Stay ahead of the curve with the latest news, ideas and resources on all things Identity Assurance and Passwordless.
The Cost of NYDFS Cybersecurity Noncompliance: What You Need to Know in 2026
Highlights:
- The New York Department of Financial Services (NYDFS) has increased enforcement of 23 NYCRR Part 500, its cybersecurity regulation.
- Covered entities must implement phishing-resistant MFA, maintain up-to-date risk assessments, and report breaches within 72 hours.
- Annual compliance certification is due by April 15, 2026.
- Healthplex's $2 million fine illustrates the financial and reputational consequences of failing to comply.
- Beyond fines, noncompliance can cause operational disruption, legal liabilities, and permanent brand damage.
- New in 2026: stricter third-party service provider oversight, expanded CISO accountability, and enhanced incident response requirements are now in full effect.
Roman Kadinsky, Cofounder, President & COO, HYPR
7 Min. Read | August 14, 2025
The New York State Department of Financial Services (NYDFS) has long been a leader in setting cybersecurity standards for the financial services and insurance sectors. Under 23 NYCRR Part 500, regulated entities are required to implement a comprehensive cybersecurity program that addresses governance, access controls, incident response, and ongoing risk management.
As we move into 2026, NYDFS has made clear that enforcement is not slowing down. The $2 million settlement with Healthplex, Inc. — announced in August 2025 — remains a defining case study in the cost of noncompliance, and regulators have signaled that scrutiny will only intensify as new requirements come into full effect. For all covered entities, the April 15, 2026 annual certification deadline is fast approaching, and now is the time to assess readiness.
What you need to know about NYDFS Cybersecurity Regulations
Part 500 applies to most banks, insurers, and financial service providers operating in New York. At its core, the regulation mandates that each covered entity maintain a written cybersecurity policy approved by the board, conduct periodic risk assessments, limit access to sensitive systems and data, and implement robust security measures such as phishing-resistant multi-factor authentication (MFA).
Equally important is the incident reporting requirement, which mandates that breaches meeting certain criteria must be reported to NYDFS within 72 hours of determination. In addition, every covered entity must file an annual certification of compliance, or acknowledgment of noncompliance, by April 15 each year.
What's New for 2026: Key Updates
While the foundational requirements of Part 500 remain in place, 2026 brings heightened expectations in several critical areas that compliance teams should prioritize:
Third-Party Service Provider Oversight
NYDFS has sharpened its focus on how covered entities manage cybersecurity risk across their vendor and partner ecosystems. Covered entities are now expected to maintain a comprehensive inventory of third-party service providers with access to their systems or nonpublic information, conduct regular due diligence assessments, and include explicit cybersecurity provisions in vendor contracts. Gaps in third-party risk management have become a leading enforcement trigger.
Expanded CISO Accountability
The amended regulation places greater responsibility on the Chief Information Security Officer (CISO), who must now provide the board with more detailed and frequent cybersecurity reporting. CISOs are expected to flag material cybersecurity risks and document the board's engagement with those risks. Regulators are paying close attention to whether governance structures are substantive or merely formal.
Enhanced Incident Response Planning
Incident response plans must now address not only technical containment but also communications protocols, escalation paths, and recovery timelines. NYDFS expects organizations to test these plans — through tabletop exercises or simulations — on a regular basis and document the results. Plans that exist only on paper, but have never been exercised, are unlikely to satisfy examiners.
Penetration Testing Requirements
Annual penetration testing is now a firm expectation for Class A companies under Part 500, and many other covered entities are being encouraged to adopt similar practices. Penetration tests must be conducted by qualified independent parties and the results must inform remediation planning.
What are the Key Requirements & Upcoming Deadlines?
With the April 15, 2026 certification deadline on the horizon, several obligations should be top-of-mind for compliance teams right now.
The annual compliance certification for the 2025 calendar year must be submitted by April 15, 2026. Before that filing, organizations must ensure their risk assessment is current, documented, and reflective of any material changes to their environment over the past year — including new vendors, system changes, or organizational restructuring.
MFA enforcement remains a major focus for NYDFS. Covered entities are expected to have phishing-resistant MFA in place not only for remote network access but also for certain internal systems that handle sensitive information. The expectation is clear: email-only MFA or weaker second factors like SMS one-time codes no longer meet the standard.
Finally, the 72-hour breach reporting requirement remains one of the most critical obligations. Delays in reporting can lead to enforcement actions — even if the breach itself could not have been prevented.
Healthplex Case Study - A $2 Million Lesson
The Healthplex enforcement action provides a clear example of what can happen when these requirements are not met. In this case, a service representative at Healthplex clicked on a phishing email, giving an attacker access to sensitive consumer data stored in the employee’s Outlook 365 account.
