Compass IT Compliance Blog

Urgent Cisco Vulnerability Identified - What You Need To Know!

file0002120440786.jpg

We know security is important to you and it has come to our attention there is a vulnerability affecting the Cisco ASA operating system, specifically the SSL VPN (CVE-2018-0101). The vulnerability allows an attacker to take remote control of the system and is very high risk. This vuln …

Read Story

PCI Requirements Explained - PCI Requirement 1 - Defending the Wall

PCI Requirements Explained - PCI Requirement 1 - Defending the Wall

This will be the first blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through the process of becoming compliance with the PCI Data Security Standard.

Read Story

PCI Compliance Requirements – January 31st is Quickly Approaching

A man holds out his credit card

Back in April of 2016, the latest version of the PCI Data Security Standards, version 3.2, was released. This release brought many changes to the PCI compliance requirements from the previous version, many of which we outlined in our April 2016 webinar. That release was 21 months ago …

Read Story

What is My Password? How About a Passphrase Instead?

password-866977_1280-1.jpg

Recently I met with a doctor who had as much paper with fancy lettering framed on their wall as anyone person could want. With all that impressive education looking down upon me, I watched as the doctor fumbled through password attempt after password attempt until ultimately and predi …

Read Story

PCI Compliance Checklist - A Tool to Help You Monitor Your Compliance

PCI Compliance Checklist Blog Post.png

Let’s face it, achieving PCI Compliance can be challenging. However, maintaining compliance with the latest version of the PCI Data Security Standards can be even more difficult. As part of the PCI Compliance process, there are many different things that an organization must do throug …

Read Story

Ransomware Examples - Locky is Back and Worse Than Ever!

A keyhole within a line of code

For a period of about 18 months, Ransomware dominated the news related to information security. Companies of all sizes and verticals were under attack by cybercriminals that were looking to make a quick buck, or a lot of bucks in some cases. Then, all of the sudden, Ransomware sort of …

Read Story

Subscribe by email