Compass IT Compliance Blog / Compliance (17)

The HIPAA Risk Assessment - Who Needs One and When?

medic-563423_1920

Healthcare breaches are nothing new, in fact they have become quite common in the news on a weekly basis. As an example of this, a Central Florida Oncology provider recently announced that it suffered a data breach at the hands of a hacker, resulting in the compromise of the personal …

Read Story

IT Risk Assessments and the SANS Top 20 - Part III

IT Risk Assessments and the SANS Top 20 - Part III

As we continue down our journey of discussing the importance of the SANS Top 20 Critical Security Controls, I want to make one important clarification that was brought to my attention by one of the readers of our blog. It should be noted that the controls that we are referring to in t …

Read Story

The SANS Top 20, A Vulnerability Assessment, and Penetration Testing

The SANS Top 20, A Vulnerability Assessment, and Penetration Testing

The SANS Top 20 Critical Security Controls outline the 20 most critical controls that an organization should implement to ultimately reduce their overall risk of suffering a data breach. These controls were originally developed in 2008 by the NSA at the request of the Office of the Se …

Read Story

PCI Compliance - New Requirements for Level 4 Merchants

PCI Compliance - New Requirements for Level 4 Merchants

Credit card breaches are not going away any time soon, that is for sure! While Healthcare breaches seem to be getting all the attention due to the sheer volume in records compromised, payment card data continues to be a prime target for hackers and organized crime entities.

Read Story

IT Risk Assessments and the SANS Top 20

IT Risk Assessments and the SANS Top 20

No matter what industry you are in, conducting a thorough IT Risk Assessment is critical to your organization for a number of reasons. First, it gives you a point in time measurement of how your IT Security posture compares to either various regulations or IT Security Frameworks.

Read Story

Social Engineering - Mitigating Your Risk

Social Engineering - Mitigating Your Risk

As we look into 2016 and what trends are going to take place this year in the world of Information Security, there is one thing that we can predict with significant confidence: Employees will remain the biggest threat to your Information Security Program and ultimately the safety of t …

Read Story

Subscribe by email