Network Defense - Look at Policies and Training First
by George Seerden on October 9, 2019 at 1:00 PM
I live in two worlds. The first is with Compass IT Compliance where most of our clients are small to medium businesses that don’t have their own security teams in house. The second is with the US Air Force where my only job is to help secure the entire enterprise. I am always blown aw …
Complying with California’s Consumer Privacy Act (CCPA)
by Patrick Hughes on October 2, 2019 at 1:03 PM
What is CCPA? The California Consumer Privacy Act (CCPA) is a law that was enacted in June of 2018 and will be effective come January 1st, 2020, with Attorney General enforcement starting on July 1st, 2020. This law is designed to give California residents access to their data being h …
Securing Your Cloud Environment – Who is Responsible?
by Derek Boczenowski on September 18, 2019 at 1:00 PM
The speed at which technology progresses is truly staggering. I am old enough to remember having to load 9-track magnetic tapes to install a patch, and marveled at the lightning fast 384k connection for an entire organization, thinking we had finally made the big time.
Colorado Protections for Consumer Data Privacy Act - What to Know
by Sarina Resnick on September 12, 2019 at 2:02 PM
Last spring, Colorado followed the actions of several other states and countries by taking steps to enact legislation that helps consumers protect their data. The state passed the Protections for Consumer Data Privacy Act (HB18-1128). Signed into law on May 29, 2018, and taking effect …
PHI Data - A Hacker's Treasure Trove
by Ron Scarborough on September 4, 2019 at 1:03 PM
The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996. I begin at this statement because as professionals and adults, this date is relatively recent in our lifetime. Social Security Numbers (SSN) have been around since before World War II (1936), followed …
IT Security in the Professional Sports World
by Derek Morris on August 28, 2019 at 1:02 PM
This blog will be the first in a multi-part informational blog series on professional sport team’s information technology (IT) security hurdles and the very public issues that have occurred.