Compass IT Compliance Blog / Incident Response (3)

Macs Can Get Viruses?

apple-1853259_1920

Through my work at Compass IT Compliance I was recently contacted to deal with an issue regarding a Mac computer acting suspiciously. What does suspicious mean? In the case of this particular Mac, whenever a user tried to open the Safari web browser they were getting directed to the h …

Read Story

The Importance of Testing Your Business Continuity Plan

meeting-2284501_1920

Alright boys and girls, time to put your pencils down – we are taking a TEST! These may have been some of the scariest words you have ever had to hear. Personally, I will be thrilled if I never have to take another test and I know very few people who look forward to doing so.

Read Story

Response Operations: BCP, IRP, and DRP - Why You Need all Three

tom-grimbert-801120-unsplash

No well-managed organization is immune to the risk of the potential business interruptions that may occur from time to time, whether caused by acts of nature, malicious attack, or simple human error. Depending on the severity of the interruption and the organizational assets and busin …

Read Story

Why You Need an Incident Response Plan....Now!

Incident Response Blog Post Graphic.png

You’ve been breached. Now what? New vulnerabilities are coming fast and furious. The unfortunate truth for most of us is, it’s not a matter of IF we are breached, it’s a matter of WHEN we are breached. Replace the worry with a plan - an Incident Response Plan. What qualifies as an inc …

Read Story

Why You Need an Incident Response Plan Now!

A group of five business professionals celebrate

Two weeks ago, Compass IT Compliance had the opportunity to attend and present at the Card Not Present Conference in Orlando. This conference focuses on working with organizations that accept credit and debit cards either online, over the phone, or any other way where the credit or de …

Read Story

Critical Security Control 19: The Incident Response Plan

A flow chart showing a cycle

In the world of Information Security, we have all heard of the Center for Internet Security Top 20 Critical Security Controls (CSC's) which is formerly known as the SANS Top 20. This is a list of the 20 IT Security Controls that an organization can implement to strengthen their IT Sec …

Read Story

Subscribe by email