Compass IT Compliance Blog / Incident Response

Lessons Learned from the CrowdStrike Tech Outage

CrowdStrike Building

The recent global outage caused by CrowdStrike's faulty update has highlighted crucial lessons for organizations worldwide. By examining the factors that led to this disruption and understanding how to mitigate similar risks, organizations can enhance their resilience and ensure conti …

Read Story

Leave the World Behind – Could the Cyberattack Blackout Really Happen?

Power Lines

Spoiler Alert: This article reveals key aspects of "Leave the World Behind." This captivating movie engages viewers with a narrative that seamlessly merges the realms of fiction and plausible real-world events. Its portrayal of a devastating cyberattack resulting in a countrywide powe …

Read Story

Flight Troubles & Business Continuity Planning

Flight Cancellations

This morning, the Federal Aviation Administration’s (FAA) system for alerting pilots and airports of real-time hazards, called NOTAM (Notice to Air Missions), went offline around 3:28AM EST. While flights have slowly resumed to normalcy, this recent event is a further example of a bre …

Read Story

Reflecting on the AWS Outage and Cloud Disruption Risks

Reflecting on the AWS Outage and Cloud Disruption Risks

Cloud computing and cloud hosting popularity has skyrocketed over the past several years, and the trend is likely only to continue to grow. It began as a means to a more efficient way to host data in the cloud rather than on-premises, and COVID-19 amplified the growth and adoption of …

Read Story

Ransomware Disrupting Your Beer Supply

Ransomware Disrupting Your Beer Supply

When brainstorming blog topics, it often helps to find intersections between your profession and your personal interests. In this case, that intersection is cybersecurity and brewing beer, respectively. But what could beer possibly have to do with cybersecurity?

Read Story

Traditional Antivirus vs. Endpoint Detection Response (EDR)

Traditional Antivirus vs. Endpoint Detection Response (EDR)

While there are many antivirus solutions available on the market, we know that not every solution can detect and remove every type of malware. Therefore incident response tools are important to keep in your arsenal.

Read Story

Subscribe by email