Home Network Security for Remote Workers
by Adam Cravedi on April 8, 2020 at 1:00 PM
The COVID-19 pandemic has presented unprecedented global challenges at all levels of society today, from healthcare to social concerns. With much of the East and West Coasts experiencing government-enforced social distancing lock downs, businesses have had to scramble to turn their da …
Microsoft Office Add-ins, Reason for Concern?
by Adam Cravedi on February 12, 2020 at 1:00 PM
This question came into Compass IT Compliance from a client the other day: “How risky are 3rd party plugins? Should I be concerned about them?”. I had to stop and think about this for a while. In my years of working on vulnerability and penetration testing projects for Compass IT Comp …
Deciphering the PCI Testing Requirements of PCI-DSS Requirement 11
by Adam Cravedi on November 6, 2019 at 1:00 PM
PCI-DSS Requirement 11: Regularly test security systems and processes As a Qualified Security Assessor (QSA) organization and a security analyst, we receive many questions about meeting the various testing controls outlined within the Payment Card Industry Data Security Standard (PCI- …
Still More Ransomware
by Adam Cravedi on July 10, 2019 at 1:00 PM
By now, the ransomware attack against the city of Baltimore has been widely publicized. This attack has been credited to the group responsible for generating the RobbinHood Ransomware package. The attack was first discovered at the beginning of May, and until recently the city was sti …
WannaCry Lives On! Have we Learned Anything?
by Adam Cravedi on May 21, 2018 at 10:58 AM
As the one-year anniversary of the most widely spread ransomware attack approaches, WannaCry is still active in the wild. Fortunately, so is the “kill switch” domain, rendering the attack mostly benign. During the WannaCry outbreak MalwareTech, a UK-based researcher, discovered that W …
Security Awareness Training: The First Line of Defense
by Adam Cravedi on June 3, 2015 at 10:29 AM
Compass IT security auditors are often asked if there is a single “most important” factor involved in safeguarding a business’s data assets.