Geoff Yeagley

Geoff Yeagley

Geoff Yeagley is SVP of Sales and Marketing with Compass IT Compliance. In this role, Geoff is responsible for the day to day sales operations of Compass IT Compliance while ensuring consistent revenue growth, profitability and the introduction of new service offerings to our clients. Prior to taking on his current role, Geoff was the VP of Marketing for Compass where he developed and implemented a multi-faceted marketing program.

Posts by Geoff Yeagley

PCI Compliance - PCI DSS 3.2 is Coming!

PCI Compliance - PCI DSS 3.2 is Coming!

PCI DSS 3.2 is on the horizon with a release date expected to take place by the end of April. The PCI Data Security Standards is now considered a mature standard, which means that there will be incremental updates moving forward, not wholesale changes like we have experienced in the p …

Read Story

Phishing - Even the Security Folks get Targeted Part II

Phishing - Even the Security Folks get Targeted Part II

Phishing schemes come in all different forms, shapes, and sizes. Hackers and thieves are smart and they will do whatever they think they can do to get access to your sensitive information. Some of these methods include emails, social media "like farming", pre-text calling, etc. The co …

Read Story

Phishing Emails, Ransomware, and the Government

Phishing Emails, Ransomware, and the Government

Every day that you turn on the news, there is another story or article about a Ransomware attack that has taken place. Most recently, these stories are focused around healthcare organizations where significant ransoms have been demanded. What we haven't heard much about, but is just a …

Read Story

How Phishing Emails Can Cost You $40,000

An infographic detailing how to prevent ransomware

To me, math is what makes the world work. If you think about it, just about everything involves math, especially when it comes to business. When I was going through my MBA program, I really underestimated the amount of math and calculations that you needed to perform for essentially e …

Read Story

Information Security Programs: Where to Start?

Information Security Programs: Where to Start?

Hack, breach, phishing, spear phishing, ransomware. These are all words that we hear in the news on a daily basis due to some sort of threat that exists in the world of technology and information security. Most organizations have compliance requirements that they must adhere to, wheth …

Read Story

The HIPAA Risk Assessment - Who Needs One and When?

medic-563423_1920

Healthcare breaches are nothing new, in fact they have become quite common in the news on a weekly basis. As an example of this, a Central Florida Oncology provider recently announced that it suffered a data breach at the hands of a hacker, resulting in the compromise of the personal …

Read Story

Subscribe by email