On February 26, 2024, the National Institute of Standards and Technology (NIST) released the NIST Cybersecurity Framework (CSF) 2.0. The…
California Attorney General Rob Bonta reached a $375,000 settlement with DoorDash, after allegations that the food delivery company violated the…
House bill H.R.7116, named the Do Not Disturb Act, introduced to Congress in January proposes significant changes to the TCPA,…
Two new bills proposed in West Virginia would restrict telemarketing practices. Introduced in late January, these bills mirror many of…
The public comment period for the proposed Cybersecurity Maturity Model Certification (CMMC) rule is open until February 26, 2024. To…
Over the past several years healthcare organizations have received warnings from the Department of Health and Human Services (HHS), the…
The California Privacy Protection Agency (CPPA) can begin enforcing the first group of California Privacy Rights Act (CPRA) amendments to…
The Federal Communications Commission (FCC) took action to stop the use of AI-generated voices in unsolicited robocalls. The Commission voted…
If you are considering a HITRUST Risk-Based, 2-year (r2) Assessment one of the areas you will need to evaluate is…
What is Penetration Testing Penetration testing is a common procedure and an important element of an effective cybersecurity program. A…
Finding a credible expert with the appropriate background, expertise, and credentials can be difficult. CompliancePoint is here to help.
Our Clients
Copyright © 2026 CompliancePoint, Inc. All Rights Reserved | Privacy Statement | Accessibility | Disclosure | Trust | Sitemap
Connect with us on social media
