Compass IT Compliance Blog / Cybersecurity (16)

The NIST Cybersecurity Framework Functions - Protect

hacker-1944688_1280

As promised in last month’s blog about the NIST Cybersecurity Framework Identify function, this month we are discussing the Protect function. After an organization has addressed the five categories within the Identify function (Asset Management (ID.AM), Business Environment (ID.BE), G …

Read Story

New Version of the Critical Security Controls Released

hacker-1944688_1280

Last month, the Center for Internet Security (CIS) released version 7.0 of the Top 20 Critical Security Controls. This represents a significant revision from the previous version (6.1) and introduces some interesting changes. Before we dig into the changes to the controls, if you are …

Read Story

Online Banking for Businesses – How to protect yourself

Credit-Card-Computer-Purchase.jpg

One of the biggest areas that we see attacks on is the business online banking customer. There has been a marked increase in trying to compromise these accounts, primarily to abscond with the funds within the accounts, but also to execute identity theft as well. Many of these attacks …

Read Story

Urgent Cisco Vulnerability Identified - What You Need To Know!

file0002120440786.jpg

We know security is important to you and it has come to our attention there is a vulnerability affecting the Cisco ASA operating system, specifically the SSL VPN (CVE-2018-0101). The vulnerability allows an attacker to take remote control of the system and is very high risk. This vuln …

Read Story

Ransomware Examples - Locky is Back and Worse Than Ever!

A keyhole within a line of code

For a period of about 18 months, Ransomware dominated the news related to information security. Companies of all sizes and verticals were under attack by cybercriminals that were looking to make a quick buck, or a lot of bucks in some cases. Then, all of the sudden, Ransomware sort of …

Read Story

Bluetooth Security - What You Need to Know About the BlueBorne Attack

bluetooth-1690677_1280.png

Think about how much we use Bluetooth daily. Whether we are connecting our smartphones to a wireless speaker, to our car to make handsfree calls or to our Apple Watch, we use Bluetooth on a very frequent basis. In the world of Information Security, the more you use something and the m …

Read Story

Subscribe by email