe
  • Services
    • Cyber Risk, Assurance and Compliance
    • IT Audit
    • Penetration Testing
    • General Consulting
    • Virtual Chief Information Security Officer (vCISO)
  • About Us
    • Management Team
    • Credentials
    • Careers
  • Resources
    • Events
    • News
    • Videos
    • Whitepapers
  • Blog

Enter Keywords

FoxPointe Security Hub

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

Subscribe Now

MitM Attacks and How to Prevent Them

May 17, 2023
This article was written by Ryan Krawczyk, Security Consultant I at FoxPointe Solutions Man-in-the-Middle Attack Phishing and malware attacks have become well known methods of cyber security attacks. But there is another,  less common, but equally dangerous method of attacking:…

Cybersecurity Laws, Regulations and Guidance for Financial Institutions: A Year in Review

May 8, 2023
This article was written by Christopher Salone, CISA, CCSFP, MBA As another year passes, more cybersecurity laws and regulations for financial institutions are proposed and or updated. Let’s recap the last twelve months and look at some of the most impactful cyber regulatory updates that,…

Side Channel Attacks & How to Prevent Them

April 26, 2023
This article was written by Jessica Ramirez, Security Consultant at FoxPointe Solutions. In 2018, one of the most well-known side-channel attacks was discovered. The Spectre and Meltdown attack was noteworthy because of how the exploitation affected almost every modern computer processor using…

What the Audit Committee Really Wants to Know

March 31, 2023
This article was written by Christopher Salone, CISA, CCSFP, MBA After years of presenting to Audit Committees, you develop effective ways of communicating not only the results of your IT Audits, but also the health and state of the Organization as a whole.  Frequently, I find that at the end…

Risks and Difficulties Associated with Multi-Factor Authentication

March 14, 2023
This article was written by Brandon Agostinelli. The Cybersecurity and Infrastructure Security Agency (CISA) defines Multi-factor authentication (MFA) as: “a layered approach to securing data and applications where a system requires a user to present a combination of two or more credentials to…

What is Artificial Intelligence (AI) and How Does it Relate to Cybersecurity?

March 2, 2023
This article was written by James Normand, Security Consultant at FoxPointe Solutions With the rise of ChatGPT, deepfakes, and AI-generated art, many people are being exposed to the black box that is advanced computer science.  While the inner workings of AI algorithms are known to their…

SOC2 Fireside Chat: The Practical Approach To Soc2 Reporting For Small Businesses

February 24, 2023
SOC2 Fireside Chat with Charlie Wood of FoxPointe Solutions, a division of The Bonadio Group, Reg Harnish of OrbitalFire and Matt Farry of RealCISCO.

New Year – New Cybersecurity Laws – Federal Trade Commission Update to the GLBA Law May Affect Your Client

January 31, 2023
The FTC Safeguards Rule requires covered companies to develop, implement, and maintain an information security program with over 20 implemented, documented and risk assessed administrative, technical, and physical safeguards designed to protect customer information. Are your clients up on what the…

Best Practices for Employee Screening, Training and Testing to build a Cyber Resilient Workforce

January 30, 2023
Building a cyber resilient workforce for is critical to a cyber security program for all companies. According to Verizon’s 2022 Data Breach Investigations Report “This year (2022) 82% of breaches involved the human element. Whether it is the Use of stolen credentials, Phishing, Misuse,…

The Rise of SOC 2+ Reporting

January 24, 2023
by Allison Hall (Director) and Courtney Caryl (Manager), FoxPointe Solutions A SOC 2 Plus Additional Subject Matter (SOC 2+) engagement allows a service auditor to assess a service organization’s compliance with the American Institute of Certified Public Accountants’ (AICPA) SOC 2 Trust…

Important Tax Season Must Knows

January 3, 2023
By: Emily Mosack, Security Consultant at FoxPointe Solutions The end of the year and start of the new year mean tax season is approaching quickly. Tax season is one of the most active times for scammers. Thousands of people have become victims of tax scams and have lost millions of dollars as a…

Check Your Organization’s Sales Receipts (Or It Could Cost You Millions)

