Compass IT Compliance Blog / Cybersecurity (19)

Infosec and Financial Institutions: New York's Proposed Legislation

bank-hotel-895112_640.jpg

Financial Institutions are critical to the foundation of the economy of this country. If you think about it, financial institutions across the country house the wealth of this country and are always under attack. From true brute force hacking to phishing emails, bad actors are relentl …

Read Story

Ransomware Update: The FBI is Coming, The FBI is Coming...

hacker-1446193_1280.jpg

Q: Why was the Computer so tired when it got home? A: Because it had a hard drive While the joke above is pretty funny (at least I thought it was), Ransomware is no joke. I have written several blog posts about Ransomware over the past 9 months and the dangers that these types of atta …

Read Story

Critical Security Control 19: The Incident Response Plan

A flow chart showing a cycle

In the world of Information Security, we have all heard of the Center for Internet Security Top 20 Critical Security Controls (CSC's) which is formerly known as the SANS Top 20. This is a list of the 20 IT Security Controls that an organization can implement to strengthen their IT Sec …

Read Story

Ransomware Alert: Big Business and the Evolution of Phising

Ransomware Alert: Big Business and the Evolution of Phising

Ransomware is certainly nothing new as it has been around for several years, however, it sure is gaining quite a bit of attention these days. In fact, Ransomware is gaining so much attention that on Friday, the FBI released an article discussing the fact that ransomware is on the rise …

Read Story

How Phishing Emails Can Cost You $40,000

An infographic detailing how to prevent ransomware

To me, math is what makes the world work. If you think about it, just about everything involves math, especially when it comes to business. When I was going through my MBA program, I really underestimated the amount of math and calculations that you needed to perform for essentially e …

Read Story

SSAE 16 SOC 2 Reports: What Are They?

SSAE 16 SOC 2 Reports: What Are They?

The SSAE 16 process, on the surface, sounds confusing. Most of this has to do with the terminology that is used, particularly the similarity of the terms used. In this blog post we are going to cover what the SSAE 16 is, what the different SOC Reports, what are the different types of …

Read Story

Subscribe by email