Compass IT Compliance Blog

Defending From Within

hacking-2903156_1280

Hackers, Ransomware, and denial of service attacks get all of the attention when it comes to Information Security. However, you will quite often hear IT Security personnel state that the biggest threat to an organization is from within. With this in mind, if an organization’s biggest …

Read Story

PCI Requirement 6 - Patches and Scanning and Coding, Oh My!

2017-04-27healthcare-ransomware

This is the sixth blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To view the previous posts in this series, follow the links below: PCI Requirement 1 - Defending the Wall PCI Requirement 2 - Change Your De …

Read Story

Information Security - Don't Just Check the Box!

checklist-2077018_1280

Compliance and security at times go hand in hand. In most cases, being compliant does not truly ensure you are being secure. I titled this blog “Don’t just check the box!” because the thinking that if your company can check the compliance box it will be secure enough is just not true. …

Read Story

The NIST Cybersecurity Framework Functions – Respond

hacking-964903_640

This is part 4 of our ongoing blog series on the NIST Cybersecurity Framework. To view our previous posts in this series, please see the links below: NIST Cybersecurity Framework - Overview and Identify NIST Cybersecurity Framework - Protect NIST Cybersecurity Framework - Detect After …

Read Story

PCI Requirement 5 - Update and Scan

cyber-security-3400657_1280

This is the fifth blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To read the previous posts in this series, click on the links below: PCI Requirement 1 PCI Requirement 2 PCI Requirement 3 PCI Requirement 4 …

Read Story

Subscribe by email