Compass IT Compliance Blog

Critical Security Control 19: The Incident Response Plan

A flow chart showing a cycle

In the world of Information Security, we have all heard of the Center for Internet Security Top 20 Critical Security Controls (CSC's) which is formerly known as the SANS Top 20. This is a list of the 20 IT Security Controls that an organization can implement to strengthen their IT Sec …

Read Story

Don't Let Ransomware Take Your Money: Use an Incident Response Plan!

Don't Let Ransomware Take Your Money: Use an Incident Response Plan!

I feel like all I have been writing about for the past month has been Ransomware. Obviously that is due to the fact that Ransomware is in the news all the time, every day, with new trends that are happening, new "victims" that are identified, and how these organized crime entities kee …

Read Story

Ransomware Alert: Big Business and the Evolution of Phising

Ransomware Alert: Big Business and the Evolution of Phising

Ransomware is certainly nothing new as it has been around for several years, however, it sure is gaining quite a bit of attention these days. In fact, Ransomware is gaining so much attention that on Friday, the FBI released an article discussing the fact that ransomware is on the rise …

Read Story

PCI Compliance - PCI DSS 3.2 By the Numbers

A keyhole within a line of code

PCI DSS 3.2 is coming and that means some changes for Merchants and Service Providers and the steps that they take to mitigate their risk of a breach involving credit and debit cards. While change is inevitable, change can still be difficult,especially when you are talking about all o …

Read Story

PCI Compliance - PCI DSS 3.2 is Coming!

PCI Compliance - PCI DSS 3.2 is Coming!

PCI DSS 3.2 is on the horizon with a release date expected to take place by the end of April. The PCI Data Security Standards is now considered a mature standard, which means that there will be incremental updates moving forward, not wholesale changes like we have experienced in the p …

Read Story

Phishing - Even the Security Folks get Targeted Part II

Phishing - Even the Security Folks get Targeted Part II

Phishing schemes come in all different forms, shapes, and sizes. Hackers and thieves are smart and they will do whatever they think they can do to get access to your sensitive information. Some of these methods include emails, social media "like farming", pre-text calling, etc. The co …

Read Story

Subscribe by email