Geoff Yeagley

Geoff Yeagley

Geoff Yeagley is SVP of Sales and Marketing with Compass IT Compliance. In this role, Geoff is responsible for the day to day sales operations of Compass IT Compliance while ensuring consistent revenue growth, profitability and the introduction of new service offerings to our clients. Prior to taking on his current role, Geoff was the VP of Marketing for Compass where he developed and implemented a multi-faceted marketing program.

Posts by Geoff Yeagley

Urgent Alert - New Spear Phishing Attack

hacking-964903_640.png

It has come to our attention that cyber criminals have begun exploiting a vulnerability within Microsoft PowerPoint’s Object Linking and Embedding (OLE) interface to evade antivirus detection in an attempt to silently install malware applications on Windows based computer systems.

Read Story

The NIST Cybersecurity Framework - The Detect Function

file0002120440786.jpg

We are in our third part in a six-part series talking about the NIST Cybersecurity Framework and the core, or functions, of the framework. In the last 2 posts, we talked about the Identify and Protect functions of the framework and used the analogy of building a house. When you build …

Read Story

The NIST Cybersecurity Framework - The Protect Function

stockvault-cyber-security-concept-with-red-padlock-on-data-screen180401.jpg

For the second part of our series on the NIST Cybersecurity Framework, we are going to be discussing the Protect function. Last time we discussed the Identify function which talked about the need to really understand your critical infrastructure, your systems, and the risks associated …

Read Story

Another Day, Another Major Ransomware Outbreak...

hack-813290_1280.jpg

A little over a month ago, a strain of Ransomware called WannaCry made headlines due to the incredibly successful nature of the attack as it infected hundreds of thousands of users around the world. This ransomware was delivered through an unpatched vulnerability in the Microsoft Oper …

Read Story

Phishing Examples: Even the Security Folks Get Targeted... Again!

Phishing Email June 2017.png

If you have been reading the blog for a while, you know that I take phishing examples that I receive or my co-workers receive, post them to the blog, and point out the things that you need to be careful of. I do this primarily to educate folks about what the latest threats look like, …

Read Story

The NIST Cybersecurity Framework - The Identify Function

Identify Flowchart.png

Last week we provided a very high-level overview of the NIST Cybersecurity Framework, the core (5 functions) of the framework, and the categories within each function.

Read Story

Subscribe by email