IT Asset Management – Governance Policies & Procedures
by Kyle Daun on February 28, 2020 at 1:00 PM
One of the most daunting and time-consuming tasks that an IT administrator can face is logging, monitoring, and tracking assets for their organization. Depending on the size of an organization, tracking can vary and may or may not include a robust program with various tools and spread …
Stop Running from Privacy! Use the NIST Privacy Framework
by Jerry Hughes on February 19, 2020 at 1:00 PM
Take a look at your recent SOC 2 Type ll Service Organization Audit, where there are five Trust Service Criteria (Security, Confidentiality, Processing Integrity, Availability, and Privacy). How about your last Health Insurance Portability and Accountability Act (HIPPA) Audit, where t …
The Coronavirus – Be Prepared!
by Jerry Hughes on February 13, 2020 at 1:30 PM
The Centers for Disease Control and Prevention (CDC) is closely monitoring an outbreak of respiratory illness caused by the Coronavirus. This new virus was first identified in Wuhan, Hubei Province, China. Chinese authorities identified the new coronavirus, which has resulted in thous …
Microsoft Office Add-ins, Reason for Concern?
by Adam Cravedi on February 12, 2020 at 1:00 PM
This question came into Compass IT Compliance from a client the other day: “How risky are 3rd party plugins? Should I be concerned about them?”. I had to stop and think about this for a while. In my years of working on vulnerability and penetration testing projects for Compass IT Comp …
Reduce Business Risk with Digital Forensic Preparedness
by Danielle Corsa on February 5, 2020 at 1:00 PM
By taking a multifaceted approach to digital forensic preparedness, you can confidently conduct business in a state of perpetual incident readiness. Blend physical, technical, and administrative operations to prepare for the potential need for digital evidence. Continual collection an …