Compass IT Compliance Blog / Information Security (2)

Cybersecurity Controls – Good, Cheap, Fast: Pick Two

A hand draws a 3 part venn diagram on a chalkboard

Nearly twenty years ago, I was working for the public transportation department in the town where I went to school. It was there that I was introduced to the new Marketing Director, who was among the first MBAs I had met. He laid something on me that was novel to me at the time but I …

Read Story

Businesses Can Learn From the Classified Pentagon Leak

An aerial view of the Pentagon

On April 14th, 2023, 21-year-old Massachusetts Air National Guardsman Jack Teixeira appeared in federal court, accused of leaking classified documents in a Discord group titled “Thug Shaker Central”. Facing charges under the 1917 Espionage Act, Jack is looking at potential decades in …

Read Story

Only YOU Can Prevent Cyberattacks This October (And Beyond)

Smokey the Bear stands next to a sign that reads "Fire Danger: Moderate"

Some of you may be old enough to remember Smokey the Bear. Created in 1944, the Smokey Bear Wildfire Prevention campaign is the longest-running public service advertising campaign in U.S. history. In 1947, Smokey’s slogan became "Remember... Only YOU Can Prevent Forest Fires".

Read Story

Access Control to Combat Domestic and Global Threats

A map shows a connected Earth as spokes connect one point to another

By now, most cybersecurity professionals have heard of the term access control. Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. Access control is comprised of two main components: authentication …

Read Story

Cybersecurity Controls & Configurations – Are You Locking Your Doors?

A hotel door with large locking mechanisms

Summertime is the peak time for people to go on vacation. The kids are off from school and the weather is finally nice in most of the country. When you go on vacation, no matter how far you travel, there are certain precautions that you take to ensure that your home is safe while you …

Read Story

Password Complexity – Going Beyond the Minimum Requirements

Password Complexity – Going Beyond the Minimum Requirements

As the frequency and scale of cyberattacks has risen sharply over the past decade, we as end users have been repeatedly asked (and often required) to increase the complexity of our passwords. Back when the internet was in its infancy, the idea of creating a complex and tough-to-guess …

Read Story

Subscribe by email