Compass IT Compliance Blog / Cybersecurity (14)

Ransomware - The Imminent Threat to Your Data

internet-1593378_1920

In today’s computer driven society, technology is evolving at such a rapid rate that many people can’t keep pace with the changes. While these technological advances are new and exciting, they also lead to some serious security problems with negative consequences for today’s users.

Read Story

How Information Security Approach Affects Organizational Culture

achievement-3468104_1920

In this technological era where big data drives innovation and companies are expanding the boundaries of their offerings, workforce, and geographic locations through automation, it’s easy to lose sight of some of the more human aspects of organizational operations.

Read Story

Cybersecurity - Back to Basics

cyber-security-3374252_1920

Welcome to summer in New England! Or close to it at any rate. Today I would like to talk about a slightly different topic than usual on these blogs. For those of you that have read past entries, you know they are full of good advice on not many different compliance issues.

Read Story

CIS Critical Security Controls V7.1 - What's New?

skyscraper-3184798_1920

The Center for Internet Security (CIS) is a non-profit information technology entity with a mission to safeguard organizations from cyber threats. CIS has created what’s known as the CIS Top 20 Controls. These are the global standard best practices for securing information technology …

Read Story

Emotet Malware Warning From MS-ISAC

pexels-photo-97077

In this blog we’ll be discussing the Emotet malware program, particularly regarding the most recent and ongoing malspam campaign using the Multi-State Information Sharing and Analysis Center (MS-ISAC), and State, Local, Tribal, and Territorial (SLTT) branding.

Read Story

The NIST Cybersecurity Framework – The Recover Function

analytics-3088958

You made it! The hard work and determination to protect your organizational assets has paid off. You were able Respond to the cybersecurity event and mitigate the long-lasting damages that the cybercriminals tried to employ on you. Now that the event is contained and eradicated, recov …

Read Story

Subscribe by email