Compass IT Compliance Blog / Security (9)

The HIPAA Risk Assessment - Who Needs One and When?

medic-563423_1920

Healthcare breaches are nothing new, in fact they have become quite common in the news on a weekly basis. As an example of this, a Central Florida Oncology provider recently announced that it suffered a data breach at the hands of a hacker, resulting in the compromise of the personal …

Read Story

Phishing Examples: Even the Security Folks Get Targeted

An example of a phishing email shows a scammy link path

We all hear about phishing emails. All the time. In fact, there is a never ending dialogue about phishing emails in the news, the most recent one being the IRS emailing to say that you owe them money and they are going to arrest you if you don't pay immediately. As a side note, this i …

Read Story

IT Risk Assessment and the SANS Top 20 - Part IV

IT Risk Assessment and the SANS Top 20 - Part IV

I know, I know. Before you even say it, they are called the Center for Internet Security Critical Security Controls, not the SANS Top 20 anymore. But, everyone knows them as the SANS Top 20 and often times still refers to them by this name which is why I stuck with it for the final pa …

Read Story

SSAE 16 SOC 2 Reports: What Are They?

SSAE 16 SOC 2 Reports: What Are They?

The SSAE 16 process, on the surface, sounds confusing. Most of this has to do with the terminology that is used, particularly the similarity of the terms used. In this blog post we are going to cover what the SSAE 16 is, what the different SOC Reports, what are the different types of …

Read Story

IT Risk Assessments and the SANS Top 20 - Part III

IT Risk Assessments and the SANS Top 20 - Part III

As we continue down our journey of discussing the importance of the SANS Top 20 Critical Security Controls, I want to make one important clarification that was brought to my attention by one of the readers of our blog. It should be noted that the controls that we are referring to in t …

Read Story

The SANS Top 20, A Vulnerability Assessment, and Penetration Testing

The SANS Top 20, A Vulnerability Assessment, and Penetration Testing

The SANS Top 20 Critical Security Controls outline the 20 most critical controls that an organization should implement to ultimately reduce their overall risk of suffering a data breach. These controls were originally developed in 2008 by the NSA at the request of the Office of the Se …

Read Story

Subscribe by email