Compass IT Compliance Blog

Social Engineering Techniques and How Yahoo Put Us All At Risk

Phishing Email Example.png

I read this article the other day that one of my colleagues passed on to me that said 91% of all cyber-attacks begin with a phishing email. That is an incredible number and one that should grab your attention and the attention of your Sr. Leadership team. As you dig further into the s …

Read Story

Vendor Management Requirements for Financial Institutions in New York

Vendor Management Requirements for Financial Institutions in New York

I recently wrote a blog post that discussed legislation in the State of New York that is set to take effect on January 1, 2017. This legislation will effect all financial institutions in the state around Cybersecurity and the development of a formal Cybersecurity program. Click here t …

Read Story

5 Quick Tips To Help With Information Security

security-265130_640.jpg

Information Security is a moving target. Once you "think" that you have it figured out, boom, here comes another new threat to knock you back on your heels and question just how strong your Information Security program is. That's the bad news. The good news is that we are going to giv …

Read Story

How to Secure WiFi in 5 Simple Steps

blogging-336375_640.jpg

The recent reports of rising cyber-attacks throughout the world have many businesses and people investigating ways that they can improve the cybersecurity of their work and home environments. Since the inception of the 802.11 protocols nearly 20 years ago, WiFi has become more prevale …

Read Story

Why You Need A PCI ROC

money-256314_1280.jpg

In one of our first blog posts, we talked about "What is a PCI ROC?". This post covered the basics of a PCI Report on Compliance, discussed which merchants and service providers take part in the PCI ROC process, and how a ROC differs from a Risk Assessment. Today, I want to share some …

Read Story

The Importance of IT Policies and Procedures

binding-contract-948442_1280.jpg

We talk all the time and hear in the news all the time about recent attacks that take place. Whether it is stolen credit card data or the latest strain of Ransomware that hits the market, most of the news that we hear has to do with bad actors stealing information from the outside.

Read Story

Subscribe by email