Compass IT Compliance Blog

Why Your Information Security Program Must Evolve...NOW!

Infosec Program Evolve Blog Post.png

Note: For the purposes of this blog post, we are going to be looking at breach data for the United States only in 2016 2016 was a record year when it comes to data breaches, according to the Identity Theft Resource Center. According to the center, there were a total of 1,093 breaches …

Read Story

What is Social Engineering? Part III

What is Social Engineering- Part III.png

What is Social Engineering? In this blog, I would like to shed some light on some other types of social engineering and provide some context on how to protect your business and self. In my first two blogs, I jumped into the Phishing and Spear Phishing pieces of a social engineering at …

Read Story

What is PCI Compliance?

What is PCI Compliance Blog Graphic.png

What is PCI Compliance? The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that regardless of size or number of transactions, any business that accepts, processes, stores or transmits credit card information maintains a secure …

Read Story

What is Social Engineering? The Phishing Email

Bad Phishing Email.png

What is Social Engineering? Part 2 The seemingly most common way for an attacker to use social engineering to gain entry, exfiltrate information or disrupt business is through email phishing. As I mentioned in the previous blog, slick tactics like using nicknames and shockingly proper …

Read Story

PCI Compliance Requirements: Some Tools to Help With Requirement 10!

PCI Compliance Requirements: Some Tools to Help With Requirement 10!

PCI Requirement 10 states: Track and monitor all access to network resources and cardholder data Logging mechanisms and the ability to track user activities are critical in preventing, detecting and minimizing the impact of a data compromise. The presence of logs in all environments a …

Read Story

HIPAA Compliance: 5 HIPAA Mistakes to Avoid!

5 HIPAA Mistakes to Avoid Blog Graphic.png

Here at Compass, we have seen a huge upswing in the number of HIPAA / HITECH risk assessments we have been conducting over the last year. Covered entities (Doctors, Hospitals, Pharmacies) and health plans are obviously storing PHI (protected health information) and ePHI (electronic pr …

Read Story

Subscribe by email