Elements of Quality Security and Privacy Awareness Training
by Patrick Hughes on September 3, 2020 at 3:00 PM
As information technology professionals, we often hear the term security awareness training. Most organizations know they need to be conducting continuous security awareness training, whether the goal is to check a box for a framework/regulation they must adhere to, or they genuinely …
What Are DKIM, SPF, & DMARC? Why Are They So Important?
by David Bienkiewicz on June 5, 2020 at 3:30 PM
If you are asking yourself, "what is DKIM, DMARC, and SPF", you have come to the right place. DKIM, SPF, and DMARC are all email authentication technologies that are free to use for your organization. These technologies can be very useful for your organization and for domains out in t …
Security Culture Through the Eyes of a Young Marine
by Ron Scarborough on May 27, 2020 at 1:00 PM
Many years ago, I was enlisted in the Marine Corps. As a young Marine I was given the opportunity to take part in the Marine Security Guard program. I received my marching orders and was off to Quantico, Virginia, for my training. Afterwards I was shipped off to the United States emba …
Home Network Security for Remote Workers
by Adam Cravedi on April 8, 2020 at 1:00 PM
The COVID-19 pandemic has presented unprecedented global challenges at all levels of society today, from healthcare to social concerns. With much of the East and West Coasts experiencing government-enforced social distancing lock downs, businesses have had to scramble to turn their da …
Grocery Stores – A Hidden Gem for Cyber Criminals?
by Nicholas Foisy on March 25, 2020 at 11:00 AM
Following the recent closures of many public-facing businesses in the United States (and across the globe) in response to the spread of Coronavirus (COVID-19), this week’s blog post will discuss some of the cybersecurity challenges and vulnerabilities facing one of the only industries …
Microsoft Office Add-ins, Reason for Concern?
by Adam Cravedi on February 12, 2020 at 1:00 PM
This question came into Compass IT Compliance from a client the other day: “How risky are 3rd party plugins? Should I be concerned about them?”. I had to stop and think about this for a while. In my years of working on vulnerability and penetration testing projects for Compass IT Comp …