Compass IT Compliance Blog

Macs Can Get Viruses?

apple-1853259_1920

Through my work at Compass IT Compliance I was recently contacted to deal with an issue regarding a Mac computer acting suspiciously. What does suspicious mean? In the case of this particular Mac, whenever a user tried to open the Safari web browser they were getting directed to the h …

Read Story

Ransomware - The Imminent Threat to Your Data

internet-1593378_1920

In today’s computer driven society, technology is evolving at such a rapid rate that many people can’t keep pace with the changes. While these technological advances are new and exciting, they also lead to some serious security problems with negative consequences for today’s users.

Read Story

Spear Phishing: Targeted Attacks with Higher Success Rates

mohamed-ahzam-5rVQPPN7fNg-unsplash

Spear phishing is a deadly form of targeted social engineering. The main difference between spear phishing and traditional phishing is that spear phishing targets a certain user or users by using important facets of their life against them, while traditional phishing targets a broad g …

Read Story

SSAE 18 SOC Reports: The 5 Trust Services Criteria

survey-1594962_1920

For organizations receiving pressure to obtain an SSAE 18 SOC Attestation Report, the path can be confusing to navigate and understand. First off, SSAE stands for Statement on Standards for Attestation Engagements, and SOC stands for System and Organization Controls.

Read Story

The Cyber Rabbit Hole: Almost Always Maybe

memory-stick-1267620_1920

The questions almost every digital forensic analyst is asked usually begin with, “Can you find __________?”. And the answer is almost always maybe, or, it depends.

Read Story

How Information Security Approach Affects Organizational Culture

achievement-3468104_1920

In this technological era where big data drives innovation and companies are expanding the boundaries of their offerings, workforce, and geographic locations through automation, it’s easy to lose sight of some of the more human aspects of organizational operations.

Read Story

Subscribe by email