Ransomware - The Hurricane of Information Security
by Geoff Yeagley on October 10, 2016 at 9:11 AM
I love how they name different hurricanes and honestly, outside of my own name, I would love to see a hurricane named Hurricane Ransomware. If you are like me and have the privilege of living in Florida, you recently experienced the joy of preparing for a major storm, Hurricane Matthe …
Cybersecurity Awareness Month - People, Process, and Technology
by Geoff Yeagley on October 3, 2016 at 9:49 AM
Welcome to Cybersecurity Awareness Month! As you know, every October is Cybersecurity Awareness Month. For me, every month here at Compass is Cybersecurity Awareness Month as we spend a significant amount of time educating and empowering our customers and prospects on how to mitigate …
Infosec and Financial Institutions: New York's Proposed Legislation
by Geoff Yeagley on September 27, 2016 at 1:30 PM
Financial Institutions are critical to the foundation of the economy of this country. If you think about it, financial institutions across the country house the wealth of this country and are always under attack. From true brute force hacking to phishing emails, bad actors are relentl …
IT Security in 2016: Phishing and Ransomware Remain Challenges
by Geoff Yeagley on September 1, 2016 at 9:45 AM
If any of you out there like to watch the show "The Profit" on CNBC, you and I would most likely become instant friends. For those of you that have never seen the show, the basic premise is that a billionaire (Marcus Lemonis) helps struggling businesses turn their operations around th …
Why Your Staff Needs Security Awareness Training Now!
by Geoff Yeagley on August 24, 2016 at 11:15 AM
We have all been there. We are sitting at our desks, doing our work and the email pops up. Usually from our IT Department or our boss, the email tells us that we need to complete our annual Security Awareness Training within the next 2 weeks. What's the first thought that goes through …
Phishing - Even the Security Folks get Targeted Part II
by Geoff Yeagley on April 7, 2016 at 9:30 AM
Phishing schemes come in all different forms, shapes, and sizes. Hackers and thieves are smart and they will do whatever they think they can do to get access to your sensitive information. Some of these methods include emails, social media "like farming", pre-text calling, etc. The co …
.webp?width=2169&height=526&name=Compass%20regular%20transparent%20website%20(1).webp)
-1.webp?width=2169&height=620&name=Compass%20regular%20transparent%20website%20smaller%20(1)-1.webp)





