Compass IT Compliance Blog / Policies and Procedures

Brute Force Attacks: How To Safeguard Your Password

Brute Force Attacks

Cyber threats are ever-evolving, with brute force attacks standing out as one of the most persistent and concerning methods used by attackers. These attacks involve systematically trying various combinations of usernames and passwords until unauthorized access is gained. The relentles …

Read Story

Credential Stuffing: How To Protect Yourself from Attack

Credential Stuffing

In an age where cybersecurity threats loom large, one of the most prevalent attacks facing both individuals and businesses alike is credential stuffing. This malicious technique preys on the unfortunate reality that many people reuse the same usernames and passwords across multiple ac …

Read Story

Dictionary Attacks: What They Are and How to Avoid Them

Dictionary Attacks: What They Are and How to Avoid Them

With the increasing prevalence of cyber threats, safeguarding your online presence has never been more critical. As cybercriminals use various techniques to exploit system vulnerabilities and access private data, it is important to understand these methods to avoid falling prey to cyb …

Read Story

2FA vs. MFA: What's the Difference?

MFA vs 2FA

Logging into your online accounts, a process known as "authentication," is essentially confirming your identity to the service provider. In the past, this was typically done using a username and password. However, this method proved to have its flaws.

Read Story

Cell Phone Usage at Work & HIPAA Compliance: Uncovering the Risks

HIPAA Cell Phone Usage

The healthcare industry is increasingly embracing mobile technology, integrating smartphones, tablets, and other portable devices into everyday operations across hospitals, clinics, and other workplaces. This shift towards mobile integration, while offering substantial benefits, also …

Read Story

Your Guide to Drafting a Data Retention Policy

Data Retention Policy

Each day, organizations across the globe handle massive amounts of information, and ensuring it's managed securely, compliantly, and efficiently is no walk in the park. The nitty-gritty of data retention, from knowing how long to keep specific files to wading through a maze of regulat …

Read Story

Subscribe by email