Compass IT Compliance Blog

How Phishing Emails Can Cost You $40,000

An infographic detailing how to prevent ransomware

To me, math is what makes the world work. If you think about it, just about everything involves math, especially when it comes to business. When I was going through my MBA program, I really underestimated the amount of math and calculations that you needed to perform for essentially e …

Read Story

Information Security Programs: Where to Start?

Information Security Programs: Where to Start?

Hack, breach, phishing, spear phishing, ransomware. These are all words that we hear in the news on a daily basis due to some sort of threat that exists in the world of technology and information security. Most organizations have compliance requirements that they must adhere to, wheth …

Read Story

The HIPAA Risk Assessment - Who Needs One and When?

medic-563423_1920

Healthcare breaches are nothing new, in fact they have become quite common in the news on a weekly basis. As an example of this, a Central Florida Oncology provider recently announced that it suffered a data breach at the hands of a hacker, resulting in the compromise of the personal …

Read Story

Phishing Examples: Even the Security Folks Get Targeted

An example of a phishing email shows a scammy link path

We all hear about phishing emails. All the time. In fact, there is a never ending dialogue about phishing emails in the news, the most recent one being the IRS emailing to say that you owe them money and they are going to arrest you if you don't pay immediately. As a side note, this i …

Read Story

How are Star Wars and the Numbers 1-6 Related?

How are Star Wars and the Numbers 1-6 Related?

If you guessed that they are some of the worst passwords used in 2015, you would be correct! The 2015 annual list of the worst passwords used by individuals was released and coming in at #1 again this year is "123456". Coming in at #2 was everyone's favorite: "password". The shame of …

Read Story

Subscribe by email