Compass IT Compliance Blog / Security (6)

Can Microsoft Protect Small Businesses from Cyber Attacks?

The outside of Microsoft headquarters

The following is a guest blog post by Compass IT Compliance partner Spyglass MTG. Spyglass MTG uses proven integration methodologies and expert consultants to build and deploy Microsoft solutions leveraging Microsoft 365 (Office 365, Windows 10, and EM&S), Azure, and Data/AI.

Read Story

“Fake It ‘Til You Make It” Doesn't Work in Cybersecurity

A classroom with wooden seats and a large map

“Fake it ‘til you make it” – a term that I have heard a thousand times and have probably used before and never thought much of it. That’s until I heard my 14-year-old say it. Let me give you a little context – my son is a freshman in high school and has been in six different schools s …

Read Story

Breweries – Can they be Hacked?

Breweries – Can they be Hacked?

100 bottles of beer on the wall, 100 bottles of beer! Has anyone thought about what goes into making beer? I recently received my “Professional Craft Brewing” certification from Johnson & Wales. Throughout the program we went out and worked in commercial breweries.

Read Story

Top 5 vCISO Takeaways of 2019

A woman works on a mac computer

As the end of the year rapidly approaches, everyone does their best to reflect upon the prior year (or decade, since it is the end of one of those as well) and see what they might have learned from the past year. What were the top songs, top movies, and top vacation destinations, just …

Read Story

Nest Cameras – Basic Defense In Depth

camera-1219748_1920

I’m sure many of you have seen or heard of the recently released viral video showing a young girl being yelled at in her room via her internet connected Nest camera. Obviously, this was on a home network, but it occurred to me that a large amount of commercial entities also have inter …

Read Story

IT Security in the Professional Sports World

athletes-1846039_1920

This blog will be the first in a multi-part informational blog series on professional sport team’s information technology (IT) security hurdles and the very public issues that have occurred.

Read Story

Subscribe by email