Compass IT Compliance Blog / Information Security (4)

Top 5 vCISO Takeaways of 2019

A woman works on a mac computer

As the end of the year rapidly approaches, everyone does their best to reflect upon the prior year (or decade, since it is the end of one of those as well) and see what they might have learned from the past year. What were the top songs, top movies, and top vacation destinations, just …

Read Story

Colorado Protections for Consumer Data Privacy Act - What to Know

denver-69207_1920

Last spring, Colorado followed the actions of several other states and countries by taking steps to enact legislation that helps consumers protect their data. The state passed the Protections for Consumer Data Privacy Act (HB18-1128). Signed into law on May 29, 2018, and taking effect …

Read Story

IT Security in the Professional Sports World

athletes-1846039_1920

This blog will be the first in a multi-part informational blog series on professional sport team’s information technology (IT) security hurdles and the very public issues that have occurred.

Read Story

How Information Security Approach Affects Organizational Culture

achievement-3468104_1920

In this technological era where big data drives innovation and companies are expanding the boundaries of their offerings, workforce, and geographic locations through automation, it’s easy to lose sight of some of the more human aspects of organizational operations.

Read Story

Defending From Within

hacking-2903156_1280

Hackers, Ransomware, and denial of service attacks get all of the attention when it comes to Information Security. However, you will quite often hear IT Security personnel state that the biggest threat to an organization is from within. With this in mind, if an organization’s biggest …

Read Story

Information Security - Don't Just Check the Box!

checklist-2077018_1280

Compliance and security at times go hand in hand. In most cases, being compliant does not truly ensure you are being secure. I titled this blog “Don’t just check the box!” because the thinking that if your company can check the compliance box it will be secure enough is just not true. …

Read Story

Subscribe by email