Compass IT Compliance Blog / Cybersecurity (14)

Top 5 vCISO Takeaways of 2019

A woman works on a mac computer

As the end of the year rapidly approaches, everyone does their best to reflect upon the prior year (or decade, since it is the end of one of those as well) and see what they might have learned from the past year. What were the top songs, top movies, and top vacation destinations, just …

Read Story

3 Keys to Getting Your Cybersecurity Program Back on Track

new-years-eve-1953253_1920

2020 is finally here, whether we are ready for it or not! With the new year brings new challenges to organizations across all industries. With technologies on the rise and criminals only gaining more and more resources, organizations may struggle to keep up in 2020.

Read Story

Nest Cameras – Basic Defense In Depth

camera-1219748_1920

I’m sure many of you have seen or heard of the recently released viral video showing a young girl being yelled at in her room via her internet connected Nest camera. Obviously, this was on a home network, but it occurred to me that a large amount of commercial entities also have inter …

Read Story

IT Security in the Professional Sports World

athletes-1846039_1920

This blog will be the first in a multi-part informational blog series on professional sport team’s information technology (IT) security hurdles and the very public issues that have occurred.

Read Story

Macs Can Get Viruses?

apple-1853259_1920

Through my work at Compass IT Compliance I was recently contacted to deal with an issue regarding a Mac computer acting suspiciously. What does suspicious mean? In the case of this particular Mac, whenever a user tried to open the Safari web browser they were getting directed to the h …

Read Story

Ransomware - The Imminent Threat to Your Data

internet-1593378_1920

In today’s computer driven society, technology is evolving at such a rapid rate that many people can’t keep pace with the changes. While these technological advances are new and exciting, they also lead to some serious security problems with negative consequences for today’s users.

Read Story

Subscribe by email