What Is DNSSEC, and How Does It Secure Your DNS?
by George Zapata on March 22, 2024 at 1:30 PM
The DNS (domain name system) is the backbone of the Internet. It enables core functionalities like mapping IP addresses to domain names that are so commonly used today.
New CJIS Requirements: What You Need to Know
by Kelly O’Brien on March 20, 2024 at 2:45 PM
In a recent Compass IT Compliance blog, we delved into the fundamentals of the Criminal Justice Information Services (CJIS) Security Policy (CSP), its applicability, and the criticality of CJIS Compliance, terminology, and the thirteen policy areas applicable at the time of that writi …
Staying HIPAA Compliant While Leveraging Telehealth
by Patrick Hughes on March 13, 2024 at 3:00 PM
In the rapidly evolving landscape of healthcare, telehealth has emerged as a pivotal technology, offering unprecedented convenience and accessibility to patients and providers alike. However, as healthcare organizations increasingly adopt these digital health services, the imperative …
NIST Cybersecurity Framework 2.0 – Key Takeaways
by Derek Boczenowski on March 7, 2024 at 1:30 PM
Last week, the National Institute of Standards and Technology (NIST) unveiled the second version of its Cybersecurity Framework (CSF), marking the first major new updates to NIST CSF since the framework's inception ten years ago. Initiated by Executive Order 13636, the development of …
Multi-Factor Authorization (MFA) During Cellular Network Outage
by Peter Fellini on February 28, 2024 at 4:15 PM
Multi-factor authentication (MFA) stands as a crucial safeguard in thwarting unauthorized access to accounts. Traditionally, one of the most widespread practices has been the use of a mobile device as a key component in this security measure. Users typically receive a one-time passwor …
How to Identify Phishing & Online Security Breach Attempts
by William DePalma on February 26, 2024 at 2:00 PM
In today's digital era, cybercrime is escalating at an alarming rate. Numerous studies indicate a continued upward trend in these incidents. Alarmingly, millions fall victim annually, often unaware of the breach.