Compass IT Compliance Blog

What Is a SOC 2 Report and Who Needs One?

Who Needs a SOC 2?

In an era where data security and privacy are paramount, the SOC 2 report emerges as a critical tool for organizations that manage customer data. Tailored to ensure the safeguarding of information, a SOC 2 report not only enhances an organization's credibility but also solidifies its …

Read Story

Is Fetch Rewards App Safe? Exploring Data Privacy Concerns

Fetch App

At a time when we are all thinking more about how our data is used and shared, the Fetch Rewards app offers an engaging way to earn by simply snapping pictures of your receipts. This app has quickly become a favorite by turning those everyday buys into points for gift cards from a var …

Read Story

What Is DNSSEC, and How Does It Secure Your DNS?

What Is DNSSEC

The DNS (domain name system) is the backbone of the Internet. It enables core functionalities like mapping IP addresses to domain names that are so commonly used today.

Read Story

New CJIS Requirements: What You Need to Know

CJIS Updates

In a recent Compass IT Compliance blog, we delved into the fundamentals of the Criminal Justice Information Services (CJIS) Security Policy (CSP), its applicability, and the criticality of CJIS Compliance, terminology, and the thirteen policy areas applicable at the time of that writi …

Read Story

Staying HIPAA Compliant While Leveraging Telehealth

Telehealth Doctor

In the rapidly evolving landscape of healthcare, telehealth has emerged as a pivotal technology, offering unprecedented convenience and accessibility to patients and providers alike. However, as healthcare organizations increasingly adopt these digital health services, the imperative …

Read Story

NIST Cybersecurity Framework 2.0 – Key Takeaways

United States Department of Commerce

Last week, the National Institute of Standards and Technology (NIST) unveiled the second version of its Cybersecurity Framework (CSF), marking the first major new updates to NIST CSF since the framework's inception ten years ago. Initiated by Executive Order 13636, the development of …

Read Story

Subscribe by email