Compass IT Compliance Blog

Contact Tracing – Personal Information Privacy Concerns

Contact Tracing – Personal Information Privacy Concerns

COVID-19 has turned the world upside down. Everyone is feeling the effects of the global pandemic. Governments are still in react mode on how to best deal with a virus that for the short term does not seem to be going away. Without a vaccine in place, the world will need to rely on co …

Read Story

IT Asset Management – Acquisition of Assets

IT Asset Management – Acquisition of Assets

In part one of this IT asset management blog series, we discussed governance policies and procedures. In this second part to the blog series, we will discuss the process for acquisition of assets from reputable and vetted vendors. A lot has happened since part one was written, which a …

Read Story

Continuous Vulnerability Scanning Within Your Remote Network

Continuous Vulnerability Scanning Within Your Remote Network

By now, you are likely tired of reading similar blogs and watching the same webinars about how the workforce is scrambling to set up secure remote workstations for the employees they have remaining. The words “threat” and “risk” have been used continuously to inspire dread and instill …

Read Story

Security Concerns to Consider Amid Re-Opening

Security Concerns to Consider Amid Re-Opening

During this unprecedented time in our country, many companies are under strain due to the changing conditions in their workplace. Unemployment rates have now surpassed twenty percent, meaning many companies are now operating with much less staff than they were a couple of months ago.

Read Story

COVID-19: Is Management Asking the Right Questions?

COVID-19: Is Management Asking the Right Questions?

What if you are the owner or manager of a business in today’s world? A few weeks ago, our world was turned upside down – to say the least. Management’s focus shifted from business as usual to figuring out how to keep employees safe and company doors open for business (in-person or vir …

Read Story

9 Easy Steps to Create Strong Passwords

A keyboard wrapped with a chain and lock

Passwords serve as the gatekeeper to an organization’s data and systems, keeping out unauthorized users and only allowing the right people to enter. The strength of an organization’s passwords can often be the deciding factor to whether they suffer a breach or data disaster.

Read Story

Subscribe by email