Compass IT Compliance Blog

Helping a Social Engineer Achieve Their Goal

police-869216_1920

I know the title of this blog post seems a little weird. Why would we help a social engineer achieve their goal? Well, we might not want to, but we all do it in some way and some people are more guilty of it than others.

Read Story

CCPA – Compliance Before Consequence

golden-gate-bridge-1549662_1920

Becoming compliant with new laws can be frustrating. Companies are finally making it over the curve of being completely compliant under the recent General Data Protection Regulation (GDPR), and now there is yet another regulation that needs to be complied with. As of June 2018, The Ca …

Read Story

Trends and Tactics in Phishing

get-me-out-1605906_1920

When I’m tasked with creating phishing emails for clients, I begin by looking up what the recent phishing trends are in the real world, or the top 10 most reported phishing attacks for the month / year. I often end up finding scams about winning the latest iPhone from a phone service …

Read Story

Government Cyber Weaknesses & the Need for White Hats

hacker-1569744_1920

Have White Hat, Will Travel “A young boy, with greasy blonde hair, sitting in a dark room…[T]he weary system cracker telnets to the next faceless .mil site on his hit list.”

Read Story

The Importance of a Business Impact Analysis

conference-room-768441_1920

Wouldn’t it be nice if we could predict the future? You would know what stocks to invest in, what sports team was going win, and what lottery numbers to play. It sure would make life easy, wouldn’t it?! Well, unfortunately we can’t, so we are going to have to keep working hard, resear …

Read Story

New York v. Illegal Withdrawal Specialists (23 NYCRR 500)

abundance-bank-banking-259027

A brief introduction into the recent New York State Department of Financial Services 23 NYCRR 500 cybersecurity regulations.

Read Story

Subscribe by email