Compass IT Compliance Blog / Incident Response (2)

Traditional Antivirus vs. Endpoint Detection Response (EDR)

Traditional Antivirus vs. Endpoint Detection Response (EDR)

While there are many antivirus solutions available on the market, we know that not every solution can detect and remove every type of malware. Therefore incident response tools are important to keep in your arsenal.

Read Story

SolarWinds SUNBURST Hack – And You Thought 2020 Couldn’t Get Any Worse

SolarWinds SUNBURST Hack – And You Thought 2020 Couldn’t Get Any Worse

Co-authored by Derek Morris, Senior Information Technology Security Professional SUNBURST – add this to the list of all the wonders this year has brought. Are you one of the 18,000 customers infected by SUNBURST? Have you been ordered by the US Department of Homeland Security to quara …

Read Story

Blackbaud Breach – Time to Review Your Vendors

Blackbaud Breach – Time to Review Your Vendors

It has recently been reported that Blackbaud, one of the world’s largest providers of education administration, fundraising, and financial management software for nonprofits suffered a ransomware attack back in May of 2020.

Read Story

The FFIEC Gives the BCP Booklet a Facelift

architectural-design-architecture-banks-barclays-351264

From BCP to BCM The Federal Financial Institutions Examination Council (FFIEC) Information Technology Examination Handbook (IT Handbook) is comprised of several IT booklets for use by examiners. In November of 2019, the FFIEC member agencies replaced the dated “Business Continuity Pla …

Read Story

Incident Response for Real

christian-wiediger-WkfDrhxDMC8-unsplash

Organizations are finally beginning to implement some type of incident response plans. Most of these plans revolve around NIST 800-61 Computer Security Incident Handling Guide. This guide is an amazing framework to help your organization get something in place, however, just referenci …

Read Story

Macs Can Get Viruses?

apple-1853259_1920

Through my work at Compass IT Compliance I was recently contacted to deal with an issue regarding a Mac computer acting suspiciously. What does suspicious mean? In the case of this particular Mac, whenever a user tried to open the Safari web browser they were getting directed to the h …

Read Story

Subscribe by email