Compass IT Compliance Blog

What is PII? Important Distinctions in Information Security

What is PII?

What Is PII? PII is the acronym that keeps getting thrown around but never seems fully understood. It stands for "Personally Identifiable Information." Knowing what it stands for is just as important as knowing why it is becoming increasingly important to the integrity of your cyberse …

Read Story

WanaCry Ransomware: A Survival Guide

hack-813290_1280.jpg

What is WannaCry Ransomware? WanaCrypt0r, WanaDecryt0r, and WannaCry are different names for essentially the same thing. Technically WanaCrypt0r is name of the executable, WanaDecrypt0r is the name of the decrypting utility, and WannaCry is what it makes people want to do. But, for mo …

Read Story

PCI Compliance Levels: How To Determine What Level You Are

PCI Compliance Levels Blog Post.png

Are you considering taking credit cards as a form of payment? Are you already taking credit cards and have experienced substantial growth in your annual volume? What are your responsibilities as a Merchant or Service Provider? Hold on to your seat as it’s a fun process that needs to b …

Read Story

Ransomware Alert: New Strain in the Wild

Ransomware Screenshot.jpg

Friends of Compass, There is a rash of ransomware attacks being reported that has affected as many as 74 countries. One of the largest reported sectors is hospitals within the United Kingdom, with at least 16 hospitals affected. Many hospitals report being disabled and unable to perfo …

Read Story

Phishing Examples: Google Docs Scam

Screenshot_20170503-212824.png

Friends of Compass, On this blog, phishing examples are nothing new. But, it is our job to share this information with you so that you stay alert, know what the threats are, and what you can do in the event you fall victim to an attack. You may have seen the recent reports of a Phishi …

Read Story

Social Engineering Techniques, the Stealth Bomber, and You!

delta-wings-62833_1280.jpg

We write a lot on this blog about the different Social Engineering Techniques that are being used by bad actors today. We do this to educate you on the threats that are out there and the methods that these organizations will use to achieve their main goal: Steal sensitive information …

Read Story

Subscribe by email