Skip to main content
FoxPointe FoxPointe
  • Services
    • Compliance
    • Penetration Testing
    • General Consulting
    • Virtual Chief Information Security Officer (vCISO)
  • About Us
    • Management Team
    • Credentials
    • Careers
  • Resources
    • Events
    • News
    • Videos
    • Whitepapers
  • Blog
  • Contact Us
FoxPointe
  • Services
    • Compliance
    • Penetration Testing
    • General Consulting
    • Virtual Chief Information Security Officer (vCISO)
  • About Us
    • Management Team
    • Credentials
    • Careers
  • Resources
    • Events
    • News
    • Videos
    • Whitepapers
  • Blog

Enter Keywords

FoxPointe Security Hub

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

Subscribe Now

Measuring the Costs of Cyber Risk; Applying Lean Six Sigma Methodologies for a Customer's First Mindset

March 3, 2021
The year 2020 will be forever remembered for the impacts of how the global pandemic forced the adoption of innovative production, logistics, and workforce solutions. Many best practices emerged from the experiences of COVID-19, we continue to learn that these new methods can pay significant…

5 Steps to Take When You’re a Victim of Identity Theft

February 17, 2021
In our increasingly digital world, individual’s personal information resides on hundreds, if not thousands, of servers across the globe resulting in a huge rise in identity theft. Defined as “the crime of obtaining the personal or financial information of another person to use their…

The SolarWinds Hack – It’s Time to Change the Way We Think About Cybersecurity

February 4, 2021
With many still reeling from the aftermath of the SolarWinds hack, enough dust has settled that we’ve started to ask the important questions: How did this happen? What can we do to prevent this in the future? And will it happen again? The good news is that this cyber attack is incredibly…

Considering the Value of Leveraging a Virtual Chief Information Security Officer (vCISO)

January 7, 2021
This post originally appeared on Security Magazine. Ensuring the confidentiality, integrity, and availability of information must be at the forefront of any business in today’s environment. While many think they are up to this task, there’s a lot that goes into protecting data.…

Emergency Directive 21-01

December 15, 2020
The Department of Homeland Security has issued this emergency directive. “DHS DIRECTIVE 21-01 - Treat all hosts monitored by the SolarWinds Orion monitoring software as compromised by threat actors and assume that further persistence mechanisms have been deployed." Visit the DHS Website and…

Major Data Breach May Impact Over 200 Million Accounts: Protect Yourself Today

November 19, 2020
FoxPointe Solutions has been closely following the major data breach that was recently announced involving Cit0day, as well as the subsequent analyses to accurately identify the true risk levels that could be associated with it. Following the emergence of updated forensic reports, it has been…

HITRUST®: Changes Due to COVID-19

November 6, 2020
Like almost every organization doing business in 2020, HITRUST® has had to adopt some changes due to the COVID-19 Pandemic. As the year progressed and we were able to see the long-term impact that COVID-19 has caused, we began to see changes in guidelines and options for HITRUST-related…

Multiple United States Federal Agencies Identify “Imminent” Ransomware Threat to Hospitals and Healthcare Providers

October 30, 2020
Credible information regarding a well-known Russian cybercriminal organization plotting a mass ransomware attack across the United States healthcare industry led officials from the Federal Bureau of Investigation and the Department of Homeland Security to formally warn industry executives of the…

Cyber Threats Remain One of the Largest Threats to our Nation

October 26, 2020
From the nation’s shift to a remotely working culture to the upcoming elections we must maintain our awareness to the importance of Information Security. So far in 2020, there are many significant breaches that remind us of the importance of remaining information security aware and protective…

A Ransomware Guide Summarizing Cybersecurity & Infrastructure Security

October 19, 2020
In 2020, protecting an organization from cyber-attacks means that you need a plan to combat ransomware. Ransomware infections can be expensive, and costs can encompass more than just financial decisions. Paying a ransom to retrieve encrypted data is never an ideal situation and the cost to do so is…

Cybersecurity Awareness Month

October 1, 2020
Every October since 2004 marks National Cybersecurity Awareness Month. This month raises awareness about the importance of cybersecurity and how to protect yourself from cybercrime. Reduce Your Cyber Risk Below are the top 5 things you can do to safeguard yourself: Do not ignore operating system or…

