Compass IT Compliance Blog / Security Awareness Training (8)

Phishing Examples: Even the Security Folks Get Targeted

An example of a phishing email shows a scammy link path

We all hear about phishing emails. All the time. In fact, there is a never ending dialogue about phishing emails in the news, the most recent one being the IRS emailing to say that you owe them money and they are going to arrest you if you don't pay immediately. As a side note, this i …

Read Story

Social Engineering - Mitigating Your Risk

Social Engineering - Mitigating Your Risk

As we look into 2016 and what trends are going to take place this year in the world of Information Security, there is one thing that we can predict with significant confidence: Employees will remain the biggest threat to your Information Security Program and ultimately the safety of t …

Read Story

IT Security vs. Regulatory Compliance: Which One Came First?

IT Security vs. Regulatory Compliance: Which One Came First?

Security or Compliance. Which one should we focus on? On the surface, this almost sounds like the question of which came first, the chicken or the egg. But if we dig deeper, we start to see that while they are similar and have similar goals, they can be very different in how they are …

Read Story

Security Awareness Training is No Joke!

Without a doubt, almost every type of IT audit contains a section on security awareness training. And in many companies, it is a weakness that can be exploited easier than trying to hack a firewall or compromise a server. In many cases, it can be as easy as sending an email or making …

Read Story

Security Awareness Training: The First Line of Defense

A group of business professionals debate at a meeting

Compass IT security auditors are often asked if there is a single “most important” factor involved in safeguarding a business’s data assets.

Read Story

Subscribe by email