Compass IT Compliance Blog

PCI Requirement 6 - Patches and Scanning and Coding, Oh My!

2017-04-27healthcare-ransomware

This is the sixth blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To view the previous posts in this series, follow the links below: PCI Requirement 1 - Defending the Wall PCI Requirement 2 - Change Your De …

Read Story

Information Security - Don't Just Check the Box!

checklist-2077018_1280

Compliance and security at times go hand in hand. In most cases, being compliant does not truly ensure you are being secure. I titled this blog “Don’t just check the box!” because the thinking that if your company can check the compliance box it will be secure enough is just not true. …

Read Story

The NIST Cybersecurity Framework Functions – Respond

hacking-964903_640

This is part 4 of our ongoing blog series on the NIST Cybersecurity Framework. To view our previous posts in this series, please see the links below: NIST Cybersecurity Framework - Overview and Identify NIST Cybersecurity Framework - Protect NIST Cybersecurity Framework - Detect After …

Read Story

PCI Requirement 5 - Update and Scan

cyber-security-3400657_1280

This is the fifth blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To read the previous posts in this series, click on the links below: PCI Requirement 1 PCI Requirement 2 PCI Requirement 3 PCI Requirement 4 …

Read Story

PCI Requirement 4 – Hide in Plain Sight

business-code-codes-207580

This is the fourth blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To read previous posts in this series, click on the links below: PCI DSS Requirement 1 PCI DSS Requirement 2 PCI DSS Requirement 3 Requirem …

Read Story

WannaCry Lives On! Have we Learned Anything?

hacking-964903_640

As the one-year anniversary of the most widely spread ransomware attack approaches, WannaCry is still active in the wild. Fortunately, so is the “kill switch” domain, rendering the attack mostly benign. During the WannaCry outbreak MalwareTech, a UK-based researcher, discovered that W …

Read Story

Subscribe by email