Compass IT Compliance Blog / Policies and Procedures (5)

Virtual Meeting Privacy & Consent

Virtual Meeting Privacy & Consent

Virtual workplace meetings are fantastic – a true time and money saver. No makeup, no pants, no shoes, no driving, no hassle! Big props to technology on that one.

Read Story

Security Culture Through the Eyes of a Young Marine

Two soldiers stand on a rocky mountain scape

Many years ago, I was enlisted in the Marine Corps. As a young Marine I was given the opportunity to take part in the Marine Security Guard program. I received my marching orders and was off to Quantico, Virginia, for my training. Afterwards I was shipped off to the United States emba …

Read Story

IT Asset Management – Acquisition of Assets

IT Asset Management – Acquisition of Assets

In part one of this IT asset management blog series, we discussed governance policies and procedures. In this second part to the blog series, we will discuss the process for acquisition of assets from reputable and vetted vendors. A lot has happened since part one was written, which a …

Read Story

Continuous Vulnerability Scanning Within Your Remote Network

Continuous Vulnerability Scanning Within Your Remote Network

By now, you are likely tired of reading similar blogs and watching the same webinars about how the workforce is scrambling to set up secure remote workstations for the employees they have remaining. The words “threat” and “risk” have been used continuously to inspire dread and instill …

Read Story

COVID-19: Is Management Asking the Right Questions?

COVID-19: Is Management Asking the Right Questions?

What if you are the owner or manager of a business in today’s world? A few weeks ago, our world was turned upside down – to say the least. Management’s focus shifted from business as usual to figuring out how to keep employees safe and company doors open for business (in-person or vir …

Read Story

9 Easy Steps to Create Strong Passwords

A keyboard wrapped with a chain and lock

Passwords serve as the gatekeeper to an organization’s data and systems, keeping out unauthorized users and only allowing the right people to enter. The strength of an organization’s passwords can often be the deciding factor to whether they suffer a breach or data disaster.

Read Story

Subscribe by email