Compass IT Compliance Blog

What is Social Engineering? Part I

What is Social Engineering Blog Graphic.png

This post will be the first part in a series of three blog posts that outlines some of the most common methods “hackers” use, from a very high level, to gain access to your systems though social engineering tactics. The next two posts will dig a bit deeper into the different methods, …

Read Story

Phishing Examples - Protect Yourself From Ransomware

Snip20170307_1.png

Fact: Phishing is the number one strategy that bad actors use to deliver malware to your organization. Fact: Phishing attacks come in a few different forms, known as phishing attacks and spear-phishing attacks. Fact: Ransomware is the most prevalent and dangerous form of Malware out t …

Read Story

Phishing Examples: Grizzly Steppe and What You Need To Know

Picture1.png

Within the past few years, Russian hacking has become a major issue in the United States. Not only has Russian Intelligence targeted political campaigns, they have also taken interest in other types of organizations who hold critical information. The Russians have developed a method o …

Read Story

HIPAA Compliance and Audit Controls - What You Need to Know

Add a little bit of body text.png

If you have read the news lately on healthcare and specifically HIPAA, you probably saw references to a recent HIPAA settlement between Memorial Health Systems of Florida and the Department of Health and Human Services (HHS). I’m sure the amount of the settlement caught your attention …

Read Story

The Key to Vendor Management: Truly Knowing Your Vendors!

Vendor_Management_Word_Cloud.png

In today's business climate, using vendors or third-party service providers is no longer a luxury, it has become a necessity. Organizations "outsource" key business functions every day for many reasons, some of which include:

Read Story

What is HIPAA Compliance? Just the Facts...

binding-contract-948442_1280.jpg

If you work in the healthcare industry, there is zero doubt that you have heard about HIPAA Compliance thousands and thousands of times. The importance of keeping electronic protected health information confidential is pounded into us on a daily basis and for good reason. But what is …

Read Story

Subscribe by email