Macs Can Get Viruses?
by Jesse Roberts on August 21, 2019 at 2:15 PM
Through my work at Compass IT Compliance I was recently contacted to deal with an issue regarding a Mac computer acting suspiciously. What does suspicious mean? In the case of this particular Mac, whenever a user tried to open the Safari web browser they were getting directed to the h …
Ransomware - The Imminent Threat to Your Data
by Ethan Ray on August 15, 2019 at 1:02 PM
In today’s computer driven society, technology is evolving at such a rapid rate that many people can’t keep pace with the changes. While these technological advances are new and exciting, they also lead to some serious security problems with negative consequences for today’s users.
Spear Phishing: Targeted Attacks with Higher Success Rates
by David Bienkiewicz on August 8, 2019 at 1:48 PM
Spear phishing is a deadly form of targeted social engineering. The main difference between spear phishing and traditional phishing is that spear phishing targets a certain user or users by using important facets of their life against them, while traditional phishing targets a broad g …
SSAE 18 SOC Reports: The 5 Trust Services Criteria
by Derek Morris on July 31, 2019 at 1:04 PM
For organizations receiving pressure to obtain an SSAE 18 SOC Attestation Report, the path can be confusing to navigate and understand. First off, SSAE stands for Statement on Standards for Attestation Engagements, and SOC stands for System and Organization Controls.
The Cyber Rabbit Hole: Almost Always Maybe
by Danielle Corsa on July 24, 2019 at 1:00 PM
The questions almost every digital forensic analyst is asked usually begin with, “Can you find __________?”. And the answer is almost always maybe, or, it depends.
How Information Security Approach Affects Organizational Culture
by Andrew Paull on July 17, 2019 at 1:00 PM
In this technological era where big data drives innovation and companies are expanding the boundaries of their offerings, workforce, and geographic locations through automation, it’s easy to lose sight of some of the more human aspects of organizational operations.