News

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

This article was written by Carl Cadregari, Executive Vice President. Regardless of the industry in which they operate, organizations have likely witnessed the wave of destructive MOVEit breaches sweeping the globe during recent months. As a result, many organizations may be left wondering what they need to understand about the MOVEit...

This article was written by Paul Mayer, Executive Vice President. The New York State Office of the Medicaid Inspector General (OMIG) considers an “effective compliance program” to be a compliance initiative that is adopted and implemented by the health-care provider that, at a minimum, satisfies compliance program requirements and is...

Jeffery Travis is a Director with the FoxPointe Solutions Information Risk Management Division of The Bonadio Group. He has over 25 years of experience in the information technology industry and says when it comes to generative AI and business, education is key. Read the Full Article Here

...

Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses. However, one popular cyber-attack method known as social engineering leverages human psychology to gather information and perform attacks instead. Read the Full Article

...

Maine-based consultancy to expand FoxPointe’s IT management and cybersecurity services Rochester, N.Y., 12, 4 2023 — FoxPointe Solutions, the dedicated information risk management division of Top 50 CPA firm The Bonadio Group, has welcomed Maine-based Travis Consulting Group to its consulting practice. The joining of the two cybersecurity consultancies will...

“The remote worker needs to understand that just because they’re not on the premises of the organization, that doesn’t abrogate them from having all the same responsibilities and meeting the policies and procedures of the organization when it comes to cybersecurity or data protection like they would at the office,”...

The adopted rules regarding Cybersecurity Risk Management, Strategy, Governance and Incident Disclosure by Public Companies.   These new rules include critical new factors that leaders of public companies must be aware of, namely the new requirement for registrants to disclose all material cybersecurity incidents. Chris Salone contributes his expertise to Insightful...

“AI-driven cybersecurity threats are developing at a place that we have not seen before due to advancements in machine learning and the ability to amplify existing attack methodologies,” said Brendan Horton, a Security Analyst, click to read more. The RBJ does require a log in. Read the Full Article

...

Chris Salone talks about the U.S. Securities and Exchange Commission/s (SEC) proposed new rules and amendments that standardize cybersecurity-incident reporting and risk-management strategies.   You will be prompted for log in information.   Read the article here on CNYBJ

...

Health and human service organizations possess an abundance of protected health information (PHI), by the simple nature of their operations. With phishing, smishing, ransomware, and other dangerous cyberattacks on the rise, the threat posed to these organizations has never been higher. As a result, many government agencies—including the U.S. Department of Health & Human...