Compass IT Compliance Blog / Information Security (9)

Why Your Staff Needs Security Awareness Training Now!

security-265130_640.jpg

We have all been there. We are sitting at our desks, doing our work and the email pops up. Usually from our IT Department or our boss, the email tells us that we need to complete our annual Security Awareness Training within the next 2 weeks. What's the first thought that goes through …

Read Story

Phishing - Even the Security Folks get Targeted Part II

Phishing - Even the Security Folks get Targeted Part II

Phishing schemes come in all different forms, shapes, and sizes. Hackers and thieves are smart and they will do whatever they think they can do to get access to your sensitive information. Some of these methods include emails, social media "like farming", pre-text calling, etc. The co …

Read Story

Phishing Emails, Ransomware, and the Government

Phishing Emails, Ransomware, and the Government

Every day that you turn on the news, there is another story or article about a Ransomware attack that has taken place. Most recently, these stories are focused around healthcare organizations where significant ransoms have been demanded. What we haven't heard much about, but is just a …

Read Story

How Phishing Emails Can Cost You $40,000

An infographic detailing how to prevent ransomware

To me, math is what makes the world work. If you think about it, just about everything involves math, especially when it comes to business. When I was going through my MBA program, I really underestimated the amount of math and calculations that you needed to perform for essentially e …

Read Story

Phishing Examples: Even the Security Folks Get Targeted

An example of a phishing email shows a scammy link path

We all hear about phishing emails. All the time. In fact, there is a never ending dialogue about phishing emails in the news, the most recent one being the IRS emailing to say that you owe them money and they are going to arrest you if you don't pay immediately. As a side note, this i …

Read Story

IT Risk Assessment and the SANS Top 20 - Part IV

IT Risk Assessment and the SANS Top 20 - Part IV

I know, I know. Before you even say it, they are called the Center for Internet Security Critical Security Controls, not the SANS Top 20 anymore. But, everyone knows them as the SANS Top 20 and often times still refers to them by this name which is why I stuck with it for the final pa …

Read Story

Subscribe by email