Phishing Campaign Spoofs SBA Loan Offer

September 15, 2020
Phish - SpearPhish now VISH! DON’T GET HOOKED Now is the time to reassess your cybersecurity program and your Computer Security Incident Response Program (CSIRP). The alert below from the FBI and CISA details the VISH risk, but it is up to you to get protected! As always – please let us…

Lawsuits Continue for Albany-Based Accounting Firm That Suffered Data Breach in December 2019

August 13, 2020
As was originally reported by the technology website Ars Technica and by several Albany, NY-based business and news publications such as Times Union, an Albany-based accounting firm recently suffered a ransomware attack most likely from the ransomware ring known as Maze. Maze and other ransomware…

TikTok and the Red Dragon: China’s Cyber-Intelligence Practices Under Increased Scrutiny

July 20, 2020
While the majority of America’s attention is undoubtedly currently focused on issues of race and the ongoing COVID-19 pandemic, two weeks ago, India made a decision that has far-reaching global implications. In a press release issued on June 29th, the Press Information Bureau of India…

Importance of a Penetration Test

June 8, 2020
Our globe is linked through a fragile network that deals with healthcare, government, banking, and corporate data, while DoS attacks, website defacement, and other cyber-attacks are on the rise. The number of phishing attacks alone has skyrocketed over the last few years. Cyber Risk By the Numbers…

Vendor Management – Remaining Diligent During COVID-19

May 20, 2020
COVID-19 has introduced many challenges to personal and professional lives. While we continue to adapt, we must remember to continue to perform sound security and privacy practices, including when it comes to vendor management. We look to vendors as trusted partners for many aspects of our supply…

Finding a Cure for Ransomware

April 30, 2020
The 2020 Global Security Report, issued by cybersecurity and managed service provider, Trustwave, is an annual report detailing facts and trends observed in the world of information security. This annual report analyzed the threats and statistics observed throughout the world in 2019, and the…

COVID-19 Email Phishing Against US Healthcare Providers

April 27, 2020
The toll on life in the United States and the world left by COVID-19 has been great. The impact on our families, health, businesses, and the world economy will be felt by many for years to come. Hospitals of every type — private and public, urban and rural — are especially paying a heavy…

Apple and Google COVID-19 Contact Tracing a Potential for Security and Privacy Concerns

April 16, 2020
You know you are living in a crazy time when there is a pandemic consuming the entire world and it mysteriously causes all the toilet paper to disappear off the shelves. But the true indication of craziness is when Apple and Google, notorious technology rivals, come together for the common good and…

How Cyber Criminals are Taking Advantage of COVID-19

April 1, 2020
As part of our everyday lives, both in and out of the workplace, having a heightened awareness for information security is getting more important by the day. As innovation in technology heavily influences how our government, business, and day to day lives operate, new potential methods of…
  •   
  •   
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 4 / 6
  •   
  •   
  • Topics
  • Authors
  • Data Security (15)
  • Data Privacy (15)
  • Compliance (5)
  • Risk Management (10)
  • Cybersecurity Alert (7)
  • Cybersecurity (27)
  • Archive (34)
  • Charlie Wood | PCI QSA, CISA, CRISC, CISM
  • Carl Cadregari | CISA, CCSFP, CTPRP
  • Brandon Agostinelli
  • Courtney Caryl | CCSFP, CHQP
  • Allison Hall | PCIP, CCSFP
  • Christopher Salone | MBA
  • Grace Walker | CPA, CCSFP, CHQP
Let us show you how we can help
Request Quote
FoxPointe

171 Sully's Trail
Pittsford, NY 14534

Call 844-726-8869
or Contact Us

Subscribe to the Blog

Services
CompliancePenetration TestingGeneral ConsultingIT AuditVirtual Chief Information Security Officer (vCISO)
Company
Management TeamAbout UsBlogCareersPrivacy Policy
©2023 FoxPointe
Website by Corporate Communications, Inc.
We use cookies and other technologies to optimize site functionally, analyze website traffic, and share information with our service and analytics partners. To view our Privacy Policy, which discusses cookies, click here. By continuing to use & browse our services, you agree to our Privacy Policy, our use of cookies, and the Terms and Conditions.