Subscribe to our blog

Articles published weekly by IT security and compliance professionals with decades of experience

  

Subscribe to our blog

Articles published weekly by IT security and compliance professionals with decades of experience

  

Subscribe to our blog

Articles published weekly by IT security and compliance professionals with decades of experience

Case Studies

Case Studies

Leveraging the Ladder
Leveraging the Ladder
Social Engineering

Leveraging the Ladder

Social Engineering Assessments

Compass IT Compliance security experts Jesse Roberts and Peter Fellini utilize several social engineering tactics to strategically infiltrate the headquarters of a medium-sized organization. At one point they go as far as to utilize one of the target organization's own ladders to breach the executive suite. Click the image to learn more about the engagement!


 

Mac Under Attack
Mac Under Attack
Incident Response Team

Mac Under Attack

Incident Response Team

Compass IT Compliance security expert Jesse Roberts handles a live malware incident on a Mac desktop used by a small doctor's office, helping to rapidly identify and eliminate the threat. Jesse was also able to identify whether any patient data was compromised. Click the image to learn more about the engagement!


 

NCOV Ransomware Eliminated
NCOV Ransomware Eliminated
Incident Response Team

NCOV Ransomware Eliminated

Incident Response Team

Compass IT Compliance security expert Adam Cravedi responds to a live ransomware attack on a client, helping to rapidly identify and eliminate the threat. Adam further provided remediation strategies to mitigate the risk of another attack. Click the image to learn more about the engagement!


Contact Us