Navigant's Cyber Risk and Information Security PracticeLearn More

Blog

Blog Posts

View Article

It would not surprise me if you have never heard the term “the internet of things” (IoT), meant to encompass the plethora of devices that can communicate with the internet.  The category of gadgets is growing, personally, I’ve added a third. My top choice is the cell phone, “mother of all internet of things,” and […]

Learn More
View Article

Phase 2 Audits for the Health Insurance Portability and Accountability Act (HIPAA) are currently underway and medical practices should be aware that the Office of Civil Rights (OCR) is targeting an increasingly broad range of covered entities and business associates. This comprehensive approach is likely to continue when they begin Phase 3 Audits. HIPAA is […]

Learn More
View ArticleNBOA_Cyber Security in Schools

Last week approximately 400 independent private school information technology (IT) professionals gathered in Los Angeles for the 2017 Association of Technology Leaders in Independent Schools (ATLIS) annual conference. I had the honor of presenting during the Sunday cyber security workshop and leading a cyber security risk management session on Monday.  The goals of the sessions […]

Learn More
View Article

According to the latest figures from the FBI, Business Email Compromise (BEC) schemes have resulted in at least $3.1 billion in losses to approximately 22,000 enterprises in 79 countries over the past two years. A BEC is generally a low cost, low risk scam carried out by hackers. This cyber-attack typically has a high rate […]

Learn More
View Article

In early 2017, The New York State Department of Financial Services (DFS) released the “Cybersecurity Requirements for Financial Services Companies” with an effective date of March 1, 2017. This is the first state level regulation that mandates financial service firms implement and maintain a robust and ongoing cybersecurity program. It is anticipated that other states […]

Learn More
View ArticleTop 10 Conference Takeaways

Developing a practical and effective cyber security plan is vital to incorporating security into your organization’s risk management strategy. A common misconception is that a cyber security plan is lengthy and difficult to follow. However, that does not have to be the case. Below are COMPASS’ recommended 5 steps for your cyber security plan. Threat […]

Learn More
Work With Us Learn How