‘Tis the Season – Don’t Fa La La to Holiday Scams
by Kelly O’Brien on December 1, 2021 at 2:30 PM
As another holiday season quickly approaches and holiday gift lists are started, the scammers are also looking to deck the halls during one of their favorite times of the year. As many begin planning for shopping and holiday festivities, unscrupulous scammers are presented with ample …
Latest Update in Vulnerabilities (SeriousSAM, PrintNightmare)
by Danielle Corsa on July 29, 2021 at 3:30 PM
In this week's blog post, Compass IT Compliance Cybersecurity Professional Danielle Corsa analyzes several recent Microsoft vulnerabilities.
Protecting SCADA Systems from Cyber-Attacks
by Felix Alcala on June 24, 2021 at 3:00 PM
Supervisory control and data acquisition (SCADA) is a control system architecture comprising computers, networked data communications and graphical user interfaces (GUI) for high-level process supervisory management, while also comprising other peripheral devices like programmable log …
Mail Order DNA Testing – Protecting Your Genetic Data
by Danielle Corsa on February 24, 2021 at 1:00 PM
Lately I have been getting bombarded with social media ads tailored toward DNA collection services. Why is this? My best guess is a simple search for anything diet/exercise/health related on my end has now triggered an onslaught of advertisements for companies that, if you give them a …
Hacker Tries to Poison Florida Water Supply
by CJ Hurd on February 18, 2021 at 1:00 PM
It seems like we are hearing about a new cyber-attack at least weekly as of late. It is becoming exhausting and has created such an unsettled feeling in almost any vertical that uses technology. One news headline that caught my attention recently was an attempt in Florida to poison th …
9 Easy Steps to Create Strong Passwords
by Nicholas Foisy on April 15, 2020 at 4:30 PM
Passwords serve as the gatekeeper to an organization’s data and systems, keeping out unauthorized users and only allowing the right people to enter. The strength of an organization’s passwords can often be the deciding factor to whether they suffer a breach or data disaster.