Compass IT Compliance Blog

The Healthcare Industry Remains a Favorite for Cyber Criminals

The Healthcare Industry Remains a Favorite for Cyber Criminals

If you have had any exposure to news headlines over the past decade, it would come as no surprise to you that the healthcare industry has been one of the sectors most targeted by hackers and cyber criminals.

Read Story

ProxyNotShell – Microsoft Exchange Exploit Explained

ProxyNotShell – Microsoft Exchange Exploit Explained

ProxyNotShell – What is it? Cyberattacks have become increasingly sophisticated and widespread in recent years, with hackers constantly finding new ways to infiltrate networks and steal sensitive information. One such vulnerability that has recently come to light is ProxyNotShell, ide …

Read Story

What Is Password Spraying? How Can It Affect Customers?

Password Spraying

Brute force attacks like password spraying have been on the uptick recently, according to Microsoft's team of experts. Although only about 1% of these attacks are successful, they can be devastating. Affected companies often suffer serious financial and reputational damage.

Read Story

HIPAA Compliance – Understanding Basic Best Practices

HIPAA Compliance

Health Insurance Portability and Accountability Act (HIPAA) compliance is a critical facet of any healthcare organization's security measures. It is essential for businesses to take proactive steps to ensure that they comply with the regulations set forth by HIPAA. To help ensure comp …

Read Story

Not Using Multifactor Authentication? Your Days Are Limited!

MFA

Despite the fact the multifactor authentication (MFA) has been around for decades at this point, the majority of both business and personal logins only use it when absolutely necessary. The complaints are well known; it takes too long to login, if I forget my phone or token I can’t lo …

Read Story

Preparing for a BIA – Understanding RTO and RPO

Preparing for a BIA – Understanding RTO and RPO

In my time as a security and compliance auditor and virtual CISO, I have reviewed countless business continuity plans (BCPs) resulting from regulatory and industry requirements to which clients must adhere. For the most part, the business continuity plans I have reviewed were written …

Read Story

Subscribe by email