Blog Posts
View Article
4th Annual Cyber Security Conference for Executives25 September 2017
Cyber Security for Executives (including deans and small business owners). This year’s conference at the Johns Hopkins University covered ground of interest to business leaders, especially with respect to the implications cyber risk has for their legal and contracting activities. The executives for whom the conference was organized were expansively and quite properly defined to […]
Learn More
View Article
COMPASS Cyber Security Mobile Application13 September 2017
As a part of COMPASS Cyber Security’s ongoing commitment to raising cyber security awareness in the community, we are excited to announce the launch of our very own mobile application! By downloading this app, users will be provided with real-time cyber security threat alerts, best practice tips, and applicable guidance, so they can be prepared […]
Learn More
View Article
Back to School Cyber Security07 September 2017
As schools open their doors for a new academic year, it is evident that education is becoming increasingly dependent on technology. As a result, cyber security is a critically important component to the risk management strategies in schools. Having worked with dozens of schools internationally, COMPASS understands the unique threats they face. Fall is the […]
Learn More
View Article
HIPAA Security Rule – Administrative Safeguards31 August 2017
The Department of Health and Human Services Office of Civil Rights (OCR) has investigated and resolved over 158,000 Health Insurance Portability and Accountability Act (HIPAA) cases since 2003. The top two HIPAA Security Rule (HSR) compliance issues their investigations have identified are impermissible uses and disclosures of protected health information and a lack of safeguards of protected health information. The most common types of covered entities that have had […]
Learn More
View Article
Developing an IT Incident Response Program24 August 2017
Imagine being a user on a Friday afternoon, when suddenly, a pop-up indicates that your files are now encrypted and require 20 bitcoins payoff to regain access! Clearly, all signs point to a ransomware attack. Ransomware being a type of malware that hold files hostage until a payment is made, a lucrative attack in today’s […]
Learn More
View Article
Financial Service Firms – Are You Ready for August 28th?02 August 2017
Regulations are nothing new to the financial service industry, with standards such as Gramm-Leach-Bliley, SEC Cyber Guidelines, and Sarbanes Oxley. However, in the wake of industry-wide security attacks, the New York Department of Financial Services has added a new set of cyber security focused requirements to the ever-growing list. The cyber security requirements outline a […]
Learn More
View Article
Enterprise Encryption20 July 2017
With large data breaches occurring frequently, it is important for companies to consider encryption to protect sensitive information. Encryption, in a general sense, is the encoding of data so that only people who have a shared key can access the information. Information stored in an encrypted document is generally unintelligible otherwise. Computers encrypt data […]
Learn More