What Does a Passwordless Future Look Like?
by Nicholas Foisy on July 28, 2022 at 1:00 PM
Passwords have served as a critical element in the work we do here at Compass IT Compliance since our founding over a decade ago. Whether it is educating individuals on the best practices for developing strong passwords, creating a password policy, utilizing automated programs to atte …
Cybersecurity Controls & Configurations – Are You Locking Your Doors?
by Geoff Yeagley on July 20, 2022 at 3:15 PM
Summertime is the peak time for people to go on vacation. The kids are off from school and the weather is finally nice in most of the country. When you go on vacation, no matter how far you travel, there are certain precautions that you take to ensure that your home is safe while you …
Weighing Your Multi-Factor Authentication Options
by Jeffrey Torrance on April 14, 2022 at 2:30 AM
At this point most of us have heard that securing our accounts with only passwords, no matter how complex, is not enough. Do not get me wrong, requiring strong passwords (14 or more characters, composed of uppercase and lowercase letters, and including symbols and numbers) is essentia …
Revisiting the Apache Log4j Vulnerability
by Danielle Corsa on March 3, 2022 at 1:00 PM
By now, most are aware of the Apache Log4j vulnerability that was announced in December of 2021. The exposure is widespread in Java applications, and I have been discovering that many companies are affected by it. Remediation is imperative to ensure that attackers do not exploit affec …
Password Complexity – Going Beyond the Minimum Requirements
by Peter Fellini on February 23, 2022 at 1:00 PM
As the frequency and scale of cyberattacks has risen sharply over the past decade, we as end users have been repeatedly asked (and often required) to increase the complexity of our passwords. Back when the internet was in its infancy, the idea of creating a complex and tough-to-guess …
Cyber & Physical Security: Why You Need Both
by Kelly O’Brien on January 27, 2022 at 2:30 PM
Cybersecurity attracts an enormous amount of attention due to cyberattacks that are publicized daily. As more devices are connected to the Internet, they become attractive targets for criminals; therefore, the attack surface increases exponentially.