Following the sponsorship from American multinational technology company Google, by the end of the year, The National Cybersecurity Center, a Colorado Springs-based think tank will offer free online cybersecurity training to legislators and statehouse …Read More State Officials Benefit from Cybersecurity Training Offered by the National Cybersecurity Center
Security and compliance – a phrase often uttered in the same breath as if they are two sides of the same coin, two members of the same team or two great tastes that go great together. As much as I would like to see auditors, developers, and security an…Read More Security vs. Compliance: What’s the Difference?
I first became exposed to the concept of information warfare in 1989 when I worked for the government as a leader of a security evaluation program. We all learned that…
The post Information Warfare in 2021—Are You Protected from Cyber Attacks? appeared first on Connected.Read More Information Warfare in 2021—Are You Protected from Cyber Attacks?
We at The State of Security are committed to helping aspiring information security professionals to reach their full potential. Towards that end, we compiled a two–part list of the top 10 highest paying jobs in the industry. Back in 2017, we even…Read More 11 Respected Providers of IT Security Training
Whether you are managing cybersecurity, information security, operations security, or physical security, the sense of urgency to address the potential of attack or breach will continue to rise in 2021….Read More The 2021 Security Trends You Need to Follow
understanding—require a lot of additional explanation. For example, what is a vulnerability assessment? If five cyber professionals are sitting around a table discussing this question, you will end up with…Read More Cyber Security: Three Parts Art, One Part Science
Let’s start this conversation out with the definition of device. The list of what constitutes one is growing. For now, let’s say that you have a home computer (desktop, laptop,…Read More Best Practices for Keeping Tabs on Your Apps
Hackers are working hard to find new ways to get your data. It’s not surprising that cyber security risk is top of mind for every risk owner, in every industry….Read More Businesses Beware: Top 5 Cyber Security Risks
The European Union’s Parliament approved and adopted the General Data Protection Regulation (GDPR) in April 2016. This regulation will take effect after a two-year transitional period, meaning it will be fully enforced on May 25, 2018. At this time, if organizations are non-compliant, they will face hefty fines. There is a tiered approach to these […]Read More Understanding the GDPR
Cyber security controls are only effective if there are no means of bypassing them. If a vulnerability exists that enables someone or something to circumvent your organization’s existing set of security standards, your whole network could then be compromised. With the rise of cybercriminals targeting known vulnerabilities on unpatched systems, especially through worms and malicious […]Read More Patch Management
Although National Cyber Security Awareness Month is coming to a close, COMPASS maintains a commitment to raising cyber security awareness throughout the year. The following are this year’s top blog posts that demonstrate ways to implement cyber security risk management in your organization and minimize the threats you may face. A Risk Manager’s Approach to […]Read More National Cyber Security Awareness Month
The basic infrastructure that supports our daily lives is deeply dependent on the Internet, and, therefore, continually exposed to the risk of new threats and cyber attacks. As security breaches…
The post Protecting Critical Infrastructure from Cyber Threats appeared first on Connected.Read More Protecting Critical Infrastructure from Cyber Threats
In this blog, the focus is on protecting critical infrastructure—the essential systems that support our daily lives such as the electric grid, financial institutions, and transportation. Unfortunately, attacks on critical…Read More Protecting Critical Infrastructure
With the continuous state of change in the global threat landscape, organizations face cyber attacks and security breaches that are growing in frequency and sophistication every day. But now, consider…
The post The Internet Wants YOU: Consider a Career in Cyber Security. appeared first on Connected.Read More The Internet Wants YOU: Consider a Career in Cyber Security.
It’s impossible to overstate the importance of security in today’s digital world. Cyber attacks are growing in frequency and sophistication every day, and a key risk to our economy and…Read More Cyber Security Careers Are in High Demand
Mobile Device Management (MDM) is a great method to ensure that your employees remain productive and do not violate any corporate policies. In the ever-expanding Bring Your Own Device (BYOD) world, more organizations are allowing employees the freedom to work from their own mobile devices. Tablets, smart phones, and personal laptops are taking a larger […]Read More Mobile Device Management
Frequently, new or existing clients will come to us requesting a penetration test. Usually, one of the first things we tell them is that they do not need a penetration test done…yet. Within IT, and within InfoSec specifically, there is a disconnect between terms used by industry professionals, their clients, and the media/public. Two of […]Read More Penetration Testing vs. Vulnerability Scanning
As a part of COMPASS Cyber Security’s ongoing commitment to raising cyber security awareness in the community, we are excited to announce the launch of our very own mobile application! By downloading this app, users will be provided with real-time cyber security threat alerts, best practice tips, and applicable guidance, so they can be prepared […]Read More COMPASS Cyber Security Mobile Application