Compass IT Compliance Blog / Microsoft

ProxyNotShell – Microsoft Exchange Exploit Explained

ProxyNotShell – Microsoft Exchange Exploit Explained

ProxyNotShell – What is it? Cyberattacks have become increasingly sophisticated and widespread in recent years, with hackers constantly finding new ways to infiltrate networks and steal sensitive information. One such vulnerability that has recently come to light is ProxyNotShell, ide …

Read Story

Latest Update in Vulnerabilities (SeriousSAM, PrintNightmare)

Latest Update in Vulnerabilities (SeriousSAM, PrintNightmare)

In this week's blog post, Compass IT Compliance Cybersecurity Professional Danielle Corsa analyzes several recent Microsoft vulnerabilities.

Read Story

Hacker Tries to Poison Florida Water Supply

Water sink

It seems like we are hearing about a new cyber-attack at least weekly as of late. It is becoming exhausting and has created such an unsettled feeling in almost any vertical that uses technology. One news headline that caught my attention recently was an attempt in Florida to poison th …

Read Story

Can Microsoft Protect Small Businesses from Cyber Attacks?

The outside of Microsoft headquarters

The following is a guest blog post by Compass IT Compliance partner Spyglass MTG. Spyglass MTG uses proven integration methodologies and expert consultants to build and deploy Microsoft solutions leveraging Microsoft 365 (Office 365, Windows 10, and EM&S), Azure, and Data/AI.

Read Story

Microsoft Teams – The New Phishing Platform for Hackers?

Microsoft Teams – The New Phishing Platform for Hackers?

Many organizations are moving to cloud services for email, voice, and collaboration software. One of the major services being offered is Microsoft Teams. Teams is powerful collaboration software that allows users to share files, screen share, instant message, schedule meetings and voi …

Read Story

Microsoft Office Add-ins, Reason for Concern?

The outside of Microsoft headquarters

This question came into Compass IT Compliance from a client the other day: “How risky are 3rd party plugins? Should I be concerned about them?”. I had to stop and think about this for a while. In my years of working on vulnerability and penetration testing projects for Compass IT Comp …

Read Story

Subscribe by email