Compass IT Compliance Blog

Self-Assessment Questionnaire (SAQ) P2PE Changes in PCI DSS v4.0

PCI DSS v3.2.1 to v4.0 SAQ P2PE Changes

Right around this time last year, the Payment Card Industry Security Standards Council (PCI SSC) published version 4.0 of the PCI Data Security Standard (PCI DSS). PCI DSS v4.0 replaces version 3.2.1 to address emerging threats and technologies and enable innovative methods to combat …

Read Story

The Healthcare Industry Remains a Favorite for Cyber Criminals

The Healthcare Industry Remains a Favorite for Cyber Criminals

If you have had any exposure to news headlines over the past decade, it would come as no surprise to you that the healthcare industry has been one of the sectors most targeted by hackers and cyber criminals.

Read Story

ProxyNotShell – Microsoft Exchange Exploit Explained

ProxyNotShell – Microsoft Exchange Exploit Explained

ProxyNotShell – What is it? Cyberattacks have become increasingly sophisticated and widespread in recent years, with hackers constantly finding new ways to infiltrate networks and steal sensitive information. One such vulnerability that has recently come to light is ProxyNotShell, ide …

Read Story

What Is Password Spraying? How Can It Affect Customers?

Password Spraying

Brute force attacks like password spraying have been on the uptick recently, according to Microsoft's team of experts. Although only about 1% of these attacks are successful, they can be devastating. Affected companies often suffer serious financial and reputational damage.

Read Story

HIPAA Compliance – Understanding Basic Best Practices

HIPAA Compliance

Health Insurance Portability and Accountability Act (HIPAA) compliance is a critical facet of any healthcare organization's security measures. It is essential for businesses to take proactive steps to ensure that they comply with the regulations set forth by HIPAA. To help ensure comp …

Read Story

Not Using Multifactor Authentication? Your Days Are Limited!

MFA

Despite the fact the multifactor authentication (MFA) has been around for decades at this point, the majority of both business and personal logins only use it when absolutely necessary. The complaints are well known; it takes too long to login, if I forget my phone or token I can’t lo …

Read Story

Subscribe by email