Compass IT Compliance Blog

What Is DNSSEC, and How Does It Secure Your DNS?

What Is DNSSEC

The DNS (domain name system) is the backbone of the Internet. It enables core functionalities like mapping IP addresses to domain names that are so commonly used today.

Read Story

New CJIS Requirements: What You Need to Know

CJIS Updates

In a recent Compass IT Compliance blog, we delved into the fundamentals of the Criminal Justice Information Services (CJIS) Security Policy (CSP), its applicability, and the criticality of CJIS Compliance, terminology, and the thirteen policy areas applicable at the time of that writi …

Read Story

Staying HIPAA Compliant While Leveraging Telehealth

Telehealth Doctor

In the rapidly evolving landscape of healthcare, telehealth has emerged as a pivotal technology, offering unprecedented convenience and accessibility to patients and providers alike. However, as healthcare organizations increasingly adopt these digital health services, the imperative …

Read Story

NIST Cybersecurity Framework 2.0 – Key Takeaways

United States Department of Commerce

Last week, the National Institute of Standards and Technology (NIST) unveiled the second version of its Cybersecurity Framework (CSF), marking the first major new updates to NIST CSF since the framework's inception ten years ago. Initiated by Executive Order 13636, the development of …

Read Story

Multi-Factor Authorization (MFA) During Cellular Network Outage

Cell Tower Outage

Multi-factor authentication (MFA) stands as a crucial safeguard in thwarting unauthorized access to accounts. Traditionally, one of the most widespread practices has been the use of a mobile device as a key component in this security measure. Users typically receive a one-time passwor …

Read Story

How to Identify Phishing & Online Security Breach Attempts

Phishing Attempts

In today's digital era, cybercrime is escalating at an alarming rate. Numerous studies indicate a continued upward trend in these incidents. Alarmingly, millions fall victim annually, often unaware of the breach.

Read Story

Subscribe by email