Compass IT Compliance Blog / Compliance (15)

Not Using Multifactor Authentication? Your Days Are Limited!

MFA

Despite the fact the multifactor authentication (MFA) has been around for decades at this point, the majority of both business and personal logins only use it when absolutely necessary. The complaints are well known; it takes too long to login, if I forget my phone or token I can’t lo …

Read Story

Making Sense of Data Management

Data Management

Organizations face a prevalence of both internal and external cyber threats. This makes data management one of the most critical components in an organization’s cybersecurity program. From classifying data, to ensuring it is handled with the appropriate security precautions, to ensuri …

Read Story

Building a Privacy Culture This Data Privacy Week

Data Privacy

In 2022, data privacy became a hot topic as consumers became more aware of how their data was being tracked and used by companies. This was partly due to the efforts of companies like Apple to educate consumers about their privacy rights.

Read Story

What Does It Mean to Be CJIS Compliant?

CJIS Compliance

If your organization is involved with government entities and operations, chances are you have heard of Criminal Justice Information Services (CJIS) compliance. The term is commonly used in law enforcement but can also apply to civil entities.

Read Story

OWASP Top 10: Why Compliance to OWASP Matters

OWASP Top 10: Why Compliance to OWASP Matters

During a recent web application penetration test, my Compass IT Compliance colleague Jesse Roberts was quickly able to identify and exploit a coding vulnerability on a client’s public facing web portal. As part of the engagement, Jesse was initially granted “standard user” access to t …

Read Story

A Closer Look at PCI DSS v4.0 Vulnerability Scanning Requirements

A Closer Look at PCI DSS v4.0 Vulnerability Scanning Requirements

The Payment Card Industry Data Security Standard (PCI DSS) requires vulnerability scanning of any organization’s network assets. Quarterly network scans are required of all companies to be conducted by a certified third-party Approved Scanning Vendors (ASV) or Qualified Security Asses …

Read Story

Subscribe by email