Compass IT Compliance Blog / Government (3)

Flight Troubles & Business Continuity Planning

Flight Cancellations

This morning, the Federal Aviation Administration’s (FAA) system for alerting pilots and airports of real-time hazards, called NOTAM (Notice to Air Missions), went offline around 3:28AM EST. While flights have slowly resumed to normalcy, this recent event is a further example of a bre …

Read Story

What Does It Mean to Be CJIS Compliant?

CJIS Compliance

If your organization is involved with government entities and operations, chances are you have heard of Criminal Justice Information Services (CJIS) compliance. The term is commonly used in law enforcement but can also apply to civil entities.

Read Story

Recommendations from CISA's Recent “Shields Up” Warning

Recommendations from CISA's Recent “Shields Up” Warning

On February 26th, 2022, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) issued immediate Shields Up actions for organizations to take in response to the ongoing conflict with Russia. The basic guidelines are as follows:

Read Story

An Introduction to CMMC Compliance

An Introduction to CMMC Compliance

On January 31st, 2020, the Department of Defense (DoD) announced the release of the Cybersecurity Maturity Model Certification (CMMC), a framework aimed at assessing and enhancing the cybersecurity posture of the Defense Industrial Base (DIB), as it relates to Controlled Unclassified …

Read Story

Protecting SCADA Systems from Cyber-Attacks

Protecting SCADA Systems from Cyber-Attacks

Supervisory control and data acquisition (SCADA) is a control system architecture comprising computers, networked data communications and graphical user interfaces (GUI) for high-level process supervisory management, while also comprising other peripheral devices like programmable log …

Read Story

VA Data Breach Exposes the Personal Info of 46,000 Veterans

VA Data Breach Exposes the Personal Info of 46,000 Veterans

Being hacked is unfortunately still an all too common occurrence. Even as security measures get stronger, reports of breaches and compromises of individual’s personal information do not seem to be slowing down.

Read Story

Subscribe by email