Compass IT Compliance Blog

Cybersecurity Insurance: Think You're Covered?

Cybersecurity Insurance: Think You're Covered?

IT security breaches have become so commonplace in recent years that they barely seem to raise an eyebrow anymore: Target, Bank of America, I.R.S., the list goes on. With that rise, the claims on Cybersecurity Insurance have risen as well.

Read Story

IT Auditing - Why It's a Smart Investment

A group of five business professionals celebrate

We have all heard the term "Audit" and most of the time it makes us cringe. The first thing that we think of is someone in a suit coming into our organization and poking holes in our Technology, People and Processes that we have built based on the needs of our company and business. Ho …

Read Story

Incident Response Management: What Is It and How to Implement It

Incident Response Management: What Is It and How to Implement It

An Incident Response Program is an aggregate of processes designed to minimize the impact of security incidents. The program is like a fire extinguisher case on the wall in a high school chemistry lab. It contains all of the components, including detailed instructions, for how to cont …

Read Story

Your PCI Risk Assessment: Security vs. Compliance

Your PCI Risk Assessment: Security vs. Compliance

Most people often think that security and compliance are the same thing, especially when looking at conducting a PCI Risk Assessment. Truth is, these are two very different topics yet are interchanged very frequently. A good place for us to start is to define these terms so that we kn …

Read Story

Vendor Management Software: Why You Need It Now

A group of business professionals debate at a meeting

Vendor Management is certainly not a new topic to discuss but it certainly has been gaining quite a bit of attention lately due to some high profile new articles, namely the Target breach of 2013. In that instance, hackers gained access to Target’s point-of-sale systems to steal the c …

Read Story

The PCI Risk Assessment: Three Examples of When to Conduct One

The PCI Risk Assessment: Three Examples of When to Conduct One

Almost every day we hear in the news more details about a suspected credit card breach that puts the personal information of thousands, if not millions, of people in the hands of individuals whose only intent is to cause them harm. Naturally this raises the question of what is a PCI R …

Read Story

Subscribe by email