PCI Requirement 4 – Hide in Plain Sight
by Derek Morris on May 22, 2018 at 9:30 AM
This is the fourth blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To read previous posts in this series, click on the links below: PCI DSS Requirement 1 PCI DSS Requirement 2 PCI DSS Requirement 3 Requirem …
PCI Requirement 3 - Don't Store Cardholder Data!!
by Derek Morris on March 19, 2018 at 1:58 PM
This is the third blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through the process of becoming or maintaining compliance with the PCI Data Security Standards. Click here for our blog posts on requirement 1 and requirement 2. …
PCI Requirements Explained - PCI Requirement 2 - Change Your Defaults!
by Derek Morris on February 6, 2018 at 9:30 AM
This is the second blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. Click here for our blog post on requirement 1. I like to refer to this requirement as the Change Your Defaults requirement. The focus is on …
SOC 2 Reports - Ready, Set, Go!
by Derek Morris on February 2, 2018 at 1:15 PM
I need to complete a SOC 2 report on my controls; “Where do I start??” Aside from the easy answer of, contact Compass IT Compliance and we can help you get started, I would like to cover some tips on what to know and how to get started towards completing a SOC 2 report.
PCI Requirements Explained - PCI Requirement 1 - Defending the Wall
by Derek Morris on January 23, 2018 at 9:30 AM
This will be the first blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through the process of becoming compliance with the PCI Data Security Standard.
What is Social Engineering? Part III
by Derek Morris on April 11, 2017 at 10:00 AM
What is Social Engineering? In this blog, I would like to shed some light on some other types of social engineering and provide some context on how to protect your business and self. In my first two blogs, I jumped into the Phishing and Spear Phishing pieces of a social engineering at …