Security Culture Through the Eyes of a Young Marine
by Ron Scarborough on May 27, 2020 at 1:00 PM
Many years ago, I was enlisted in the Marine Corps. As a young Marine I was given the opportunity to take part in the Marine Security Guard program. I received my marching orders and was off to Quantico, Virginia, for my training. Afterwards I was shipped off to the United States emba …
PHI Data - A Hacker's Treasure Trove
by Ron Scarborough on September 4, 2019 at 1:03 PM
The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996. I begin at this statement because as professionals and adults, this date is relatively recent in our lifetime. Social Security Numbers (SSN) have been around since before World War II (1936), followed …
IT Governance - Aligning IT Policies With Business Goals
by Ron Scarborough on May 22, 2019 at 1:02 PM
Over the past decade, Compass IT Compliance has been assisting organizations across the country to mitigate their cyber risks and meet compliance guidelines. Through this work, we often field questions regarding information technology governance. So, what is IT governance? What impact …
Defending From Within
by Ron Scarborough on June 26, 2018 at 10:00 AM
Hackers, Ransomware, and denial of service attacks get all of the attention when it comes to Information Security. However, you will quite often hear IT Security personnel state that the biggest threat to an organization is from within. With this in mind, if an organization’s biggest …
Data Classification - Understanding the Basics
by Ron Scarborough on May 14, 2018 at 10:00 AM
In the ever-expanding world of PCI DSS, and the emerging GDPR world, data classification is a concern that is often left unattended. Organizations who work with Compass IT often find the value in tagging data that together we deem valuable if manipulated, stolen or destroyed. Organiza …
PCI Documentation - Man's Best Friend!
by Ron Scarborough on March 28, 2018 at 10:00 AM
Nobody told you when you were tinkering with a computer as a kid that when you grew up you would be doing so much documentation, did they? Now you have an email from an auditor asking for evidence that you have documented your firewall and router configurations. In the rapidly develop …