Compass IT Compliance Blog

IT Security in the Professional Sports World

athletes-1846039_1920

This blog will be the first in a multi-part informational blog series on professional sport team’s information technology (IT) security hurdles and the very public issues that have occurred.

Read Story

Macs Can Get Viruses?

apple-1853259_1920

Through my work at Compass IT Compliance I was recently contacted to deal with an issue regarding a Mac computer acting suspiciously. What does suspicious mean? In the case of this particular Mac, whenever a user tried to open the Safari web browser they were getting directed to the h …

Read Story

Ransomware - The Imminent Threat to Your Data

internet-1593378_1920

In today’s computer driven society, technology is evolving at such a rapid rate that many people can’t keep pace with the changes. While these technological advances are new and exciting, they also lead to some serious security problems with negative consequences for today’s users.

Read Story

Spear Phishing: Targeted Attacks with Higher Success Rates

mohamed-ahzam-5rVQPPN7fNg-unsplash

Spear phishing is a deadly form of targeted social engineering. The main difference between spear phishing and traditional phishing is that spear phishing targets a certain user or users by using important facets of their life against them, while traditional phishing targets a broad g …

Read Story

SSAE 18 SOC Reports: The 5 Trust Services Criteria

survey-1594962_1920

For organizations receiving pressure to obtain an SSAE 18 SOC Attestation Report, the path can be confusing to navigate and understand. First off, SSAE stands for Statement on Standards for Attestation Engagements, and SOC stands for System and Organization Controls.

Read Story

The Cyber Rabbit Hole: Almost Always Maybe

memory-stick-1267620_1920

The questions almost every digital forensic analyst is asked usually begin with, “Can you find __________?”. And the answer is almost always maybe, or, it depends.

Read Story

Subscribe by email