Compass IT Compliance Blog / Ransomware (2)

Revisiting the Apache Log4j Vulnerability

Apache Log4j Vulnerability

By now, most are aware of the Apache Log4j vulnerability that was announced in December of 2021. The exposure is widespread in Java applications, and I have been discovering that many companies are affected by it. Remediation is imperative to ensure that attackers do not exploit affec …

Read Story

Ransomware Disrupting Your Beer Supply

Ransomware Disrupting Your Beer Supply

When brainstorming blog topics, it often helps to find intersections between your profession and your personal interests. In this case, that intersection is cybersecurity and brewing beer, respectively. But what could beer possibly have to do with cybersecurity?

Read Story

Traditional Antivirus vs. Endpoint Detection Response (EDR)

Traditional Antivirus vs. Endpoint Detection Response (EDR)

While there are many antivirus solutions available on the market, we know that not every solution can detect and remove every type of malware. Therefore incident response tools are important to keep in your arsenal.

Read Story

Cyberattacks on the Rise – Everyone Pays the Price!

Cyberattacks on the Rise – Everyone Pays the Price!

It is no secret that cyberattacks have been rising over the past decade. A 2019 Accenture and Ponemon Institute report found that security breaches increased by 11% since 2018 and 67% since 2014. To meet this rising challenge/opportunity, cyber liability insurance (cyber insurance) ha …

Read Story

Blackbaud Breach – Time to Review Your Vendors

Blackbaud Breach – Time to Review Your Vendors

It has recently been reported that Blackbaud, one of the world’s largest providers of education administration, fundraising, and financial management software for nonprofits suffered a ransomware attack back in May of 2020.

Read Story

Ransomware - The Imminent Threat to Your Data

internet-1593378_1920

In today’s computer driven society, technology is evolving at such a rapid rate that many people can’t keep pace with the changes. While these technological advances are new and exciting, they also lead to some serious security problems with negative consequences for today’s users.

Read Story

Subscribe by email