Jerry Hughes

Jerry Hughes

Jerry Hughes, a founding member of Compass IT Compliance, LLC, has over 35 years of experience helping companies become compliant with internal, industry and government regulations such as PCI-DSS, Sarbanes-Oxley, HIPAA, and GLBA. Mr. Hughes, a Certified Information Systems Auditor (CISA), Qualified Security Assessor (QSA), Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manager (CISM), and Certified Data Privacy Solutions Engineer (CDPSE) has extensive IT auditing experience, especially within the financial industry and the retail sector. He carries an undergraduate degree in Applied Mathematics for Engineers and a minor in Computer Science from the University of Rhode Island. Mr. Hughes has helped develop Compass IT Compliance, LLC into one of the nation's premier consulting firms in the areas of IT governance, assurance, security, and compliance services.

Posts by Jerry Hughes

The Importance of SOC 1 Reports in 401(k) Audits

SOC 1 Report 401(k)

401(k) plan administrators manage crucial financial transactions, including contributions, distributions, loans, and account reconciliations. Errors or fraud in these activities can have significant financial implications for plan sponsors (employers) and participants (employees). A S …

Read Story

Year-End Audit Crunch: Preparing for SOC 2 When Everyone Else Is

SOC 2 End of Year

As the calendar edges toward year-end, companies everywhere ramp up their efforts to complete their SOC 2 compliance audits. This time of year often brings a rush to get SOC 2 attestation ready, and for those with ambitious end-of-year goals, timing and preparedness become critical. W …

Read Story

What Happens if You “Fail” a SOC 2 Examination?

SOC 2 Failure

We understand that the SOC 2 audit process is a complex and vital step for businesses looking to demonstrate their commitment to data security, privacy, and trust. But what happens if you “fail” a SOC 2 examination? What does failure even mean in this context?

Read Story

What Is a SOC 2 Bridge Letter?

SOC 2 Bridge Letter

In today’s business environment, trust and transparency are components of building lasting relationships with clients and stakeholders. As organizations turn to third-party vendors and service providers, demonstrating compliance with industry standards has never been more crucial. One …

Read Story

SOC 2 vs. C5 Compliance: A Comprehensive Guide

C5 vs SOC 2

As organizations increasingly rely on technology to manage sensitive information, compliance with industry standards becomes paramount. Two prominent frameworks that help organizations demonstrate their commitment to security and privacy are SOC 2 and C5. While both aim to establish t …

Read Story

The Value of Penetration Testing in SOC 2 Audits

SOC 2 Penetration Testing

Where data breaches and cyber threats have become increasingly common, organizations adopt robust security measures to protect their sensitive information. For businesses seeking SOC 2 compliance, penetration testing (pen testing) serves as an invaluable tool in assessing and enhancin …

Read Story

Subscribe by email