Compass IT Compliance Blog / Government (3)

An Introduction to CMMC Compliance

An Introduction to CMMC Compliance

On January 31st, 2020, the Department of Defense (DoD) announced the release of the Cybersecurity Maturity Model Certification (CMMC), a framework aimed at assessing and enhancing the cybersecurity posture of the Defense Industrial Base (DIB), as it relates to Controlled Unclassified …

Read Story

Protecting SCADA Systems from Cyber-Attacks

Protecting SCADA Systems from Cyber-Attacks

Supervisory control and data acquisition (SCADA) is a control system architecture comprising computers, networked data communications and graphical user interfaces (GUI) for high-level process supervisory management, while also comprising other peripheral devices like programmable log …

Read Story

VA Data Breach Exposes the Personal Info of 46,000 Veterans

VA Data Breach Exposes the Personal Info of 46,000 Veterans

Being hacked is unfortunately still an all too common occurrence. Even as security measures get stronger, reports of breaches and compromises of individual’s personal information do not seem to be slowing down.

Read Story

Can the Election Be Hacked?

Election Hacking

The presidential election is less than three months away and questions revolving around the overall security of the electoral process should be on everyone’s mind. Let us discuss some areas that may be susceptible to hacking. I will be assigning a threat level based on my own professi …

Read Story

New York Files First 23 NYCRR 500 Enforcement Action

New York Files First 23 NYCRR 500 Enforcement Action

On July 21st, 2020, the New York Department of Financial Services (NYDFS) announced that it had filed its first enforcement action under the 23 NYCRR 500 cybersecurity regulation against First American Title Insurance, a large title insurance provider headquartered in Santa Ana, Calif …

Read Story

CMMC: Moving Away from Self-Assessments

A woman takes notes next to a laptop

The Cybersecurity Maturity Model Certification (CMMC) is a certification procedure developed by the Department of Defense (DoD) to certify that contractors working with the DoD have the controls in place to protect sensitive data, also referred to as controlled unclassified informatio …

Read Story

Subscribe by email