Compass IT Compliance Blog / Cybersecurity (8)

Cl0p’s MOVEit Attack Victim Count Continues to Climb

Cl0p MOVEit Attack

The cyber threat landscape continues to evolve at an alarming pace, posing ever-increasing challenges to businesses, governments, and individuals. A particularly troubling development in recent months has been the dramatic rise in MOVEit attacks attributed to the Cl0p ransomware group …

Read Story

How Secure Is Your Crypto Wallet?

Crypto Wallet

Over the past decade, cryptocurrency has shifted from a largely disregarded entity to a highly coveted investment class. Its appeal stems from its nature as a form of digital currency, protected by cryptography and complex computer networks, free from the influence of traditional cent …

Read Story

Temu App Poses Potential Data Risk for Consumers

Is Temu Safe?

The modern world is governed by apps. From communication to e-commerce, every aspect of our lives seems to be tied to digital platforms that promise convenience at the touch of a button. Among these apps, a newcomer has garnered significant attention lately.

Read Story

Safeguard Your Website From SEO Poisoning

Website URL

In today's digital landscape, search engine optimization (SEO) plays a crucial role in enhancing a website's visibility and attracting organic traffic. However, with every advancement in technology, new risks emerge. One such risk is SEO poisoning, a deceptive technique employed by ma …

Read Story

Cybersecurity Controls – Good, Cheap, Fast: Pick Two

A hand draws a 3 part venn diagram on a chalkboard

Nearly twenty years ago, I was working for the public transportation department in the town where I went to school. It was there that I was introduced to the new Marketing Director, who was among the first MBAs I had met. He laid something on me that was novel to me at the time but I …

Read Story

MIME Sniffing: What Is It? What Are the Security Implications?

Mime Sniffing

Multipurpose Internet Mail Extension (MIME) sniffing has been in use for decades to allow a browser to render content when there is some question about what type of data the content contains. However, MIME sniffing can also open your organization and end users up to serious cybersecur …

Read Story

Subscribe by email