Compass IT Compliance Blog / Security (10)

IT Risk Assessments and the SANS Top 20 - Part II

Electronic links lead to a blue digital lock

We are in part II of the blog series that we are doing on the SANS Top 20 Critical Security Controls (CSC) and why organizations are using these controls as a foundation for their IT Risk Assessments. This week we are going to cover CSC's 6 through 10 and provide a little overview of …

Read Story

IT Risk Assessment and the SANS Top 20 - Part I

Black and red cartoon bugs attack code

Last week we discussed the SANS Top 20 Critical Security Controls (CSC), what they are, and where they came from. This week we are going to start to dig into a handful of the Critical Security Controls to discuss what they are and why these controls are so important. In fact, industry …

Read Story

IT Risk Assessments and the SANS Top 20

IT Risk Assessments and the SANS Top 20

No matter what industry you are in, conducting a thorough IT Risk Assessment is critical to your organization for a number of reasons. First, it gives you a point in time measurement of how your IT Security posture compares to either various regulations or IT Security Frameworks.

Read Story

Social Engineering - What You Need to Know

Black and red cartoon bugs attack code

For those of us in the Information Security world, we hear terms thrown around all the time that are often interchanged, confused, and sometimes misused. One of those terms is Social Engineering. On the surface, this is a confusing term that doesn't appear to have anything to do with …

Read Story

Social Engineering - Mitigating Your Risk

Social Engineering - Mitigating Your Risk

As we look into 2016 and what trends are going to take place this year in the world of Information Security, there is one thing that we can predict with significant confidence: Employees will remain the biggest threat to your Information Security Program and ultimately the safety of t …

Read Story

IT Security in 2016: What Comes Next?

A keyhole within a line of code

The last several years in IT Security have been full of surprises as well as the fulfillment of predictions that have been made. If you recall back to 2014, the famed credit card breaches that took place were predicted by most and ultimately held true to form. We had a rash of major b …

Read Story

Subscribe by email