Compass IT Compliance Blog

What is Social Engineering? Part III

What is Social Engineering- Part III.png

What is Social Engineering? In this blog, I would like to shed some light on some other types of social engineering and provide some context on how to protect your business and self. In my first two blogs, I jumped into the Phishing and Spear Phishing pieces of a social engineering at …

Read Story

What is PCI Compliance?

What is PCI Compliance Blog Graphic.png

What is PCI Compliance? The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that regardless of size or number of transactions, any business that accepts, processes, stores or transmits credit card information maintains a secure …

Read Story

What is Social Engineering? The Phishing Email

Bad Phishing Email.png

What is Social Engineering? Part 2 The seemingly most common way for an attacker to use social engineering to gain entry, exfiltrate information or disrupt business is through email phishing. As I mentioned in the previous blog, slick tactics like using nicknames and shockingly proper …

Read Story

PCI Compliance Requirements: Some Tools to Help With Requirement 10!

PCI Compliance Requirements: Some Tools to Help With Requirement 10!

PCI Requirement 10 states: Track and monitor all access to network resources and cardholder data Logging mechanisms and the ability to track user activities are critical in preventing, detecting and minimizing the impact of a data compromise. The presence of logs in all environments a …

Read Story

HIPAA Compliance: 5 HIPAA Mistakes to Avoid!

5 HIPAA Mistakes to Avoid Blog Graphic.png

Here at Compass, we have seen a huge upswing in the number of HIPAA / HITECH risk assessments we have been conducting over the last year. Covered entities (Doctors, Hospitals, Pharmacies) and health plans are obviously storing PHI (protected health information) and ePHI (electronic pr …

Read Story

Why You Need an Incident Response Plan....Now!

Incident Response Blog Post Graphic.png

You’ve been breached. Now what? New vulnerabilities are coming fast and furious. The unfortunate truth for most of us is, it’s not a matter of IF we are breached, it’s a matter of WHEN we are breached. Replace the worry with a plan - an Incident Response Plan. What qualifies as an inc …

Read Story

Subscribe by email