An Early Look at CMMC 2.0

May 23, 2023

Update: This article has been updated to reflect the DoD’s publication of the draft CMMC Proposed Rule (CMMC 2.0). The…

Read More

Conducting a GLBA Risk Assessment

May 1, 2023

Under the latest version of the Gramm-Leach-Bliley Act (GBLA) Safeguards Rule, element two is the requirement to conduct a risk…

Read More
GLBA cybersecurity requirements

GLBA Cybersecurity Requirements: What Your Organization Needs to Do

April 25, 2023

On June 9, 2023, new Gramm-Leach-Bliley Act (GLBA) cybersecurity requirements that reflect updates to the Safeguards Rule component of the…

Read More

Protecting Your Data When it’s in the Hands of a Third-party

February 6, 2023

Auto-maker Nissan sent out a breach notification letter to approximately 18,000 people, notifying them that personal information had been leaked…

Read More

Ohio Supreme Court Rules Insurance Provider Not Required to Cover Cyber-attack Costs

January 12, 2023

The seven justices of the Ohio Supreme Court unanimously ruled that an insurance company was not required to cover the…

Read More

Implementing Phishing-resistant MFA

November 30, 2022

Phishing attacks continue to make news around the country. Businesses of all sizes have fallen prey, suffering damaged reputations and…

Read More

Lessons from the Uber CISO Conviction

November 2, 2022

The guilty verdict handed down to former Uber Chief Information Security Officer Joseph Sullivan has made waves in the cybersecurity…

Read More

The Benefits of a Virtual CISO

October 11, 2022

Most organizations recognize the importance of cybersecurity and have implemented some form of protection. Despite this, cyber-attacks are still happening,…

Read More

Solving Cyber Security Staffing Challenges

August 30, 2022

All organizations, regardless of their size, location, or industry, seem to have one thing in common, Cyber Security staffing challenges.…

Read More

Foreign Cyber Attacks: Are Your Defenses Up?

July 20, 2022

Recent foreign cyber attacks, allegedly executed or backed by governments that have adversarial relationships with the United States, have made…

Read More

Finding a credible expert with the appropriate background, expertise, and credentials can be difficult. CompliancePoint is here to help.