Pandemic Planning and Tabletop Testing
by Patrick Hughes on March 10, 2020 at 3:45 PM
With the recent outbreak of the Coronavirus (COVID-19), the Centers for Disease Control and Prevention (CDC) has recommended that organizations assess their current pandemic response plans. If your organization doesn’t have a pandemic response plan in place, it is highly recommended t …
Examples of Effective Vishing Attacks
by David Bienkiewicz on March 4, 2020 at 2:00 PM
Vishing (not to be confused with phishing) is a form of social engineering that attempts to manipulate an individual to give an attacker personal information like usernames and passwords, credit card information, and social security numbers via the telephone. The attacker will call an …
IT Asset Management – Governance Policies & Procedures
by Kyle Daun on February 28, 2020 at 1:00 PM
One of the most daunting and time-consuming tasks that an IT administrator can face is logging, monitoring, and tracking assets for their organization. Depending on the size of an organization, tracking can vary and may or may not include a robust program with various tools and spread …
Stop Running from Privacy! Use the NIST Privacy Framework
by Jerry Hughes on February 19, 2020 at 1:00 PM
Take a look at your recent SOC 2 Type ll Service Organization Audit, where there are five Trust Service Criteria (Security, Confidentiality, Processing Integrity, Availability, and Privacy). How about your last Health Insurance Portability and Accountability Act (HIPPA) Audit, where t …
The Coronavirus – Be Prepared!
by Jerry Hughes on February 13, 2020 at 1:30 PM
The Centers for Disease Control and Prevention (CDC) is closely monitoring an outbreak of respiratory illness caused by the Coronavirus. This new virus was first identified in Wuhan, Hubei Province, China. Chinese authorities identified the new coronavirus, which has resulted in thous …
Microsoft Office Add-ins, Reason for Concern?
by Adam Cravedi on February 12, 2020 at 1:00 PM
This question came into Compass IT Compliance from a client the other day: “How risky are 3rd party plugins? Should I be concerned about them?”. I had to stop and think about this for a while. In my years of working on vulnerability and penetration testing projects for Compass IT Comp …