Compass IT Compliance Blog / Cybersecurity (16)

Online Banking for Businesses – How to protect yourself

Credit-Card-Computer-Purchase.jpg

One of the biggest areas that we see attacks on is the business online banking customer. There has been a marked increase in trying to compromise these accounts, primarily to abscond with the funds within the accounts, but also to execute identity theft as well. Many of these attacks …

Read Story

Urgent Cisco Vulnerability Identified - What You Need To Know!

file0002120440786.jpg

We know security is important to you and it has come to our attention there is a vulnerability affecting the Cisco ASA operating system, specifically the SSL VPN (CVE-2018-0101). The vulnerability allows an attacker to take remote control of the system and is very high risk. This vuln …

Read Story

Ransomware Examples - Locky is Back and Worse Than Ever!

A keyhole within a line of code

For a period of about 18 months, Ransomware dominated the news related to information security. Companies of all sizes and verticals were under attack by cybercriminals that were looking to make a quick buck, or a lot of bucks in some cases. Then, all of the sudden, Ransomware sort of …

Read Story

Bluetooth Security - What You Need to Know About the BlueBorne Attack

bluetooth-1690677_1280.png

Think about how much we use Bluetooth daily. Whether we are connecting our smartphones to a wireless speaker, to our car to make handsfree calls or to our Apple Watch, we use Bluetooth on a very frequent basis. In the world of Information Security, the more you use something and the m …

Read Story

Federal Contractors and Subcontractors - Complying with NIST 800-171

binding-contract-948442_1280.jpg

With just under 3 months left to go in the year, contractors and subcontractors that provide products and/or services to the Federal Government are scrambling to meet its end of year deadline or risk losing the ability to work on government contracts.

Read Story

Urgent Alert - New Spear Phishing Attack

hacking-964903_640.png

It has come to our attention that cyber criminals have begun exploiting a vulnerability within Microsoft PowerPoint’s Object Linking and Embedding (OLE) interface to evade antivirus detection in an attempt to silently install malware applications on Windows based computer systems.

Read Story

Subscribe by email