Compass IT Compliance Blog / Information Security (7)

WanaCry Ransomware: A Survival Guide

hack-813290_1280.jpg

What is WannaCry Ransomware? WanaCrypt0r, WanaDecryt0r, and WannaCry are different names for essentially the same thing. Technically WanaCrypt0r is name of the executable, WanaDecrypt0r is the name of the decrypting utility, and WannaCry is what it makes people want to do. But, for mo …

Read Story

Why Your Information Security Program Must Evolve...NOW!

Infosec Program Evolve Blog Post.png

Note: For the purposes of this blog post, we are going to be looking at breach data for the United States only in 2016 2016 was a record year when it comes to data breaches, according to the Identity Theft Resource Center. According to the center, there were a total of 1,093 breaches …

Read Story

What is Social Engineering? Part I

What is Social Engineering Blog Graphic.png

This post will be the first part in a series of three blog posts that outlines some of the most common methods “hackers” use, from a very high level, to gain access to your systems though social engineering tactics. The next two posts will dig a bit deeper into the different methods, …

Read Story

Phishing Examples - Protect Yourself From Ransomware

Snip20170307_1.png

Fact: Phishing is the number one strategy that bad actors use to deliver malware to your organization. Fact: Phishing attacks come in a few different forms, known as phishing attacks and spear-phishing attacks. Fact: Ransomware is the most prevalent and dangerous form of Malware out t …

Read Story

Vendor Management Requirements for Financial Institutions in New York

Vendor Management Requirements for Financial Institutions in New York

I recently wrote a blog post that discussed legislation in the State of New York that is set to take effect on January 1, 2017. This legislation will effect all financial institutions in the state around Cybersecurity and the development of a formal Cybersecurity program. Click here t …

Read Story

5 Quick Tips To Help With Information Security

security-265130_640.jpg

Information Security is a moving target. Once you "think" that you have it figured out, boom, here comes another new threat to knock you back on your heels and question just how strong your Information Security program is. That's the bad news. The good news is that we are going to giv …

Read Story

Subscribe by email