Compass IT Compliance Blog

PCI, Service Providers, and You

A man holds a credit card in his hand while scrolling on a laptop

As merchants increasingly utilize trusted partners to maintain and manage critical pieces of their business, information technology, and security infrastructure, it becomes necessary to build a program to manage these vendors.

Read Story

Center for Internet Security (CIS) Controls V8 – What's New?

Center for Internet Security (CIS) Controls V8 – What's New?

With the advent of the novel Coronavirus and the subsequent lockdowns, companies were forced to innovate on how and where they did work. The workforce shifted from the familiar physical and logical boundaries of corporate offices to home offices that provided greater flexibility but a …

Read Story

Latest Update in Vulnerabilities (SeriousSAM, PrintNightmare)

Latest Update in Vulnerabilities (SeriousSAM, PrintNightmare)

In this week's blog post, Compass IT Compliance Cybersecurity Professional Danielle Corsa analyzes several recent Microsoft vulnerabilities.

Read Story

Ransomware Disrupting Your Beer Supply

Ransomware Disrupting Your Beer Supply

When brainstorming blog topics, it often helps to find intersections between your profession and your personal interests. In this case, that intersection is cybersecurity and brewing beer, respectively. But what could beer possibly have to do with cybersecurity?

Read Story

The Difference Between IT Risk Assessments and IT Audits

The Difference Between IT Risk Assessments and IT Audits

While information technology (IT) risk assessments and information technology (IT) audits go hand in hand with one another, the two terms are often misused. There are quite a few key differences to note when it comes to IT risk assessments and IT audits and determining which is best f …

Read Story

Protecting SCADA Systems from Cyber-Attacks

Protecting SCADA Systems from Cyber-Attacks

Supervisory control and data acquisition (SCADA) is a control system architecture comprising computers, networked data communications and graphical user interfaces (GUI) for high-level process supervisory management, while also comprising other peripheral devices like programmable log …

Read Story

Subscribe by email