Compass IT Compliance Blog

Telecommuting (Securely) During a Pandemic Outbreak

Telecommuting (Securely) During a Pandemic Outbreak

Unless you live under a rock, you’ve likely seen the incessant news coverage of the Coronavirus (COVID-19). This has driven many companies to allow working from home for their staff. The technology has existed for years to allow workers that do not need to be in the office to work rem …

Read Story

Microsoft Teams – The New Phishing Platform for Hackers?

Microsoft Teams – The New Phishing Platform for Hackers?

Many organizations are moving to cloud services for email, voice, and collaboration software. One of the major services being offered is Microsoft Teams. Teams is powerful collaboration software that allows users to share files, screen share, instant message, schedule meetings and voi …

Read Story

Pandemic Planning and Tabletop Testing

Pandemic Planning and Tabletop Testing

With the recent outbreak of the Coronavirus (COVID-19), the Centers for Disease Control and Prevention (CDC) has recommended that organizations assess their current pandemic response plans. If your organization doesn’t have a pandemic response plan in place, it is highly recommended t …

Read Story

Examples of Effective Vishing Attacks

Examples of Effective Vishing Attacks

Vishing (not to be confused with phishing) is a form of social engineering that attempts to manipulate an individual to give an attacker personal information like usernames and passwords, credit card information, and social security numbers via the telephone. The attacker will call an …

Read Story

IT Asset Management – Governance Policies & Procedures

Asset Management

One of the most daunting and time-consuming tasks that an IT administrator can face is logging, monitoring, and tracking assets for their organization. Depending on the size of an organization, tracking can vary and may or may not include a robust program with various tools and spread …

Read Story

Stop Running from Privacy! Use the NIST Privacy Framework

Stop Running from Privacy! Use the NIST Privacy Framework

Take a look at your recent SOC 2 Type ll Service Organization Audit, where there are five Trust Service Criteria (Security, Confidentiality, Processing Integrity, Availability, and Privacy). How about your last Health Insurance Portability and Accountability Act (HIPPA) Audit, where t …

Read Story

Subscribe by email