Compass IT Compliance Blog

What is HIPAA Compliance? Just the Facts...

binding-contract-948442_1280.jpg

If you work in the healthcare industry, there is zero doubt that you have heard about HIPAA Compliance thousands and thousands of times. The importance of keeping electronic protected health information confidential is pounded into us on a daily basis and for good reason. But what is …

Read Story

The PCI SAQ: Which One is Right for You?

money-256314_1280.jpg

PCI self-assessment questionnaires (SAQs) are tools that merchants and service providers must complete as evidence of their completion of the PCI DSS self-assessment. These SAQs need to be submitted yearly to your acquiring bank to demonstrate compliance with the latest version of the …

Read Story

Social Engineering Techniques and How Yahoo Put Us All At Risk

Phishing Email Example.png

I read this article the other day that one of my colleagues passed on to me that said 91% of all cyber-attacks begin with a phishing email. That is an incredible number and one that should grab your attention and the attention of your Sr. Leadership team. As you dig further into the s …

Read Story

Vendor Management Requirements for Financial Institutions in New York

Vendor Management Requirements for Financial Institutions in New York

I recently wrote a blog post that discussed legislation in the State of New York that is set to take effect on January 1, 2017. This legislation will effect all financial institutions in the state around Cybersecurity and the development of a formal Cybersecurity program. Click here t …

Read Story

5 Quick Tips To Help With Information Security

security-265130_640.jpg

Information Security is a moving target. Once you "think" that you have it figured out, boom, here comes another new threat to knock you back on your heels and question just how strong your Information Security program is. That's the bad news. The good news is that we are going to giv …

Read Story

How to Secure WiFi in 5 Simple Steps

blogging-336375_640.jpg

The recent reports of rising cyber-attacks throughout the world have many businesses and people investigating ways that they can improve the cybersecurity of their work and home environments. Since the inception of the 802.11 protocols nearly 20 years ago, WiFi has become more prevale …

Read Story

Subscribe by email