Compass IT Compliance Blog / Information Security (4)

Colorado Protections for Consumer Data Privacy Act - What to Know

denver-69207_1920

Last spring, Colorado followed the actions of several other states and countries by taking steps to enact legislation that helps consumers protect their data. The state passed the Protections for Consumer Data Privacy Act (HB18-1128). Signed into law on May 29, 2018, and taking effect …

Read Story

IT Security in the Professional Sports World

athletes-1846039_1920

This blog will be the first in a multi-part informational blog series on professional sport team’s information technology (IT) security hurdles and the very public issues that have occurred.

Read Story

How Information Security Approach Affects Organizational Culture

achievement-3468104_1920

In this technological era where big data drives innovation and companies are expanding the boundaries of their offerings, workforce, and geographic locations through automation, it’s easy to lose sight of some of the more human aspects of organizational operations.

Read Story

Defending From Within

hacking-2903156_1280

Hackers, Ransomware, and denial of service attacks get all of the attention when it comes to Information Security. However, you will quite often hear IT Security personnel state that the biggest threat to an organization is from within. With this in mind, if an organization’s biggest …

Read Story

Information Security - Don't Just Check the Box!

checklist-2077018_1280

Compliance and security at times go hand in hand. In most cases, being compliant does not truly ensure you are being secure. I titled this blog “Don’t just check the box!” because the thinking that if your company can check the compliance box it will be secure enough is just not true. …

Read Story

The NIST Cybersecurity Framework Functions – Respond

hacking-964903_640

This is part 4 of our ongoing blog series on the NIST Cybersecurity Framework. To view our previous posts in this series, please see the links below: NIST Cybersecurity Framework - Overview and Identify NIST Cybersecurity Framework - Protect NIST Cybersecurity Framework - Detect After …

Read Story

Subscribe by email