December 1, 2022
This article was written by Ryan Bigelow, Director at FoxPointe Solutions Background In the class action lawsuit Martin v. Safeway Inc., the plaintiff (Martin) alleged that Safeway printed receipts for credit or debit card transactions at its gas stations displaying first six (6) and last four (4)…

Access Management: Hidden Risks & Prevention

November 16, 2022
This article was written by Jessica Ramirez, Security Consultant at FoxPointe Solutions. In this day and age, the importance of having proper security controls in place is critical in order to reduce or mitigate the risk of cyberattacks. Due to the recent global pandemic, security breaches have…

A Spotlight on Careers in Cybersecurity

November 15, 2022
Cybersecurity Careers So, what do cybersecurity professionals do? According to Indeed, “working in cybersecurity means protecting company networks, data and various systems from digital attack.” Positions within cybersecurity can range from IT roles such as support specialist and…

Moving From “Trust but Verify” to Zero Trust Architecture- Part One

November 3, 2022
By Brandon Agostinelli, CISA, CCSFP; Christopher Salone, MBA, CISA, CCSFP; and Carl Cadregari, CISA, CTPRP   What is the Zero Trust Architecture? As our world changes and evolves, so does the way organizations operate. Business models change, and infrastructures and networks grow and become…

Does Your Silver Cloud Have a Dark Lining? Cybersecurity Challenges in an Interconnected World

October 19, 2022
In the ever-changing ecosystems that organizations operate in, business needs can change as rapidly as the weather. It’s abundantly clear that organizations must be agile so they can adapt and react to the business storms on the horizon. Budgetary constraints and increased transaction velocity…

Cybersecurity Risk and Medical Devices

October 12, 2022
Brandon Agostinelli – September 12, 2022 Within the healthcare industry, there is a variety of environments that utilize many different types of medical devices to deliver services to patients. As reliance on technology within the healthcare industry continues to grow, an increase in…

Remaining Cyber Secure While Traveling

October 5, 2022
On September 15, 2022, WebMD, a credible medical news source, issued a statement that the end of the COVID-19 pandemic is approaching.  The WebMD news brief noted that the World Health Organization reported COVID-19 deaths dropping to their lowest count since March 2020.  With the world…

October is Cybersecurity Awareness Month

September 27, 2022
Every October since 2004 marks National Cybersecurity Awareness Month. This month raises awareness about the importance of cybersecurity and how to protect yourself from cybercrime. Use multi-factor authentication wherever possible. Traditional authentication requires an ID and password,…

The Synergy Between Forensic Accountants and Cybersecurity Professionals

September 8, 2022
This article was written by Brendan Horton, Security Analyst at The Bonadio Group Small or large, it is not uncommon to hear about a new sophisticated attack carried out on an organization.  In the era of digital change, it is no surprise that threat actors have begun exploiting new…
  •   
  •   
  • 1
  • 2
  • 3
  • 4
  • 5
  • 1 / 5
  •   
  •   
  • Topics
  • Authors
  • Data Security (13)
  • Data Privacy (15)
  • Compliance (4)
  • Risk Management (8)
  • Cybersecurity Alert (7)
  • Cybersecurity (25)
  • Archive (34)
  • Charlie Wood | PCI QSA, CISA, CRISC, CISM
  • Carl Cadregari | CISA, CCSFP, CTPRP
  • Allison Hall | PCIP, CCSFP
  • Courtney Caryl | CCSFP, CHQP
Let us show you how we can help
Request Quote
FoxPointe

171 Sully's Trail
Pittsford, NY 14534

Call 844-726-8869
or Contact Us

Subscribe to the Blog

Services
Cyber Risk, Assurance and ComplianceIT AuditPenetration TestingGeneral ConsultingVirtual Chief Information Security Officer (vCISO)
Company
Management TeamAbout UsBlogCareersPrivacy Policy
©2023 FoxPointe
Website by Corporate Communications, Inc.
We use cookies and other technologies to optimize site functionally, analyze website traffic, and share information with our service and analytics partners. To view our Privacy Policy, which discusses cookies, click here. By continuing to use & browse our services, you agree to our Privacy Policy, our use of cookies, and the Terms and Conditions.