Protecting our clients' data & best interests since 1988.
Today, cybersecurity is more than just having the right technology. As threats and rules change, organizations need to be proactive, not just reactive. A structured cybersecurity maturity assessment framework empowers leaders to evaluate their risk posture, prioritize improvements, and align operations with global standards such as CMMC Cyber Security, NIST, and ISO 27001.
The DEC and DOH now require all water and wastewater utilities in New York state to follow basic cybersecurity standards. The focus is sustained protection rather than a one-time exercise, and these requirements align with federal cybersecurity guidance.
Disaster recovery, business continuity, and incident response plans are no longer ‘nice to have’; they are core disciplines for achieving cyber resilience. Organizations that can detect, contain, and quickly recover from disruptions are better positioned to protect revenue, customer trust, and shareholder value.
Starting October 1, 2026, Connecticut’s new bill, Raised Bill No. 117, will require organizations to hire outside forensic experts and submit a detailed report to the state if they discover a data breach affecting at least 100,000 Connecticut residents. This only applies to Connecticut residents and excludes non-CT residents. For organizations across the U.S. handling Connecticut resident data, a single large breach could trigger Connecticut’s requirements regardless of location.
Since the U.S. Department of Defense labeled Anthropic, the maker of Claude AI, a “supply chain risk,” the current administration has blacklisted Anthropic across all federal agencies after a disagreement about how the military can use the Claude platform. Anthropic refused to remove certain safeguards that block mass surveillance of Americans or powering fully autonomous weapons which resulted in the Pentagon putting Anthropic on a blacklist for all future defense work. Meanwhile, Claude became the top app on Apple’s U.S. App Store, even as the federal government ban took hold.
Recent industry reports indicate that, although global ransomware activity decreased slightly toward the end of 2025, the overall risk to organizations has not substantially declined. Attackers used the breathing room created by stronger backups and incident response capabilities to refine their operations, focusing on stealth, precision, and higher leverage over fewer but more lucrative victims.