Compass IT Compliance Blog / Cybersecurity (8)

Safeguard Your Website From SEO Poisoning

Website URL

In today's digital landscape, search engine optimization (SEO) plays a crucial role in enhancing a website's visibility and attracting organic traffic. However, with every advancement in technology, new risks emerge. One such risk is SEO poisoning, a deceptive technique employed by ma …

Read Story

Cybersecurity Controls – Good, Cheap, Fast: Pick Two

A hand draws a 3 part venn diagram on a chalkboard

Nearly twenty years ago, I was working for the public transportation department in the town where I went to school. It was there that I was introduced to the new Marketing Director, who was among the first MBAs I had met. He laid something on me that was novel to me at the time but I …

Read Story

MIME Sniffing: What Is It? What Are the Security Implications?

Mime Sniffing

Multipurpose Internet Mail Extension (MIME) sniffing has been in use for decades to allow a browser to render content when there is some question about what type of data the content contains. However, MIME sniffing can also open your organization and end users up to serious cybersecur …

Read Story

Here's Why You Need A Password Manager

Password Manager

My mother bragged to me once that she is very good with technology. When I (her free tech support) raised an eyebrow at this, she pulled out a notepad that had handwritten notes on how to change the TV input from cable to the DVD player.

Read Story

Penetration Testing: Understanding Red, Blue, & Purple Teams

Red Team Blue Team

Data breaches are growing more expensive by the day. The average cost of a data breach is projected to reach $5 million by the end of 2023, up from $4.35 million in 2022. Penetration testing, or pen testing, helps you uncover unknown vulnerabilities and compliance gaps within your org …

Read Story

ProxyNotShell – Microsoft Exchange Exploit Explained

ProxyNotShell – Microsoft Exchange Exploit Explained

ProxyNotShell – What is it? Cyberattacks have become increasingly sophisticated and widespread in recent years, with hackers constantly finding new ways to infiltrate networks and steal sensitive information. One such vulnerability that has recently come to light is ProxyNotShell, ide …

Read Story

Subscribe by email