Revisiting the Apache Log4j Vulnerability
by Danielle Corsa on March 3, 2022 at 1:00 PM
By now, most are aware of the Apache Log4j vulnerability that was announced in December of 2021. The exposure is widespread in Java applications, and I have been discovering that many companies are affected by it. Remediation is imperative to ensure that attackers do not exploit affec …
Password Complexity – Going Beyond the Minimum Requirements
by Peter Fellini on February 23, 2022 at 1:00 PM
As the frequency and scale of cyberattacks has risen sharply over the past decade, we as end users have been repeatedly asked (and often required) to increase the complexity of our passwords. Back when the internet was in its infancy, the idea of creating a complex and tough-to-guess …
Cyber & Physical Security: Why You Need Both
by Kelly O’Brien on January 27, 2022 at 2:30 PM
Cybersecurity attracts an enormous amount of attention due to cyberattacks that are publicized daily. As more devices are connected to the Internet, they become attractive targets for criminals; therefore, the attack surface increases exponentially.
‘Tis the Season – Don’t Fa La La to Holiday Scams
by Kelly O’Brien on December 1, 2021 at 2:30 PM
As another holiday season quickly approaches and holiday gift lists are started, the scammers are also looking to deck the halls during one of their favorite times of the year. As many begin planning for shopping and holiday festivities, unscrupulous scammers are presented with ample …
Latest Update in Vulnerabilities (SeriousSAM, PrintNightmare)
by Danielle Corsa on July 29, 2021 at 3:30 PM
In this week's blog post, Compass IT Compliance Cybersecurity Professional Danielle Corsa analyzes several recent Microsoft vulnerabilities.
Protecting SCADA Systems from Cyber-Attacks
by Felix Alcala on June 24, 2021 at 3:00 PM
Cyber Security SCADA Supervisory control and data acquisition (SCADA) is a control system architecture comprising computers, networked data communications and graphical user interfaces (GUI) for high-level process supervisory management, while also comprising other peripheral devices …
.webp?width=2169&height=526&name=Compass%20regular%20transparent%20website%20(1).webp)
-1.webp?width=2169&height=620&name=Compass%20regular%20transparent%20website%20smaller%20(1)-1.webp)





