Meta's Threads Collects More Data Than You May Know
by Nicholas Foisy on July 10, 2023 at 1:00 PM
Following a period of anticipation, Meta has recently introduced its latest venture into the competitive social media landscape with the launch of Threads. This new application, serving as a Twitter alternative, is now available in 100 countries and joins the ranks of other emergent c …
How Secure Is Your Crypto Wallet?
by Nicholas Foisy on July 7, 2023 at 12:00 PM
Over the past decade, cryptocurrency has shifted from a largely disregarded entity to a highly coveted investment class. Its appeal stems from its nature as a form of digital currency, protected by cryptography and complex computer networks, free from the influence of traditional cent …
Temu App Poses Potential Data Risk for Consumers
by Nicholas Foisy on June 30, 2023 at 11:00 AM
The modern world is governed by apps. From communication to e-commerce, every aspect of our lives seems to be tied to digital platforms that promise convenience at the touch of a button. Among these apps, a newcomer has garnered significant attention lately.
Safeguard Your Website From SEO Poisoning
by Nicholas Foisy on June 27, 2023 at 2:15 PM
In today's digital landscape, search engine optimization (SEO) plays a crucial role in enhancing a website's visibility and attracting organic traffic. However, with every advancement in technology, new risks emerge. One such risk is SEO poisoning, a deceptive technique employed by ma …
The Healthcare Industry Remains a Favorite for Cyber Criminals
by Nicholas Foisy on March 27, 2023 at 9:30 AM
If you have had any exposure to news headlines over the past decade, it would come as no surprise to you that the healthcare industry has been one of the sectors most targeted by hackers and cyber criminals.
What Does a Passwordless Future Look Like?
by Nicholas Foisy on July 28, 2022 at 1:00 PM
Passwords have served as a critical element in the work we do here at Compass IT Compliance since our founding over a decade ago. Whether it is educating individuals on the best practices for developing strong passwords, creating a password policy, utilizing automated programs to atte …