Compass IT Compliance Blog

Government Cyber Weaknesses & the Need for White Hats

hacker-1569744_1920

Have White Hat, Will Travel “A young boy, with greasy blonde hair, sitting in a dark room…[T]he weary system cracker telnets to the next faceless .mil site on his hit list.”

Read Story

The Importance of a Business Impact Analysis

conference-room-768441_1920

Wouldn’t it be nice if we could predict the future? You would know what stocks to invest in, what sports team was going win, and what lottery numbers to play. It sure would make life easy, wouldn’t it?! Well, unfortunately we can’t, so we are going to have to keep working hard, resear …

Read Story

New York v. Illegal Withdrawal Specialists (23 NYCRR 500)

abundance-bank-banking-259027

A brief introduction into the recent New York State Department of Financial Services 23 NYCRR 500 cybersecurity regulations.

Read Story

Software Development Lifecycle Simplified

coding-1853305_1920

Project creation can be stressful, especially when creating something completely new. When creating a project that is software-based, there is a specific process that is created to aid the production of said project.

Read Story

Response Operations: BCP, IRP, and DRP - Why You Need all Three

tom-grimbert-801120-unsplash

No well-managed organization is immune to the risk of the potential business interruptions that may occur from time to time, whether caused by acts of nature, malicious attack, or simple human error. Depending on the severity of the interruption and the organizational assets and busin …

Read Story

The Cyber Rabbit Hole: Computer Forensics

slejven-djurakovic-1124716-unsplash

This blog is for anyone daring and brave enough to follow the rabbit hole into the realm of computer forensics where there lies the truth. The main objective for an analyst is to be able to dig up the digital past with no judgement of the outcome. There must be a legitimate need to co …

Read Story

Subscribe by email