Password Complexity – Going Beyond the Minimum Requirements
by Peter Fellini on February 23, 2022 at 1:00 PM
As the frequency and scale of cyberattacks has risen sharply over the past decade, we as end users have been repeatedly asked (and often required) to increase the complexity of our passwords. Back when the internet was in its infancy, the idea of creating a complex and tough-to-guess …
Is Your Head in the Cloud? Traditional Security vs. Cloud Security
by Kelly O’Brien on December 31, 2021 at 3:30 PM
When someone asks you if your head is in the clouds, there is an implication of being impractical. However, in a cloud-based environment, or in those organizations that conduct part or all of their operations in the cloud, the question has quite the opposite meaning.
Compliance is NOT Security
by Kelly O’Brien on September 1, 2021 at 3:30 PM
Is maintaining compliance with current regulatory laws enough to protect your business from cybersecurity attacks? If you answered no, you are correct. Although often used synonymously, compliance and security do not mean the same thing when it comes to protecting your organization.
Hacker Tries to Poison Florida Water Supply
by CJ Hurd on February 18, 2021 at 1:00 PM
It seems like we are hearing about a new cyber-attack at least weekly as of late. It is becoming exhausting and has created such an unsettled feeling in almost any vertical that uses technology. One news headline that caught my attention recently was an attempt in Florida to poison th …
The Difficulties of Remaining Compliant in the New COVID Landscape
by Derek Boczenowski on November 18, 2020 at 1:00 PM
If there is one thing that everyone can agree on in these interesting times, it is that COVID-19 has upset the apple cart in lots of different ways. Everything from school to work to social gatherings has been disrupted and changed over the last eight months, and some of these changes …
9 Easy Steps to Create Strong Passwords
by Nicholas Foisy on April 15, 2020 at 4:30 PM
Passwords serve as the gatekeeper to an organization’s data and systems, keeping out unauthorized users and only allowing the right people to enter. The strength of an organization’s passwords can often be the deciding factor to whether they suffer a breach or data disaster.
.webp?width=2169&height=526&name=Compass%20regular%20transparent%20website%20(1).webp)
-1.webp?width=2169&height=620&name=Compass%20regular%20transparent%20website%20smaller%20(1)-1.webp)





