Compass IT Compliance Blog / Security (8)

From Brute Force to the Phishing Email: How Hacking Has Changed

hack-813290_1280.jpg

Hacking has changed. Both in how they do it and why they do it. Before, it was individuals trying to use brute force to gain entry into your network. It was aggressive and LOUD. Think of the idea of using a missile to swat a mosquito, same thing. Most of the time it was to prove a poi …

Read Story

IT Security in 2016: Phishing and Ransomware Remain Challenges

psychics-1026092_1280.jpg

If any of you out there like to watch the show "The Profit" on CNBC, you and I would most likely become instant friends. For those of you that have never seen the show, the basic premise is that a billionaire (Marcus Lemonis) helps struggling businesses turn their operations around th …

Read Story

Why Your Staff Needs Security Awareness Training Now!

security-265130_640.jpg

We have all been there. We are sitting at our desks, doing our work and the email pops up. Usually from our IT Department or our boss, the email tells us that we need to complete our annual Security Awareness Training within the next 2 weeks. What's the first thought that goes through …

Read Story

What is Phishing? Attack Techniques & Examples

What Is Phishing?

Ransomware has dominated the news recently when it comes to IT Security. In fact, it was recently reported that 1 out of 5 companies that suffers a Ransomware attack ends up going out of business at least temporarily and 30% of affected companies lost revenue. Now we turn to the quest …

Read Story

SSAE 16 SOC 2 Report: The 5 Trust Principles

stockvault-cyber-security-concept-with-red-padlock-on-data-screen180401.jpg

Over the past several weeks, we have been digging in to the SSAE 16 SOC 2 reports. We have looked at what a SOC 2 report is, the differences between a Type I and Type II report, and why the Section III is so important. This week we are going to look at what are called the 5 Trust Serv …

Read Story

AT 101 SOC 2 Report: What is a Section III?

castle-979597_640.jpg

In the last couple of posts, we talked about how an AT 101 SOC 2 report differs from a SOC 1 and SOC 3 report and also what the differences are between a SOC 2 Type I and Type II report. In this post, we are going to continue dissecting the different terminology and components of the …

Read Story

Subscribe by email