Compass IT Compliance Blog

CMMC – What Is It, and Why Does It Matter?

A rounded loop of a factory's assembly line

There has been a lot of discussion around the cybersecurity interwebs lately about something called CMMC. CMMC stands for Cybersecurity Maturity Model Certification, which sounds super fancy and important, but what does it really mean?

Read Story

Virtual Healthcare and HIPAA Compliance

Virtual Healthcare and HIPAA Compliance

COVID-19 has taken the world by storm, and society as we know it is changing rapidly. From how we interact with each other socially, to our ability to freely go shopping and eat at restaurants, changes are being initiated across the board. Industries all across the world have been aff …

Read Story

What Are DKIM, SPF, & DMARC? Why Are They So Important?

What Are DKIM, SPF, & DMARC? Why Are They So Important?

If you are asking yourself, "what is DKIM, DMARC, and SPF", you have come to the right place. DKIM, SPF, and DMARC are all email authentication technologies that are free to use for your organization. These technologies can be very useful for your organization and for domains out in t …

Read Story

Security Culture Through the Eyes of a Young Marine

Two soldiers stand on a rocky mountain scape

Many years ago, I was enlisted in the Marine Corps. As a young Marine I was given the opportunity to take part in the Marine Security Guard program. I received my marching orders and was off to Quantico, Virginia, for my training. Afterwards I was shipped off to the United States emba …

Read Story

Contact Tracing – Personal Information Privacy Concerns

Contact Tracing – Personal Information Privacy Concerns

COVID-19 has turned the world upside down. Everyone is feeling the effects of the global pandemic. Governments are still in react mode on how to best deal with a virus that for the short term does not seem to be going away. Without a vaccine in place, the world will need to rely on co …

Read Story

IT Asset Management – Acquisition of Assets

IT Asset Management – Acquisition of Assets

In part one of this IT asset management blog series, we discussed governance policies and procedures. In this second part to the blog series, we will discuss the process for acquisition of assets from reputable and vetted vendors. A lot has happened since part one was written, which a …

Read Story

Subscribe by email