Compass IT Compliance Blog

Incident Response for Real

christian-wiediger-WkfDrhxDMC8-unsplash

Organizations are finally beginning to implement some type of incident response plans. Most of these plans revolve around NIST 800-61 Computer Security Incident Handling Guide. This guide is an amazing framework to help your organization get something in place, however, just referenci …

Read Story

What You Can Do to Better Prepare Yourself for Holiday Scams

christmas-1911637_1920

It’s that time of the year again! With the holiday season upon us, many criminals will be attempting to scam people via phishing emails. This time of the year (Black Friday, Christmas) is the most lucrative for attackers due to the fact that stores are having a crazy amount of sales w …

Read Story

Guide to Improving Your Security Awareness Training

workshop-2209239_1920

For the past 3 years that I’ve worked at Compass IT Compliance, I’ve had the opportunity to travel the country and meet with various clients ranging from small businesses with less than 10 people to organizations with offices around the world. The main constant that I have noticed wit …

Read Story

Vendor Risk Management: Importance of Service Level Agreements

glass-facade-817732_1920

Every organization, at one point or another, regardless of maturity, complexity, or business vertical, will have a need to work with a vendor, partner, or client to move business goals forward and maintain functional operations. Although vendors, partners, and clients have different r …

Read Story

Deciphering the PCI Testing Requirements of PCI-DSS Requirement 11

wallet-2125548_1920

PCI-DSS Requirement 11: Regularly test security systems and processes As a Qualified Security Assessor (QSA) organization and a security analyst, we receive many questions about meeting the various testing controls outlined within the Payment Card Industry Data Security Standard (PCI- …

Read Story

Controlling the Boot Process of a Suspect System

hard-drive-249412_1920

Retrieving electronic evidence is an imperative part of any forensic investigation. One must follow a strict set of processes in order to ensure the proper extraction of data and to maintain the integrity of the media, establish chain of custody, and document hash values.

Read Story

Subscribe by email