Navigant's Cyber Risk and Information Security PracticeLearn More

Blog

Recent Blog Posts

View Article

The fourth, holiday quarter is the most critical revenue driver for retail businesses, as consumers purchase gifts for their family and friends. However, the increased spending and transfers of personally identifiable information provides an ideal opportunity for an attacker to steal user credentials, payment information, and consumer goods. Whether you are traveling, using your mobile […]

Learn More
View Article

Cyber security controls are only effective if there are no means of bypassing them. If a vulnerability exists that enables someone or something to circumvent your organization’s existing set of security standards, your whole network could then be compromised. With the rise of cybercriminals targeting known vulnerabilities on unpatched systems, especially through worms and malicious […]

Learn More
View Article

Although National Cyber Security Awareness Month is coming to a close, COMPASS maintains a commitment to raising cyber security awareness throughout the year. The following are this year’s top blog posts that demonstrate ways to implement cyber security risk management in your organization and minimize the threats you may face. A Risk Manager’s Approach to […]

Learn More
View Article

Because humans are often the weakest link when it comes to cyber security, it is critically important to integrate employee security awareness training into your cyber security action plan. By educating employees on best practices, policies, procedures, popular attack methods and trends, organizations can significantly reduce their risk of a data breach. Increasing your investment […]

Learn More
View Article

Mobile Device Management (MDM) is a great method to ensure that your employees remain productive and do not violate any corporate policies. In the ever-expanding Bring Your Own Device (BYOD) world, more organizations are allowing employees the freedom to work from their own mobile devices. Tablets, smart phones, and personal laptops are taking a larger […]

Learn More
View Article

Frequently, new or existing clients will come to us requesting a penetration test. Usually, one of the first things we tell them is that they do not need a penetration test done…yet. Within IT, and within InfoSec specifically, there is a disconnect between terms used by industry professionals, their clients, and the media/public. Two of […]

Learn More
Work With Us Learn How