Skip to main content
FoxPointe FoxPointe
  • Services
    • Cyber Risk, Assurance and Compliance
    • IT Audit
    • Penetration Testing
    • General Consulting
    • Virtual Chief Information Security Officer (vCISO)
  • About Us
    • Management Team
    • Credentials
    • Careers
  • Resources
    • Events
    • News
    • Videos
    • Whitepapers
  • Blog
  • Contact Us
FoxPointe
  • Services
    • Cyber Risk, Assurance and Compliance
    • IT Audit
    • Penetration Testing
    • General Consulting
    • Virtual Chief Information Security Officer (vCISO)
  • About Us
    • Management Team
    • Credentials
    • Careers
  • Resources
    • Events
    • News
    • Videos
    • Whitepapers
  • Blog

Enter Keywords

  1. Home
  2. Resources
  3. News

News

Industry News

Authority Magazine: 5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity

April 6, 2022
An Interview With Tyler Gallagher, CEO and Founder of Regal Assets Click here for the original interview  As part of our series about “5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity”, I had the pleasure of interviewing…

CSO: Cheap and free cybersecurity training: 8 ways to build skills without breaking the bank

October 29, 2021
John Roman contributes his insights on how to take advantage of free webinars for additional learning opportunities. Cheap and free cybersecurity training: 8 ways to build skills without breaking the bank

Rochester Business Journal: Why Small to Mid-Sized Businesses are Perfect Targets for Hackers

September 20, 2021
Cyberattacks are a growing threat to small businesses.  John Roman contributes his insights on pages 11 and 12 on four ways small to mid-sized businesses can prevent themselves against such attacks.  Read the Article Please note: access to this article requires a subscription. You will be…

Dark Reading: 3 Misconceptions Around Cybersecurity Maturity Model Certification

August 24, 2021
Don't believe these myths surrounding Cybersecurity Maturity Model Compliance (CMMC). John Roman discusses what organizations really need to know in order to work with the US Department of Defense.  Read the article: …

Rochester Business Journal: Rep and warranty insurance a tight market due to heightened M&A activity

July 27, 2021
Carl Cadregari contributes his insights on pages 10 and 12 related to cyber insurance and risk in the RBJ’s Rep and warranty insurance a tight market due to heightened M&A activity Read the article. Please note: access to this article requires a subscription. You will be prompted for…

Security Magazine: Myth busting the cybersecurity maturity model certification

July 19, 2021
John Roman discusses the 3 myths around Cybersecurity Maturity Model Certification (CMMC) guidelines in Security Magazine. Read the article.

Computerworld: Data Hording - The Consequences Go Far Beyond the Compliance Risk

July 15, 2021
John Roman contributes his insights on data storage in the weekly advice column in Computerworld magazine that discusses how to use smart tech strategies to tackle modern business problems. Read the article.

Authority Magazine: How 5G Technology May Improve and Impact Our Lives

June 28, 2021
5G infrastructure is being installed around the world. At the same time, most people have not yet seen what 5G can offer. Learn as John Roman shares how 5G can impact and enhance our lives to Authority Magazine in the series: How 5G Technology May Improve and Impact Our Lives.

CNYBJ: Viewpoint: For You, It’s Tax Season; For Cybercriminals, It’s Open Season

May 17, 2021
Due to the higher rate of taxes being filed via online programs and virtual meetings with accountants this year, everyone must be diligent in protecting their private information. Learn about the necessary steps to prevent identity theft from Kimberly Hunter, CPA, ABV, CVA, Principal at The Bonadio…

CNYBJ: COVID-19 Changed Everything, Including Fraud and IT Risks

October 23, 2020
Contributing authors John Roman, CIO of The Bonadio Group and Tim Ball, VP of The Bonadio Group’s Government Compliance and Labor division provide their viewpoints on fraud and IT risks. Read more about this in an article from CNYBJ: COVID-19 Changed Everything, Including Fraud and IT Risks.…

Bank Info Security: FBI Warns- Credential Stuffing Attacks on the Rise

October 1, 2020
The FBI is warning organizations in the financial sector about an increase in botnet-launched credential stuffing attacks. Many of these attacks, which target APIs, are being fed by billions of stolen credentials leaked over the last several years. Read more about this report from Bank Info…

Cybersecurity Protections Are Essential, Now More Than Ever

July 22, 2020
As a contributing author, John Roman, Chief Information Officer of The Bonadio Group, provides insight for mitigating the risk associated with cybersecurity breaches with the inclusion of his “Top 10” recommendations list featured in this article.  Read more this article…

In A BYOD World, Everybody Needs Cybersecurity Chops

December 8, 2019
As cybersecurity faces increased challenges, it's no longer enough for only some members of an organization to be aware of the risks and be vigilant of possible threats. In the new culture of BYOD (Bring Your Own Device), organizations must prepare its entire workforce to better protect data,…

Filter by

  • Press Release
  • FoxPointe in the News
  • Industry News
  • Testimonials

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

Subscribe Now

Let us show you how we can help
Request Quote
FoxPointe

171 Sully's Trail
Pittsford, NY 14534

Call 844-726-8869
or Contact Us

Subscribe to the Blog

Services
Cyber Risk, Assurance and ComplianceIT AuditPenetration TestingGeneral ConsultingVirtual Chief Information Security Officer (vCISO)
Company
Management TeamAbout UsBlogCareersPrivacy Policy
©2022 FoxPointe
Website by Corporate Communications, Inc.
We use cookies and other technologies to optimize site functionally, analyze website traffic, and share information with our service and analytics partners. To view our Privacy Policy, which discusses cookies, click here. By continuing to use & browse our services, you agree to our Privacy Policy, our use of cookies, and the Terms and Conditions.