The Healthcare Industry Remains a Favorite for Cyber Criminals
by Nicholas Foisy on March 27, 2023 at 9:30 AM
If you have had any exposure to news headlines over the past decade, it would come as no surprise to you that the healthcare industry has been one of the sectors most targeted by hackers and cyber criminals.
What Does a Passwordless Future Look Like?
by Nicholas Foisy on July 28, 2022 at 1:00 PM
Passwords have served as a critical element in the work we do here at Compass IT Compliance since our founding over a decade ago. Whether it is educating individuals on the best practices for developing strong passwords, creating a password policy, utilizing automated programs to atte …
Receiving a Scam Text… From My Own Phone Number
by Nicholas Foisy on March 30, 2022 at 5:00 PM
Throughout my years working in the IT security and compliance field I have had the opportunity to learn about dozens of different social engineering attack strategies that malicious actors will utilize to achieve their goals. This past weekend, I had the unique opportunity to witness …
Cyberattacks on the Rise – Everyone Pays the Price!
by Nicholas Foisy on October 30, 2020 at 1:00 PM
It is no secret that cyberattacks have been rising over the past decade. A 2019 Accenture and Ponemon Institute report found that security breaches increased by 11% since 2018 and 67% since 2014. To meet this rising challenge/opportunity, cyber liability insurance (cyber insurance) ha …
New York Files First 23 NYCRR 500 Enforcement Action
by Nicholas Foisy on August 20, 2020 at 1:00 PM
On July 21st, 2020, the New York Department of Financial Services (NYDFS) announced that it had filed its first enforcement action under the 23 NYCRR 500 cybersecurity regulation against First American Title Insurance, a large title insurance provider headquartered in Santa Ana, Calif …
CMMC: Moving Away from Self-Assessments
by Nicholas Foisy on July 2, 2020 at 1:00 PM
The Cybersecurity Maturity Model Certification (CMMC) is a certification procedure developed by the Department of Defense (DoD) to certify that contractors working with the DoD have the controls in place to protect sensitive data, also referred to as controlled unclassified informatio …