Compass IT Compliance Blog / Vendor Management (4)

Cl0p’s MOVEit Attack Victim Count Continues to Climb

Cl0p MOVEit Attack

The cyber threat landscape continues to evolve at an alarming pace, posing ever-increasing challenges to businesses, governments, and individuals. A particularly troubling development in recent months has been the dramatic rise in MOVEit attacks attributed to the Cl0p ransomware group …

Read Story

A Comprehensive Guide to Data Center Outsourcing (DCO)

Data Center Outsourcing

Outsourcing data storage to third-party providers is a trend gaining significant momentum across organizations worldwide. Adopting this strategy brings a plethora of benefits, including significant monetary savings, improved flexibility, and a notable decrease in operational responsib …

Read Story

Using the HECVAT to Measure Vendor Risk

Students gather in a lecture hall

Not a day goes by without a conversation about third-party risk management. Our clients are being bombarded in all directions; asked by regulators, auditors, their clients, and customers alike to complete third-party risk assessments (SIG, CAIQ, HECVAT).

Read Story

Are You Protecting Your Attack Surface?

An empty office with mostly gray tones

Does your organization understand its attack surface? Gartner, Inc., a technological research and consulting firm, recently published the top trends in Cybersecurity for 2022, with attack surface expansion coming in at number one.

Read Story

MSP Breaches Opening the Door to Further Attacks on Clients

A hand stops a row of dominoes from falling

Is your Managed Service Provider (MSP) protecting yours and your client’s data? Are you regularly assessing your MSP and the rest of your vendors? It is no secret that hackers have gained access to more and larger companies over the past few years, but a new malicious tactic is coming …

Read Story

PCI, Service Providers, and You

A man holds a credit card in his hand while scrolling on a laptop

As merchants increasingly utilize trusted partners to maintain and manage critical pieces of their business, information technology, and security infrastructure, it becomes necessary to build a program to manage these vendors.

Read Story

Subscribe by email