Compass IT Compliance Blog

How China's TikTok Spies On You & Your Kids

How China's TikTok Spies On You & Your Kids

I have recently joined the ranks of people that aren’t really on social media anymore. So, much like veganism or cross-fit I have a responsibility to champion my new cause. I can’t claim to be an early un-adopter of social media and I left it for largely the same reasons as everyone e …

Read Story

Telecommuting (Securely) During a Pandemic Outbreak

Telecommuting (Securely) During a Pandemic Outbreak

Unless you live under a rock, you’ve likely seen the incessant news coverage of the Coronavirus (COVID-19). This has driven many companies to allow working from home for their staff. The technology has existed for years to allow workers that do not need to be in the office to work rem …

Read Story

Microsoft Teams – The New Phishing Platform for Hackers?

Microsoft Teams – The New Phishing Platform for Hackers?

Many organizations are moving to cloud services for email, voice, and collaboration software. One of the major services being offered is Microsoft Teams. Teams is powerful collaboration software that allows users to share files, screen share, instant message, schedule meetings and voi …

Read Story

Pandemic Planning and Tabletop Testing

Pandemic Planning and Tabletop Testing

With the recent outbreak of the Coronavirus (COVID-19), the Centers for Disease Control and Prevention (CDC) has recommended that organizations assess their current pandemic response plans. If your organization doesn’t have a pandemic response plan in place, it is highly recommended t …

Read Story

Examples of Effective Vishing Attacks

Examples of Effective Vishing Attacks

Vishing (not to be confused with phishing) is a form of social engineering that attempts to manipulate an individual to give an attacker personal information like usernames and passwords, credit card information, and social security numbers via the telephone. The attacker will call an …

Read Story

IT Asset Management – Governance Policies & Procedures

Asset Management

One of the most daunting and time-consuming tasks that an IT administrator can face is logging, monitoring, and tracking assets for their organization. Depending on the size of an organization, tracking can vary and may or may not include a robust program with various tools and spread …

Read Story

Subscribe by email