Selecting Your SOC 2 Type 2 Observation Period
by Bernard Gallagher on April 11, 2025 at 10:30 AM
Preparing for your first SOC 2 Type 2 audit—or planning your next—requires careful selection of a critical component: the observation period. This timeframe, also known as the monitoring period, audit period, or review window, defines when your organization's controls will be evaluate …
Insights from Presenting at URMIA Northeast Regional Conference
by Alexander Magid on April 9, 2025 at 10:00 AM
Last week, I had the opportunity to speak at the URMIA (University Risk Management and Insurance Association) Northeast Regional Conference in Norwood, MA. It was a fantastic event with an incredibly engaged audience—and it gave me the chance to share the stage with David Marion, Dire …
How Long Does a SOC 2 Audit Take to Complete?
by Bernard Gallagher on April 4, 2025 at 9:44 AM
At Compass, we frequently get asked, “How long does a SOC 2 audit take?” The answer depends on several factors—but having a clear understanding of the typical phases, timelines, and what influences the duration can help your organization prepare and plan accordingly.
7 Ways to Reduce Your PCI DSS Compliance Scope
by Kyle Daun on April 2, 2025 at 1:30 PM
For businesses handling payment card transactions, achieving and maintaining PCI DSS (Payment Card Industry Data Security Standard) compliance is essential. However, the journey to compliance can often be expensive and complex. One of the most effective ways to reduce both the financi …
What Are the Best Cybersecurity Services for Protecting Sensitive Data?
by Nicholas Foisy on March 24, 2025 at 4:34 PM
Cybersecurity is no longer just a concern for large corporations and tech giants—every organization, regardless of size or industry, needs to safeguard its sensitive data. From financial records and intellectual property to customer details and employee information, the risks of a dat …
What Are the Most Effective Ways to Build a Culture of Security in an Organization?
by Jeffrey Torrance on March 14, 2025 at 2:23 PM
Cyber threats are growing more sophisticated, and organizations of all sizes are facing increased risks from cyberattacks, data breaches, and insider threats. Despite having advanced security tools and technologies, many organizations still struggle with one fundamental challenge—buil …