Compass IT Compliance Blog / Cybersecurity (10)

OWASP Top 10: Why Compliance to OWASP Matters

OWASP Top 10: Why Compliance to OWASP Matters

During a recent web application penetration test, my Compass IT Compliance colleague Jesse Roberts was quickly able to identify and exploit a coding vulnerability on a client’s public facing web portal. As part of the engagement, Jesse was initially granted “standard user” access to t …

Read Story

Only YOU Can Prevent Cyberattacks This October (And Beyond)

Smokey the Bear stands next to a sign that reads "Fire Danger: Moderate"

Some of you may be old enough to remember Smokey the Bear. Created in 1944, the Smokey Bear Wildfire Prevention campaign is the longest-running public service advertising campaign in U.S. history. In 1947, Smokey’s slogan became "Remember... Only YOU Can Prevent Forest Fires".

Read Story

MSP Breaches Opening the Door to Further Attacks on Clients

A hand stops a row of dominoes from falling

Is your Managed Service Provider (MSP) protecting yours and your client’s data? Are you regularly assessing your MSP and the rest of your vendors? It is no secret that hackers have gained access to more and larger companies over the past few years, but a new malicious tactic is coming …

Read Story

Access Control to Combat Domestic and Global Threats

A map shows a connected Earth as spokes connect one point to another

By now, most cybersecurity professionals have heard of the term access control. Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. Access control is comprised of two main components: authentication …

Read Story

What Does a Passwordless Future Look Like?

A man logs into Instagram on his cellphone

Passwords have served as a critical element in the work we do here at Compass IT Compliance since our founding over a decade ago. Whether it is educating individuals on the best practices for developing strong passwords, creating a password policy, utilizing automated programs to atte …

Read Story

Cybersecurity Controls & Configurations – Are You Locking Your Doors?

A hotel door with large locking mechanisms

Summertime is the peak time for people to go on vacation. The kids are off from school and the weather is finally nice in most of the country. When you go on vacation, no matter how far you travel, there are certain precautions that you take to ensure that your home is safe while you …

Read Story

Subscribe by email