Compass IT Compliance Blog / Cybersecurity (15)

Cyber & Physical Security: Why You Need Both

Cyber & Physical Security: Why You Need Both

Cybersecurity attracts an enormous amount of attention due to cyberattacks that are publicized daily. As more devices are connected to the Internet, they become attractive targets for criminals; therefore, the attack surface increases exponentially.

Read Story

‘Tis the Season – Don’t Fa La La to Holiday Scams

‘Tis the Season – Don’t Fa La La to Holiday Scams

As another holiday season quickly approaches and holiday gift lists are started, the scammers are also looking to deck the halls during one of their favorite times of the year. As many begin planning for shopping and holiday festivities, unscrupulous scammers are presented with ample …

Read Story

Latest Update in Vulnerabilities (SeriousSAM, PrintNightmare)

Latest Update in Vulnerabilities (SeriousSAM, PrintNightmare)

In this week's blog post, Compass IT Compliance Cybersecurity Professional Danielle Corsa analyzes several recent Microsoft vulnerabilities.

Read Story

Protecting SCADA Systems from Cyber-Attacks

Protecting SCADA Systems from Cyber-Attacks

Cyber Security SCADA Supervisory control and data acquisition (SCADA) is a control system architecture comprising computers, networked data communications and graphical user interfaces (GUI) for high-level process supervisory management, while also comprising other peripheral devices …

Read Story

Hacker Tries to Poison Florida Water Supply

Water sink

It seems like we are hearing about a new cyber-attack at least weekly as of late. It is becoming exhausting and has created such an unsettled feeling in almost any vertical that uses technology. One news headline that caught my attention recently was an attempt in Florida to poison th …

Read Story

9 Easy Steps to Create Strong Passwords

A keyboard wrapped with a chain and lock

Passwords serve as the gatekeeper to an organization’s data and systems, keeping out unauthorized users and only allowing the right people to enter. The strength of an organization’s passwords can often be the deciding factor to whether they suffer a breach or data disaster.

Read Story

Subscribe by email