Compass IT Compliance Blog / Cybersecurity (12)

Protecting SCADA Systems from Cyber-Attacks

Protecting SCADA Systems from Cyber-Attacks

Supervisory control and data acquisition (SCADA) is a control system architecture comprising computers, networked data communications and graphical user interfaces (GUI) for high-level process supervisory management, while also comprising other peripheral devices like programmable log …

Read Story

Mail Order DNA Testing – Protecting Your Genetic Data

Mail Order DNA Testing – Protecting Your Genetic Data

Lately I have been getting bombarded with social media ads tailored toward DNA collection services. Why is this? My best guess is a simple search for anything diet/exercise/health related on my end has now triggered an onslaught of advertisements for companies that, if you give them a …

Read Story

Hacker Tries to Poison Florida Water Supply

Water sink

It seems like we are hearing about a new cyber-attack at least weekly as of late. It is becoming exhausting and has created such an unsettled feeling in almost any vertical that uses technology. One news headline that caught my attention recently was an attempt in Florida to poison th …

Read Story

9 Easy Steps to Create Strong Passwords

A keyboard wrapped with a chain and lock

Passwords serve as the gatekeeper to an organization’s data and systems, keeping out unauthorized users and only allowing the right people to enter. The strength of an organization’s passwords can often be the deciding factor to whether they suffer a breach or data disaster.

Read Story

Can Microsoft Protect Small Businesses from Cyber Attacks?

The outside of Microsoft headquarters

The following is a guest blog post by Compass IT Compliance partner Spyglass MTG. Spyglass MTG uses proven integration methodologies and expert consultants to build and deploy Microsoft solutions leveraging Microsoft 365 (Office 365, Windows 10, and EM&S), Azure, and Data/AI.

Read Story

Grocery Stores – A Hidden Gem for Cyber Criminals?

Grocery Stores – A Hidden Gem for Cyber Criminals?

Following the recent closures of many public-facing businesses in the United States (and across the globe) in response to the spread of Coronavirus (COVID-19), this week’s blog post will discuss some of the cybersecurity challenges and vulnerabilities facing one of the only industries …

Read Story

Subscribe by email