Compass IT Compliance Blog

Still More Ransomware

baltimore-4292023_1920

By now, the ransomware attack against the city of Baltimore has been widely publicized. This attack has been credited to the group responsible for generating the RobbinHood Ransomware package. The attack was first discovered at the beginning of May, and until recently the city was sti …

Read Story

The Importance of Testing Your Business Continuity Plan

meeting-2284501_1920

Alright boys and girls, time to put your pencils down – we are taking a TEST! These may have been some of the scariest words you have ever had to hear. Personally, I will be thrilled if I never have to take another test and I know very few people who look forward to doing so.

Read Story

Cybersecurity - Back to Basics

cyber-security-3374252_1920

Welcome to summer in New England! Or close to it at any rate. Today I would like to talk about a slightly different topic than usual on these blogs. For those of you that have read past entries, you know they are full of good advice on not many different compliance issues.

Read Story

Vishing – A Closer Look

mobile-605422_1920

Vishing, a shortened name for voice phishing, is the act of using a telephone to trick an individual into surrendering useful information to a fraudulent caller. Vishing is a form of social engineering, and as in most social engineering attempts, the attacker will create a false ident …

Read Story

CIS Critical Security Controls V7.1 - What's New?

skyscraper-3184798_1920

The Center for Internet Security (CIS) is a non-profit information technology entity with a mission to safeguard organizations from cyber threats. CIS has created what’s known as the CIS Top 20 Controls. These are the global standard best practices for securing information technology …

Read Story

IT Governance - Aligning IT Policies With Business Goals

laptop-3196481_1920

Over the past decade, Compass IT Compliance has been assisting organizations across the country to mitigate their cyber risks and meet compliance guidelines. Through this work, we often field questions regarding information technology governance. So, what is IT governance? What impact …

Read Story

Subscribe by email