Several compliance failures compounded the incident. First, Healthplex had not deployed MFA for its email system, leaving it vulnerable to credential-based attacks. Second, the company lacked an email retention policy, meaning that sensitive data remained in mailboxes far longer than necessary, increasing exposure. Finally, Healthplex failed to notify NYDFS of the breach until more than four months after discovery – well beyond the mandated 72-hour reporting window.
The result was a $2 million penalty, mandatory remediation measures, and a requirement for independent cybersecurity audits focused on MFA deployment. The costs extended far beyond the fine itself, including reputational damage and the operational burden of implementing corrective actions under regulatory scrutiny.
As NYDFS ramps up enforcement heading into 2026, the Healthplex case is a preview — not an outlier. Organizations with similar gaps in MFA, data retention, or reporting protocols should treat this settlement as a direct warning.
The True Cost of Noncompliance
While the $2 million fine is headline-grabbing, the broader impact of NYDFS noncompliance is often far greater. Legal costs, remediation expenses, internal resource strain, and lost customer trust can quickly escalate. Regulatory investigations can also distract leadership and IT teams from strategic priorities, creating a sustained operational drag.
For regulated entities, noncompliance can also lead to increased cyber liability insurance premiums - or difficulty obtaining coverage at all. And reputational harm, especially in the financial and insurance sectors, can have lasting effects on customer acquisition and retention.
Are You Ready for the April 15, 2026 Certification?
With the deadline a matter of months away, now is the time to conduct an honest internal assessment. Compliance teams should be asking:
-
Has our risk assessment been updated to reflect changes in our environment over the past year
-
Have we documented and tested our incident response plan, and can we demonstrate that to an examiner?
-
Do we have phishing-resistant MFA deployed across all systems that store or process nonpublic information — not just remote access?
-
Have we reviewed and updated our vendor agreements to include the cybersecurity provisions NYDFS expects?
-
Is our CISO providing the board with substantive cybersecurity reporting, and is that engagement documented?
If the answer to any of these is "not yet," there is still time to close the gap — but the window is narrowing.
How to Stay Ahead of NYDFS
Proactive compliance requires more than simply meeting the bare minimum. Covered entities should:
- Implement phishing-resistant MFA such as FIDO2 hardware keys or device-bound passkeys across all systems that store or process sensitive information.
- Automate breach detection and reporting to ensure the 72-hour notification rule is met without exception.
- Establish clear data retention policies to limit the amount of information that could be exposed in the event of a breach.
- Conduct annual independent audits to validate that cybersecurity controls meet or exceed NYDFS expectations.
- Formalize third-party risk management programs with documented due diligence and contractual cybersecurity obligations.
By integrating these measures into their cybersecurity programs, organizations not only reduce enforcement risk but also strengthen overall resilience against evolving threats.
Conclusion
NYDFS has made one thing clear heading into 2026: compliance with 23 NYCRR Part 500 is not optional, and the cost of failure is steep. The Healthplex settlement illustrates how a single phishing email — combined with gaps in MFA, data retention, and reporting — can spiral into a multi-million-dollar regulatory penalty.
With the April 15, 2026 annual certification deadline approaching, and new requirements around third-party oversight, CISO accountability, and incident response now in full effect, financial and insurance organizations cannot afford a passive approach. Treat NYDFS compliance as an ongoing operational imperative. Investing in phishing-resistant authentication, robust governance, and disciplined reporting processes can save millions and protect hard-earned reputations.
Learn how HYPR helps financial and insurance organizations exceed NYDFS requirements with passwordless, phishing-resistant MFA.
Key Takeaways
- NYDFS is aggressively enforcing 23 NYCRR Part 500, and penalties are climbing.
- Annual compliance certification is due April 15, 2026; phishing-resistant MFA and timely breach reporting remain top priorities.
- New 2026 requirements raise the bar on third-party risk management, CISO reporting, incident response testing, and penetration testing.
- Healthplex's $2 million fine shows the financial and reputational risks of noncompliance — and signals what's coming for unprepared organizations.
- Proactive, continuous compliance strengthens both security posture and business trust.
Roman Kadinsky
Cofounder, President & COO, HYPR
Roman Kadinsky, CFA is the President, Chief Operating Officer and Co-Founder of HYPR. Roman is responsible for HYPR’s day-to-day operations and works closely with employees, partners and clients to deliver on the company’s mission of enabling Passwordless Identity Assurance. Roman is also responsible for all aspects of finance, control, legal affairs and human resources.
Previously, Roman worked at Goldman Sachs in a variety of roles including Securities Sales and Equities Management as well as Market Risk for the Investment Management Division.
Related Content