Compass IT Compliance Blog

PCI Requirements Explained - PCI Requirement 1 - Defending the Wall

PCI Requirements Explained - PCI Requirement 1 - Defending the Wall

This will be the first blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through the process of becoming compliance with the PCI Data Security Standard.

Read Story

PCI Compliance Requirements – January 31st is Quickly Approaching

A man holds out his credit card

Back in April of 2016, the latest version of the PCI Data Security Standards, version 3.2, was released. This release brought many changes to the PCI compliance requirements from the previous version, many of which we outlined in our April 2016 webinar. That release was 21 months ago …

Read Story

What is My Password? How About a Passphrase Instead?

password-866977_1280-1.jpg

Recently I met with a doctor who had as much paper with fancy lettering framed on their wall as anyone person could want. With all that impressive education looking down upon me, I watched as the doctor fumbled through password attempt after password attempt until ultimately and predi …

Read Story

PCI Compliance Checklist - A Tool to Help You Monitor Your Compliance

PCI Compliance Checklist Blog Post.png

Let’s face it, achieving PCI Compliance can be challenging. However, maintaining compliance with the latest version of the PCI Data Security Standards can be even more difficult. As part of the PCI Compliance process, there are many different things that an organization must do throug …

Read Story

Ransomware Examples - Locky is Back and Worse Than Ever!

A keyhole within a line of code

For a period of about 18 months, Ransomware dominated the news related to information security. Companies of all sizes and verticals were under attack by cybercriminals that were looking to make a quick buck, or a lot of bucks in some cases. Then, all of the sudden, Ransomware sort of …

Read Story

Bluetooth Security - What You Need to Know About the BlueBorne Attack

bluetooth-1690677_1280.png

Think about how much we use Bluetooth daily. Whether we are connecting our smartphones to a wireless speaker, to our car to make handsfree calls or to our Apple Watch, we use Bluetooth on a very frequent basis. In the world of Information Security, the more you use something and the m …

Read Story

Subscribe by email