Navigating the Changes in NIST CSF 2.0

By CompliancePoint | February 27, 2024

On February 26, 2024, the National Institute of Standards and Technology (NIST) released the NIST Cybersecurity Framework (CSF) 2.0. The…

DoorDash Fined for CCPA Violations

By Matt Dumiak | February 23, 2024

California Attorney General Rob Bonta reached a $375,000 settlement with DoorDash, after allegations that the food delivery company violated the…

Do Not Disturb Act Proposes TCPA Amendments & AI Disclosures

By CompliancePoint | February 23, 2024

House bill H.R.7116, named the Do Not Disturb Act, introduced to Congress in January proposes significant changes to the TCPA,…

West Virginia Lawmakers Propose New Telemarketing Restrictions

By Kara Urbaniak | February 20, 2024

Two new bills proposed in West Virginia would restrict telemarketing practices. Introduced in late January, these bills mirror many of…

DoD Releases Video Detailing CMMC

By CompliancePoint | February 16, 2024

The public comment period for the proposed Cybersecurity Maturity Model Certification (CMMC) rule is open until February 26, 2024. To…

Mitigating Internal Security Threats in Healthcare

By Carol Amick | February 14, 2024

Over the past several years healthcare organizations have received warnings from the Department of Health and Human Services (HHS), the…

The First CPRA Regulations are Now Enforceable

By Matt Dumiak | February 13, 2024

The California Privacy Protection Agency (CPPA) can begin enforcing the first group of California Privacy Rights Act (CPRA) amendments to…

FCC Cracks Down on AI-generated Voices in Robocalls

By Kevin Mayfield | February 9, 2024

The Federal Communications Commission (FCC) took action to stop the use of AI-generated voices in unsolicited robocalls. The Commission voted…

HITRUST Policy and Procedure Documentation Requirements

By Carol Amick | February 7, 2024

If you are considering a HITRUST Risk-Based, 2-year (r2) Assessment one of the areas you will need to evaluate is…

Getting Started with Penetration Testing

By Matt Lawson | February 7, 2024

What is Penetration Testing Penetration testing is a common procedure and an important element of an effective cybersecurity program. A…

Finding a credible expert with the appropriate background, expertise, and credentials can be difficult. CompliancePoint is here to help.

Our Clients

Copyright © 2026 CompliancePoint, Inc. All Rights Reserved | Privacy Statement | Accessibility | Disclosure | Trust | Sitemap

PossibleNOW - a sister company

Connect with us on social media