Compass IT Compliance Blog

Security Culture Through the Eyes of a Young Marine

Two soldiers stand on a rocky mountain scape

Many years ago, I was enlisted in the Marine Corps. As a young Marine I was given the opportunity to take part in the Marine Security Guard program. I received my marching orders and was off to Quantico, Virginia, for my training. Afterwards I was shipped off to the United States emba …

Read Story

Contact Tracing – Personal Information Privacy Concerns

Contact Tracing – Personal Information Privacy Concerns

COVID-19 has turned the world upside down. Everyone is feeling the effects of the global pandemic. Governments are still in react mode on how to best deal with a virus that for the short term does not seem to be going away. Without a vaccine in place, the world will need to rely on co …

Read Story

IT Asset Management – Acquisition of Assets

IT Asset Management – Acquisition of Assets

In part one of this IT asset management blog series, we discussed governance policies and procedures. In this second part to the blog series, we will discuss the process for acquisition of assets from reputable and vetted vendors. A lot has happened since part one was written, which a …

Read Story

Continuous Vulnerability Scanning Within Your Remote Network

Continuous Vulnerability Scanning Within Your Remote Network

By now, you are likely tired of reading similar blogs and watching the same webinars about how the workforce is scrambling to set up secure remote workstations for the employees they have remaining. The words “threat” and “risk” have been used continuously to inspire dread and instill …

Read Story

Subscribe by email