Compass IT Compliance Blog

Risk Management – Everyone Needs a Seat at the Table

Effective risk management strategies

In the security world there’s a common saying that compliance isn’t security and security isn’t compliance. I believe what gets missed in this saying is the role proper risk assessments and risk management play in marrying up security and compliance.

Read Story

Recommendations from CISA's Recent “Shields Up” Warning

Recommendations from CISA's Recent “Shields Up” Warning

On February 26th, 2022, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) issued immediate Shields Up actions for organizations to take in response to the ongoing conflict with Russia. The basic guidelines are as follows:

Read Story

Revisiting the Apache Log4j Vulnerability

Apache Log4j Vulnerability

By now, most are aware of the Apache Log4j vulnerability that was announced in December of 2021. The exposure is widespread in Java applications, and I have been discovering that many companies are affected by it. Remediation is imperative to ensure that attackers do not exploit affec …

Read Story

Password Complexity – Going Beyond the Minimum Requirements

Password Complexity – Going Beyond the Minimum Requirements

As the frequency and scale of cyberattacks has risen sharply over the past decade, we as end users have been repeatedly asked (and often required) to increase the complexity of our passwords. Back when the internet was in its infancy, the idea of creating a complex and tough-to-guess …

Read Story

Zero Trust as Learned from My Grandmother

Zero Trust as Learned from My Grandmother

I have a line I use with my kids (mainly my teenagers, not so much my nine-year-old yet); “I trust you until I don’t”. They know the line well and sometimes will even finish it for me. I have raised them to hopefully make good decisions and to tell the truth, with the idea of keeping …

Read Story

Cyber & Physical Security: Why You Need Both

Cyber & Physical Security: Why You Need Both

Cybersecurity attracts an enormous amount of attention due to cyberattacks that are publicized daily. As more devices are connected to the Internet, they become attractive targets for criminals; therefore, the attack surface increases exponentially.

Read Story

Subscribe by email