Hacker Tries to Poison Florida Water Supply
by CJ Hurd on February 18, 2021 at 1:00 PM
It seems like we are hearing about a new cyber-attack at least weekly as of late. It is becoming exhausting and has created such an unsettled feeling in almost any vertical that uses technology. One news headline that caught my attention recently was an attempt in Florida to poison th …
9 Easy Steps to Create Strong Passwords
by Nicholas Foisy on April 15, 2020 at 4:30 PM
Passwords serve as the gatekeeper to an organization’s data and systems, keeping out unauthorized users and only allowing the right people to enter. The strength of an organization’s passwords can often be the deciding factor to whether they suffer a breach or data disaster.
Can Microsoft Protect Small Businesses from Cyber Attacks?
by Keith Tillier on March 27, 2020 at 1:00 PM
The following is a guest blog post by Compass IT Compliance partner Spyglass MTG. Spyglass MTG uses proven integration methodologies and expert consultants to build and deploy Microsoft solutions leveraging Microsoft 365 (Office 365, Windows 10, and EM&S), Azure, and Data/AI.
Grocery Stores – A Hidden Gem for Cyber Criminals?
by Nicholas Foisy on March 25, 2020 at 11:00 AM
Following the recent closures of many public-facing businesses in the United States (and across the globe) in response to the spread of Coronavirus (COVID-19), this week’s blog post will discuss some of the cybersecurity challenges and vulnerabilities facing one of the only industries …
How China's TikTok Spies On You & Your Kids
by George Seerden on March 19, 2020 at 1:00 PM
I have recently joined the ranks of people that aren’t really on social media anymore. So, much like veganism or cross-fit I have a responsibility to champion my new cause. I can’t claim to be an early un-adopter of social media and I left it for largely the same reasons as everyone e …
Microsoft Office Add-ins, Reason for Concern?
by Adam Cravedi on February 12, 2020 at 1:00 PM
This question came into Compass IT Compliance from a client the other day: “How risky are 3rd party plugins? Should I be concerned about them?”. I had to stop and think about this for a while. In my years of working on vulnerability and penetration testing projects for Compass IT Comp …