Compass IT Compliance Blog

PCI Requirement 3 - Don't Store Cardholder Data!!

Credit-Card-Computer-Purchase.jpg

This is the third blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through the process of becoming or maintaining compliance with the PCI Data Security Standards. Click here for our blog posts on requirement 1 and requirement 2. …

Read Story

Tax Scam Phishing Examples

hacker-1944688_1280.jpg

Tax season is upon us once again. Just like every other tax year, this also marks the beginning of the annual tax season scams that bad actors use to try and steal your information or steal your money. One of the more common scams they run is they attempt to impersonate the IRS and sc …

Read Story

The NIST Cybersecurity Framework - An Overview

safe-913452_1280 (1).jpg

Many people think of important dates in history and may think of July 4, 1776, the date the U.S declares independence, or July 20, 1969, Neil Armstrong walking on the moon. Another important date, while maybe not on the same scale, is still an important date in NIST history.

Read Story

The Dangers of a Written Information Security Program (WISP)

binding-contract-948442_1280.jpg

This is a guest post that was written by Joel Goloskie, Esq. Joel is Senior Counsel with Pannone, Lopes, Devereaux, & O'Gara in Boston. Joel is a member of the firms Healthcare, Litigation, and Corporate & Business Teams. Joel advises and assists his clients on the various int …

Read Story

How To Prevent Phishing? More Like How To Train Your (Dragon) End-User

hacking-2903156_1280.jpg

The most dangerous threat to your company’s information isn’t as the movies would lead you to believe. The hacker in a warehouse surrounded with monitors, expounding upon government conspiracies isn’t knocking at your door. The biggest threat is in your building right now and is about …

Read Story

Why Every Company Needs an Information Security Officer

Skyscrapers

In today's world, businesses of all sizes depend heavily on digital systems and data. While this digital transformation brings many benefits, it also exposes companies to a growing number of cyber threats. Data breaches, ransomware attacks, and other types of cybercrime have become al …

Read Story

Subscribe by email