Compass IT Compliance Blog

How Secure Is Your Crypto Wallet?

Crypto Wallet

Over the past decade, cryptocurrency has shifted from a largely disregarded entity to a highly coveted investment class. Its appeal stems from its nature as a form of digital currency, protected by cryptography and complex computer networks, free from the influence of traditional cent …

Read Story

Temu App Poses Potential Data Risk for Consumers

Is Temu Safe?

The modern world is governed by apps. From communication to e-commerce, every aspect of our lives seems to be tied to digital platforms that promise convenience at the touch of a button. Among these apps, a newcomer has garnered significant attention lately.

Read Story

Safeguard Your Website From SEO Poisoning

Website URL

In today's digital landscape, search engine optimization (SEO) plays a crucial role in enhancing a website's visibility and attracting organic traffic. However, with every advancement in technology, new risks emerge. One such risk is SEO poisoning, a deceptive technique employed by ma …

Read Story

Cybersecurity Controls – Good, Cheap, Fast: Pick Two

A hand draws a 3 part venn diagram on a chalkboard

Nearly twenty years ago, I was working for the public transportation department in the town where I went to school. It was there that I was introduced to the new Marketing Director, who was among the first MBAs I had met. He laid something on me that was novel to me at the time but I …

Read Story

Insider Threats – Your Employee May Be Your Greatest Risk

Office Employees

In February of 2018, Ashley Liles was working as an IT Security Analyst at an Oxford based company that suffered a ransomware attack. Ashley jumped at the opportunity, not to help the company, but to enrich himself by piggybacking on the initial ransomware attack and attempting to tri …

Read Story

Vishing: Over-the-Phone Scamming

Vishing Phone Call

It's always scam season, so it helps to stay vigilant all year round. Cyberattackers scarcely rest. They are constantly developing novel approaches for stealing confidential information and vast sums of money from businesses worldwide, disrupting operations and causing considerable da …

Read Story

Subscribe by email