Compass IT Compliance Blog

IT Asset Management – Disposal of Assets

IT Asset Management – Disposal of Assets

As we reach the end of this asset management blog series, we have discussed the need for establishing governance policies and procedures, how to acquire hardware and software for your organization, and how to monitor and upgrade assets throughout their lifecycles.

Read Story

Vendor Risk Management: Third-Party Risk Analysis / Annual Review

Vendor Risk Management: Third-Party Risk Analysis / Annual Review

We live in a world where our interactions with each other are generally benign, observed to be candid at face value, making it easy to take the assurances of success, functionality, and capability of our colleagues and acquaintances as they are meant. Unfortunately, business interacti …

Read Story

VA Data Breach Exposes the Personal Info of 46,000 Veterans

VA Data Breach Exposes the Personal Info of 46,000 Veterans

Being hacked is unfortunately still an all too common occurrence. Even as security measures get stronger, reports of breaches and compromises of individual’s personal information do not seem to be slowing down.

Read Story

Situational Awareness – How Strong Are Your Spidey Senses?

Spiderman

How aware are we of our surroundings? What is happening around us that we are not aware of? Being more cognitive of our surroundings at work and at home can bring a lot of positive results to our corporate security posture.

Read Story

Elements of Quality Security and Privacy Awareness Training

Markers fall onto a nightstand

As information technology professionals, we often hear the term security awareness training. Most organizations know they need to be conducting continuous security awareness training, whether the goal is to check a box for a framework/regulation they must adhere to, or they genuinely …

Read Story

Can the Election Be Hacked?

Election Hacking

The presidential election is less than three months away and questions revolving around the overall security of the electoral process should be on everyone’s mind. Let us discuss some areas that may be susceptible to hacking. I will be assigning a threat level based on my own professi …

Read Story

Subscribe by email