Profile cover photo
Profile photo
COMPASS Cyber Security
6 followers
6 followers
About
Posts

Post has attachment
The COMPASS Cyber Security team is proud to join Navigant Consulting, Inc. to help expand the company's #CyberRisk and #InformationSecurity practice. https://nav.gt/2DOh200 #CyberSecurity
Add a comment...

Post has attachment
Any organization that collects and processes the personal information of EU citizens, even if it does not have a presence in the EU, must be compliant with the #GDPR, making it the most important change to data privacy regulations in decades.
Add a comment...

Post has attachment
COMPASS is hiring! Positions available include Endpoint Monitoring Security Analyst and Information Security Engineer/Penetration Tester. Visit our careers page to explore these opportunities.
Add a comment...

Post has attachment
Whether you are traveling, using your mobile device, shopping online or in-store, take precautions to protect your sensitive information this #holidayseason.
Add a comment...

Post has attachment
Cyber security controls are only effective if there are no means of bypassing them. Implementing a #patchmanagement strategy can help remediate vulnerabilities in your organization.
Add a comment...

Post has attachment
Although National Cyber Security Awareness Month is coming to a close, COMPASS maintains a commitment to raising cyber security awareness throughout the year. Find this year's top cyber risk management blog posts. #NCSAM #NCSAM2017
Add a comment...

Post has attachment
Implementing employee training is one of the most effective and economical ways to reduce cyber security risks in your organization. http://bit.ly/2y6uFkr #NCSAM
Add a comment...

Post has attachment
While there are numerous advantages to a BYOD workplace, allowing personal devices onto a corporate network introduces a variety of security threats. Discover how a Mobile Device Management solution helps safeguard your business.
Add a comment...

Post has attachment
No organization is exempt from cyber security threats in today's digital environment. Develop a data breach incident response plan. #NCSAM #NCSAM2017 http://bit.ly/2g1INEV
Add a comment...

Post has attachment
Penetration Tests and Vulnerability Assessments are integral components to information security programs. Learn the difference so your organization can allocate resources efficiently and effectively: http://bit.ly/2y3TpgE
Add a comment...
Wait while more posts are being loaded