Smishing: Text Messages from Scammers
by Bryan Borrayo on May 18, 2023 at 1:00 PM
Like most people, you have probably received a text message from a phone number that seemed a little “fishy”. The message may have claimed to be from your bank, asking you to verify your account information, or it may have promised you a gift card if you clicked on a provided link.
Here's Why You Need A Password Manager
by Justin Leach on April 28, 2023 at 10:45 AM
My mother bragged to me once that she is very good with technology. When I (her free tech support) raised an eyebrow at this, she pulled out a notepad that had handwritten notes on how to change the TV input from cable to the DVD player.
Penetration Testing: Understanding Red, Blue, & Purple Teams
by William DePalma on April 11, 2023 at 1:00 PM
Data breaches are growing more expensive by the day. The average cost of a data breach is projected to reach $5 million by the end of 2023, up from $4.35 million in 2022. Penetration testing, or pen testing, helps you uncover unknown vulnerabilities and compliance gaps within your org …
It Is Always Scam Season!
by CJ Hurd on February 3, 2023 at 2:15 PM
With the holiday season now behind us, we here in the northeast are fully entrenched in winter and I find myself looking forward already to the warm weather that comes with spring and summer. As these seasons come and go, we have learned that scam season is always here, and it is not …
Are You Protecting Your Attack Surface?
by Kelly O’Brien on August 25, 2022 at 1:00 PM
Does your organization understand its attack surface? Gartner, Inc., a technological research and consulting firm, recently published the top trends in Cybersecurity for 2022, with attack surface expansion coming in at number one.
What Does a Passwordless Future Look Like?
by Nicholas Foisy on July 28, 2022 at 1:00 PM
Passwords have served as a critical element in the work we do here at Compass IT Compliance since our founding over a decade ago. Whether it is educating individuals on the best practices for developing strong passwords, creating a password policy, utilizing automated programs to atte …