Top 5 vCISO Takeaways of 2019
by Derek Boczenowski on January 8, 2020 at 1:00 PM
As the end of the year rapidly approaches, everyone does their best to reflect upon the prior year (or decade, since it is the end of one of those as well) and see what they might have learned from the past year. What were the top songs, top movies, and top vacation destinations, just …
Nest Cameras – Basic Defense In Depth
by George Seerden on December 26, 2019 at 1:00 PM
I’m sure many of you have seen or heard of the recently released viral video showing a young girl being yelled at in her room via her internet connected Nest camera. Obviously, this was on a home network, but it occurred to me that a large amount of commercial entities also have inter …
IT Security in the Professional Sports World
by Derek Morris on August 28, 2019 at 1:02 PM
This blog will be the first in a multi-part informational blog series on professional sport team’s information technology (IT) security hurdles and the very public issues that have occurred.
Macs Can Get Viruses?
by Jesse Roberts on August 21, 2019 at 2:15 PM
Through my work at Compass IT Compliance I was recently contacted to deal with an issue regarding a Mac computer acting suspiciously. What does suspicious mean? In the case of this particular Mac, whenever a user tried to open the Safari web browser they were getting directed to the h …
Cybersecurity - Back to Basics
by Derek Boczenowski on June 14, 2019 at 1:00 PM
Welcome to summer in New England! Or close to it at any rate. Today I would like to talk about a slightly different topic than usual on these blogs. For those of you that have read past entries, you know they are full of good advice on not many different compliance issues.
CIS Critical Security Controls V7.1 - What's New?
by Patrick Hughes on May 29, 2019 at 1:25 PM
The Center for Internet Security (CIS) is a non-profit information technology entity with a mission to safeguard organizations from cyber threats. CIS has created what’s known as the CIS Top 20 Controls. These are the global standard best practices for securing information technology …