The Online Shopping Scam That Almost Duped a Security Professional
by Andrew Paull on December 10, 2020 at 3:15 PM
A great many things have changed in our daily lives since the COVID-19 pandemic began rampaging across the world at the beginning of this year. We have been collectively forced to adapt to working from home, schooling from home, shopping from home, and even receiving healthcare from h …
Situational Awareness – How Strong Are Your Spidey Senses?
by Peter Fellini on September 17, 2020 at 3:15 PM
How aware are we of our surroundings? What is happening around us that we are not aware of? Being more cognitive of our surroundings at work and at home can bring a lot of positive results to our corporate security posture.
What Are DKIM, SPF, & DMARC? Why Are They So Important?
by David Bienkiewicz on June 5, 2020 at 3:30 PM
If you are asking yourself, "what is DKIM, DMARC, and SPF", you have come to the right place. DKIM, SPF, and DMARC are all email authentication technologies that are free to use for your organization. These technologies can be very useful for your organization and for domains out in t …
Security Culture Through the Eyes of a Young Marine
by Ron Scarborough on May 27, 2020 at 1:00 PM
Many years ago, I was enlisted in the Marine Corps. As a young Marine I was given the opportunity to take part in the Marine Security Guard program. I received my marching orders and was off to Quantico, Virginia, for my training. Afterwards I was shipped off to the United States emba …
Microsoft Teams – The New Phishing Platform for Hackers?
by Jesse Roberts on March 13, 2020 at 1:00 PM
Many organizations are moving to cloud services for email, voice, and collaboration software. One of the major services being offered is Microsoft Teams. Teams is powerful collaboration software that allows users to share files, screen share, instant message, schedule meetings and voi …
Microsoft Office Add-ins, Reason for Concern?
by Adam Cravedi on February 12, 2020 at 1:00 PM
This question came into Compass IT Compliance from a client the other day: “How risky are 3rd party plugins? Should I be concerned about them?”. I had to stop and think about this for a while. In my years of working on vulnerability and penetration testing projects for Compass IT Comp …
.webp?width=2169&height=526&name=Compass%20regular%20transparent%20website%20(1).webp)
-1.webp?width=2169&height=620&name=Compass%20regular%20transparent%20website%20smaller%20(1)-1.webp)





