Compass IT Compliance Blog

Information Security - Don't Just Check the Box!

checklist-2077018_1280

Compliance and security at times go hand in hand. In most cases, being compliant does not truly ensure you are being secure. I titled this blog “Don’t just check the box!” because the thinking that if your company can check the compliance box it will be secure enough is just not true. …

Read Story

The NIST Cybersecurity Framework Functions – Respond

hacking-964903_640

This is part 4 of our ongoing blog series on the NIST Cybersecurity Framework. To view our previous posts in this series, please see the links below: NIST Cybersecurity Framework - Overview and Identify NIST Cybersecurity Framework - Protect NIST Cybersecurity Framework - Detect After …

Read Story

PCI Requirement 5 - Update and Scan

cyber-security-3400657_1280

This is the fifth blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To read the previous posts in this series, click on the links below: PCI Requirement 1 PCI Requirement 2 PCI Requirement 3 PCI Requirement 4 …

Read Story

PCI Requirement 4 – Hide in Plain Sight

business-code-codes-207580

This is the fourth blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To read previous posts in this series, click on the links below: PCI DSS Requirement 1 PCI DSS Requirement 2 PCI DSS Requirement 3 Requirem …

Read Story

WannaCry Lives On! Have we Learned Anything?

hacking-964903_640

As the one-year anniversary of the most widely spread ransomware attack approaches, WannaCry is still active in the wild. Fortunately, so is the “kill switch” domain, rendering the attack mostly benign. During the WannaCry outbreak MalwareTech, a UK-based researcher, discovered that W …

Read Story

The NIST Cybersecurity Framework Functions - Detect

black-and-white-computer-device-163017

The third function that will be discussed is Detect. After we have identified the assets within our organization and have implemented ways on how to protect those assets, we need to implement measure on how to Detect cybersecurity incidents that may occur. This can be achieved with us …

Read Story

Subscribe by email