Compass IT Compliance Blog

Emotet Malware Warning From MS-ISAC

pexels-photo-97077

In this blog we’ll be discussing the Emotet malware program, particularly regarding the most recent and ongoing malspam campaign using the Multi-State Information Sharing and Analysis Center (MS-ISAC), and State, Local, Tribal, and Territorial (SLTT) branding.

Read Story

Introduction to Business Continuity Planning

BCP wordcloud

This is part 1 of a 4-part series as we discuss Business Continuity Planning (BCP). We will take you through conducting a Business Impact Analysis, Plan Implementation, and BCP Testing in the coming months as part of this series.

Read Story

PCI Requirement 12 - People, Policies, and Processes Time!

internet-3484137

This is the twelfth blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To view the previous posts in this series, click on the appropriate links below: PCI Requirement 1 - Defending the Wall PCI Requirement 2 …

Read Story

PCI Requirement 11 - Testing, Testing, 1, 2, 3!

camera-3376230_1920

This is the eleventh blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To view the previous posts in this series, click on the appropriate links below: PCI Requirement 1 - Defending the Wall PCI Requirement 2 …

Read Story

PCI Requirement 10 - Big Brother is Watching!

camera-3376230_1920

This is the tenth blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To view the previous posts in this series, click on the appropriate links below: PCI Requirement 1 - Defending the Wall PCI Requirement 2 - …

Read Story

PCI Requirement 9 – Lock the Doors and Don’t Forget the Windows Too!

hacker-1944688_1280

This is the ninth blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To view the previous posts in this series, click on the appropriate links below: PCI Requirement 1 - Defending the Wall PCI Requirement 2 - …

Read Story

Subscribe by email