Compass IT Compliance Blog

New York Files First 23 NYCRR 500 Enforcement Action

New York Files First 23 NYCRR 500 Enforcement Action

On July 21st, 2020, the New York Department of Financial Services (NYDFS) announced that it had filed its first enforcement action under the 23 NYCRR 500 cybersecurity regulation against First American Title Insurance, a large title insurance provider headquartered in Santa Ana, Calif …

Read Story

IT Asset Management – Monitoring and Maintaining Assets

A workstation with a white coffee mug

It has been a few months since my last blog post about IT asset management was published. Daily events are causing rapid changes that organizations are having to adapt to, leaving IT leaders asking, “how do I account for all of my equipment”? This can be accomplished in a variety of w …

Read Story

Blackbaud Breach – Time to Review Your Vendors

Blackbaud Breach – Time to Review Your Vendors

It has recently been reported that Blackbaud, one of the world’s largest providers of education administration, fundraising, and financial management software for nonprofits suffered a ransomware attack back in May of 2020.

Read Story

Virtual Meeting Privacy & Consent

Virtual Meeting Privacy & Consent

Virtual workplace meetings are fantastic – a true time and money saver. No makeup, no pants, no shoes, no driving, no hassle! Big props to technology on that one.

Read Story

Security Oversight with Managed Service Providers

Security Oversight with Managed Service Providers

The outsourcing of information technology (IT) functions has become incredibly common with businesses, especially among small and medium sized companies. There are many benefits to outsourcing IT. For one, the cost is normally much lower than hiring even a single employee to manage IT …

Read Story

CMMC: Moving Away from Self-Assessments

A woman takes notes next to a laptop

The Cybersecurity Maturity Model Certification (CMMC) is a certification procedure developed by the Department of Defense (DoD) to certify that contractors working with the DoD have the controls in place to protect sensitive data, also referred to as controlled unclassified informatio …

Read Story

Subscribe by email