Compass IT Compliance Blog

IT Audit: Because you know I'm all about that Scope, 'bout that scope.

IT Audit: Because you know I'm all about that Scope, 'bout that scope.

The term IT Audit is so often used and misused by IT and business professionals in all industries. According to Wikipedia, IT Audit is defined as, “an examination of the management controls within an Information technology (IT) infrastructure. The evaluation of obtained evidence deter …

Read Story

What is Social Engineering? Part I

What is Social Engineering Blog Graphic.png

This post will be the first part in a series of three blog posts that outlines some of the most common methods “hackers” use, from a very high level, to gain access to your systems though social engineering tactics. The next two posts will dig a bit deeper into the different methods, …

Read Story

Phishing Examples - Protect Yourself From Ransomware

Snip20170307_1.png

Fact: Phishing is the number one strategy that bad actors use to deliver malware to your organization. Fact: Phishing attacks come in a few different forms, known as phishing attacks and spear-phishing attacks. Fact: Ransomware is the most prevalent and dangerous form of Malware out t …

Read Story

Phishing Examples: Grizzly Steppe and What You Need To Know

Picture1.png

Within the past few years, Russian hacking has become a major issue in the United States. Not only has Russian Intelligence targeted political campaigns, they have also taken interest in other types of organizations who hold critical information. The Russians have developed a method o …

Read Story

HIPAA Compliance and Audit Controls - What You Need to Know

Add a little bit of body text.png

If you have read the news lately on healthcare and specifically HIPAA, you probably saw references to a recent HIPAA settlement between Memorial Health Systems of Florida and the Department of Health and Human Services (HHS). I’m sure the amount of the settlement caught your attention …

Read Story

The Key to Vendor Management: Truly Knowing Your Vendors!

Vendor_Management_Word_Cloud.png

In today's business climate, using vendors or third-party service providers is no longer a luxury, it has become a necessity. Organizations "outsource" key business functions every day for many reasons, some of which include:

Read Story

Subscribe by email