What is PII? Important Distinctions in Information Security
by Sarina Resnick on June 12, 2017 at 11:00 AM
What Is PII? PII is the acronym that keeps getting thrown around but never seems fully understood. It stands for "Personally Identifiable Information." Knowing what it stands for is just as important as knowing why it is becoming increasingly important to the integrity of your cyberse …
WanaCry Ransomware: A Survival Guide
by George Seerden on June 7, 2017 at 10:07 AM
What is WannaCry Ransomware? WanaCrypt0r, WanaDecryt0r, and WannaCry are different names for essentially the same thing. Technically WanaCrypt0r is name of the executable, WanaDecrypt0r is the name of the decrypting utility, and WannaCry is what it makes people want to do. But, for mo …
PCI Compliance Levels: How To Determine What Level You Are
by William DePalma on May 16, 2017 at 10:48 AM
Are you considering taking credit cards as a form of payment? Are you already taking credit cards and have experienced substantial growth in your annual volume? What are your responsibilities as a Merchant or Service Provider? Hold on to your seat as it’s a fun process that needs to b …
Ransomware Alert: New Strain in the Wild
by Derek Boczenowski on May 12, 2017 at 4:23 PM
Friends of Compass, There is a rash of ransomware attacks being reported that has affected as many as 74 countries. One of the largest reported sectors is hospitals within the United Kingdom, with at least 16 hospitals affected. Many hospitals report being disabled and unable to perfo …
Phishing Examples: Google Docs Scam
by Josh McDonald on May 4, 2017 at 2:16 PM
Friends of Compass, On this blog, phishing examples are nothing new. But, it is our job to share this information with you so that you stay alert, know what the threats are, and what you can do in the event you fall victim to an attack. You may have seen the recent reports of a Phishi …
Social Engineering Techniques, the Stealth Bomber, and You!
by Geoff Yeagley on May 2, 2017 at 9:45 AM
We write a lot on this blog about the different Social Engineering Techniques that are being used by bad actors today. We do this to educate you on the threats that are out there and the methods that these organizations will use to achieve their main goal: Steal sensitive information …