Compass IT Compliance Blog

PCI Requirement 4 – Hide in Plain Sight

business-code-codes-207580

This is the fourth blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To read previous posts in this series, click on the links below: PCI DSS Requirement 1 PCI DSS Requirement 2 PCI DSS Requirement 3 Requirem …

Read Story

WannaCry Lives On! Have we Learned Anything?

hacking-964903_640

As the one-year anniversary of the most widely spread ransomware attack approaches, WannaCry is still active in the wild. Fortunately, so is the “kill switch” domain, rendering the attack mostly benign. During the WannaCry outbreak MalwareTech, a UK-based researcher, discovered that W …

Read Story

The NIST Cybersecurity Framework Functions - Detect

black-and-white-computer-device-163017

The third function that will be discussed is Detect. After we have identified the assets within our organization and have implemented ways on how to protect those assets, we need to implement measure on how to Detect cybersecurity incidents that may occur. This can be achieved with us …

Read Story

Data Classification - Understanding the Basics

censorship-610101_1280

In the ever-expanding world of PCI DSS, and the emerging GDPR world, data classification is a concern that is often left unattended. Organizations who work with Compass IT often find the value in tagging data that together we deem valuable if manipulated, stolen or destroyed. Organiza …

Read Story

The NIST Cybersecurity Framework Functions - Protect

hacker-1944688_1280

As promised in last month’s blog about the NIST Cybersecurity Framework Identify function, this month we are discussing the Protect function. After an organization has addressed the five categories within the Identify function (Asset Management (ID.AM), Business Environment (ID.BE), G …

Read Story

New Version of the Critical Security Controls Released

hacker-1944688_1280

Last month, the Center for Internet Security (CIS) released version 7.0 of the Top 20 Critical Security Controls. This represents a significant revision from the previous version (6.1) and introduces some interesting changes. Before we dig into the changes to the controls, if you are …

Read Story

Subscribe by email