Compass IT Compliance Blog

IT Risk Assessments: Why Don't Companies Conduct Them?

A group of business professionals debate at a meeting

Data breaches are everywhere! Every time you read the news online or watch the news, there is some form of Cybersecurity problem that has taken place somewhere in the world. Whether it is a credit card data breach or a healthcare data breach, there is no doubt that the security of our …

Read Story

Difference Between Vulnerability Scanning & Penetration Testing

Vulnerability Scanning vs Penetration Testing

As an IT Security Auditor with Compass IT Compliance over the past few years, I have had the privilege of engaging with a diverse range of individuals, from Boston to Los Angeles, and many places in between. A question that comes up frequently is about the distinction between vulnerab …

Read Story

IT Security Policies and Procedures: Why You Need Them

A group of business professionals debate at a meeting

Policies and Procedures are two of the words that most employees dread to hear, especially when it comes to IT Security. Why does this phenomenon occur? Is it because people don’t want to be told what to do? Is it because people feel as though they are being “micromanaged” when they h …

Read Story

Top PCI Compliance Myths Debunked

Top PCI Compliance Myths Debunked

PCI Compliance is an industry regulation that we hear about all the time, yet there remains a significant amount of confusion around what is required, who needs to be compliant, and how to go about becoming PCI compliant. Couple this with the fact that regulations change frequently an …

Read Story

Subscribe by email