OWASP Top 10: Why Compliance to OWASP Matters
by Jake Dwares on November 10, 2022 at 1:00 PM
During a recent web application penetration test, my Compass IT Compliance colleague Jesse Roberts was quickly able to identify and exploit a coding vulnerability on a client’s public facing web portal. As part of the engagement, Jesse was initially granted “standard user” access to t …
MSP Breaches Opening the Door to Further Attacks on Clients
by Jake Dwares on August 10, 2022 at 1:00 PM
Is your Managed Service Provider (MSP) protecting yours and your client’s data? Are you regularly assessing your MSP and the rest of your vendors? It is no secret that hackers have gained access to more and larger companies over the past few years, but a new malicious tactic is coming …
Reflecting on the AWS Outage and Cloud Disruption Risks
by Jake Dwares on December 9, 2021 at 4:38 PM
Cloud computing and cloud hosting popularity has skyrocketed over the past several years, and the trend is likely only to continue to grow. It began as a means to a more efficient way to host data in the cloud rather than on-premises, and COVID-19 amplified the growth and adoption of …
QRishing – A New Version of an Old Scam
by Jake Dwares on November 17, 2021 at 3:00 PM
QR codes are everywhere these days. Codes can be found on restaurant menus (since the start of COVID), company websites, business cards, flyers, brochures, etc. Most individuals are likely to have seen one or scanned one at some point recently.