Compass IT Compliance Blog

How to Secure WiFi in 5 Simple Steps

blogging-336375_640.jpg

The recent reports of rising cyber-attacks throughout the world have many businesses and people investigating ways that they can improve the cybersecurity of their work and home environments. Since the inception of the 802.11 protocols nearly 20 years ago, WiFi has become more prevale …

Read Story

Why You Need A PCI ROC

money-256314_1280.jpg

In one of our first blog posts, we talked about "What is a PCI ROC?". This post covered the basics of a PCI Report on Compliance, discussed which merchants and service providers take part in the PCI ROC process, and how a ROC differs from a Risk Assessment. Today, I want to share some …

Read Story

The Importance of IT Policies and Procedures

binding-contract-948442_1280.jpg

We talk all the time and hear in the news all the time about recent attacks that take place. Whether it is stolen credit card data or the latest strain of Ransomware that hits the market, most of the news that we hear has to do with bad actors stealing information from the outside.

Read Story

Ransomware - The Hurricane of Information Security

key-west-86025_640.jpg

I love how they name different hurricanes and honestly, outside of my own name, I would love to see a hurricane named Hurricane Ransomware. If you are like me and have the privilege of living in Florida, you recently experienced the joy of preparing for a major storm, Hurricane Matthe …

Read Story

Cybersecurity Awareness Month - People, Process, and Technology

man-1187171_1280-1.jpg

Welcome to Cybersecurity Awareness Month! As you know, every October is Cybersecurity Awareness Month. For me, every month here at Compass is Cybersecurity Awareness Month as we spend a significant amount of time educating and empowering our customers and prospects on how to mitigate …

Read Story

Infosec and Financial Institutions: New York's Proposed Legislation

bank-hotel-895112_640.jpg

Financial Institutions are critical to the foundation of the economy of this country. If you think about it, financial institutions across the country house the wealth of this country and are always under attack. From true brute force hacking to phishing emails, bad actors are relentl …

Read Story

Subscribe by email