Compass IT Compliance Blog / Security (7)

Cybersecurity - Back to Basics

cyber-security-3374252_1920

Welcome to summer in New England! Or close to it at any rate. Today I would like to talk about a slightly different topic than usual on these blogs. For those of you that have read past entries, you know they are full of good advice on not many different compliance issues.

Read Story

CIS Critical Security Controls V7.1 - What's New?

skyscraper-3184798_1920

The Center for Internet Security (CIS) is a non-profit information technology entity with a mission to safeguard organizations from cyber threats. CIS has created what’s known as the CIS Top 20 Controls. These are the global standard best practices for securing information technology …

Read Story

5 Quick Tips To Help With Information Security

security-265130_640.jpg

Information Security is a moving target. Once you "think" that you have it figured out, boom, here comes another new threat to knock you back on your heels and question just how strong your Information Security program is. That's the bad news. The good news is that we are going to giv …

Read Story

How to Secure WiFi in 5 Simple Steps

blogging-336375_640.jpg

The recent reports of rising cyber-attacks throughout the world have many businesses and people investigating ways that they can improve the cybersecurity of their work and home environments. Since the inception of the 802.11 protocols nearly 20 years ago, WiFi has become more prevale …

Read Story

Ransomware Update: The FBI is Coming, The FBI is Coming...

hacker-1446193_1280.jpg

Q: Why was the Computer so tired when it got home? A: Because it had a hard drive While the joke above is pretty funny (at least I thought it was), Ransomware is no joke. I have written several blog posts about Ransomware over the past 9 months and the dangers that these types of atta …

Read Story

From Brute Force to the Phishing Email: How Hacking Has Changed

hack-813290_1280.jpg

Hacking has changed. Both in how they do it and why they do it. Before, it was individuals trying to use brute force to gain entry into your network. It was aggressive and LOUD. Think of the idea of using a missile to swat a mosquito, same thing. Most of the time it was to prove a poi …

Read Story

Subscribe by email