Compass IT Compliance Blog

The NIST Cybersecurity Framework Functions - Protect

hacker-1944688_1280

As promised in last month’s blog about the NIST Cybersecurity Framework Identify function, this month we are discussing the Protect function. After an organization has addressed the five categories within the Identify function (Asset Management (ID.AM), Business Environment (ID.BE), G …

Read Story

New Version of the Critical Security Controls Released

hacker-1944688_1280

Last month, the Center for Internet Security (CIS) released version 7.0 of the Top 20 Critical Security Controls. This represents a significant revision from the previous version (6.1) and introduces some interesting changes. Before we dig into the changes to the controls, if you are …

Read Story

Why a Risk Assessment is the Beginning of Security, Not the End!

info_protect_740

In the past several weeks, the news has been filled with multiple compromises and hacks. Panera Bread, Delta, and Under Armor just to name a few. One of the ones that has had the most impact is the ransomware attack on the City of Atlanta.

Read Story

Subscribe by email