Compass IT Compliance Blog

Controlling the Boot Process of a Suspect System

hard-drive-249412_1920

Retrieving electronic evidence is an imperative part of any forensic investigation. One must follow a strict set of processes in order to ensure the proper extraction of data and to maintain the integrity of the media, establish chain of custody, and document hash values.

Read Story

Vendor Management Programs to Prevent Data Disasters

electrician-1080586_1920

If you’ve read any of my prior blog posts, you will know that my background prior to joining Compass IT Compliance included 21 active duty years in the United States Coast Guard. I seem to talk about it quite a bit. One of the perks, depending on where they are sending you, is getting …

Read Story

Situational Awareness Starts with You!

agreement-2548138_1920

Having situational awareness can get you out of a lot of jams. Let me elaborate on what I mean by that. Have you ever received that annoying phone call from “Macrosoft Support”? This is known as a vishing attack. It’s the practice of eliciting information or attempting to influence ac …

Read Story

Network Defense - Look at Policies and Training First

network-4393368_1920

I live in two worlds. The first is with Compass IT Compliance where most of our clients are small to medium businesses that don’t have their own security teams in house. The second is with the US Air Force where my only job is to help secure the entire enterprise. I am always blown aw …

Read Story

Complying with California’s Consumer Privacy Act (CCPA)

san-francisco-210230_1920

What is CCPA? The California Consumer Privacy Act (CCPA) is a law that was enacted in June of 2018 and will be effective come January 1st, 2020, with Attorney General enforcement starting on July 1st, 2020. This law is designed to give California residents access to their data being h …

Read Story

Subscribe by email