Compass IT Compliance Blog / Policies and Procedures

Shadow IT Is Now Shadow SaaS & Shadow AI: A Practical Cleanup Guide

Shadow IT Is Now Shadow SaaS & Shadow AI: A Practical Cleanup Guide

If you caught yourself searching "what is shadow IT" this week, you are not alone, and you have probably already lived through it. The term used to conjure rogue modems in a closet, a dusty Access database on somebody's C: drive, or a "just for the team" WiFi router plugged in under a …

Read Story

PCI DSS 4.0 Password Requirements: A Guide to Compliance

PCI DSS v4.0 Password Requirements

As cyber threats evolve, ensuring the security of sensitive payment card data has become increasingly crucial for businesses across all industries. The Payment Card Industry Data Security Standard (PCI DSS) was introduced to provide a framework for safeguarding payment card data, incl …

Read Story

Brute Force Attacks: How To Safeguard Your Password

Brute Force Attacks

Cyber threats are ever-evolving, with brute force attacks standing out as one of the most persistent and concerning methods used by attackers. These attacks involve systematically trying various combinations of usernames and passwords until unauthorized access is gained. The relentles …

Read Story

Credential Stuffing: How To Protect Yourself from Attack

Credential Stuffing

In an age where cybersecurity threats loom large, one of the most prevalent attacks facing both individuals and businesses alike is credential stuffing. This malicious technique preys on the unfortunate reality that many people reuse the same usernames and passwords across multiple ac …

Read Story

Dictionary Attacks: What They Are and How to Avoid Them

Dictionary Attacks: What They Are and How to Avoid Them

With the increasing prevalence of cyber threats, safeguarding your online presence has never been more critical. As cybercriminals use various techniques to exploit system vulnerabilities and access private data, it is important to understand these methods to avoid falling prey to cyb …

Read Story

2FA vs. MFA: What's the Difference?

MFA vs 2FA

Logging into your online accounts, a process known as "authentication," is essentially confirming your identity to the service provider. In the past, this was typically done using a username and password. However, this method proved to have its flaws.

Read Story

Subscribe by email