Compass IT Compliance Blog / Policies and Procedures (2)

Your Guide to Drafting a Data Retention Policy

Data Retention Policy

Each day, organizations across the globe handle massive amounts of information, and ensuring it's managed securely, compliantly, and efficiently is no walk in the park. The nitty-gritty of data retention, from knowing how long to keep specific files to wading through a maze of regulat …

Read Story

Tug-of-War: Balancing Security and Efficiency

Tug of War

I find it helpful when explaining principles to think in extremes. So, when it comes to the principle of securing a system, what is the most secure? Let us use this computer I am typing on as an example. Off. That is the most secure. Let us even take the battery out, unplug everything …

Read Story

MIME Sniffing: What Is It? What Are the Security Implications?

Mime Sniffing

Multipurpose Internet Mail Extension (MIME) sniffing has been in use for decades to allow a browser to render content when there is some question about what type of data the content contains. However, MIME sniffing can also open your organization and end users up to serious cybersecur …

Read Story

Businesses Can Learn From the Classified Pentagon Leak

An aerial view of the Pentagon

On April 14th, 2023, 21-year-old Massachusetts Air National Guardsman Jack Teixeira appeared in federal court, accused of leaking classified documents in a Discord group titled “Thug Shaker Central”. Facing charges under the 1917 Espionage Act, Jack is looking at potential decades in …

Read Story

What Is Password Spraying? How Can It Affect Customers?

Password Spraying

Brute force attacks like password spraying have been on the uptick recently, according to Microsoft's team of experts. Although only about 1% of these attacks are successful, they can be devastating. Affected companies often suffer serious financial and reputational damage.

Read Story

Not Using Multifactor Authentication? Your Days Are Limited!

MFA

Despite the fact the multifactor authentication (MFA) has been around for decades at this point, the majority of both business and personal logins only use it when absolutely necessary. The complaints are well known; it takes too long to login, if I forget my phone or token I can’t lo …

Read Story

Subscribe by email