Compass IT Compliance Blog

IT Auditing and IT Risk Assessment: What's the Difference?

A group of business professionals debate at a meeting

We often hear the terms IT Risk Assessment and IT Audit used in various situations and often times they are used interchangeably. This causes great confusion for people who are trying to determine not only what they are looking for in terms of a service, but also what they can expect …

Read Story

Where to Start with PCI Compliance: The PCI Compliance Checklist

Where to Start with PCI Compliance: The PCI Compliance Checklist

Navigating the complexities of PCI Compliance can be challenging and time consuming, especially if it is your first time going through the process. What do you need to do to become PCI compliant and what is your plan for getting started? These are questions that are often asked that c …

Read Story

What is a PCI ROC?

ecommerce-2607114_1920

Often times we hear terms that are thrown around like PCI Risk Assessment and PCI Report on Compliance (ROC). Are you often struggling to understand the difference between these requirements and if / when you’re required to complete them? The good news is that you’re not alone and hop …

Read Story

How Vendor Management Software Can Help with Regulatory Compliance

A group of five business professionals celebrate

Read Story

Security Awareness Training is No Joke!

Without a doubt, almost every type of IT audit contains a section on security awareness training. And in many companies, it is a weakness that can be exploited easier than trying to hack a firewall or compromise a server. In many cases, it can be as easy as sending an email or making …

Read Story

A Key To Your Risk Management Strategy: Cybersecurity Insurance

A Key To Your Risk Management Strategy: Cybersecurity Insurance

I went to a conference back in October and the keynote speaker was a former NSA Director. He made a brilliant point during his presentation that was as follows: There are two types of companies, one that has been breached and the other is the one that has been breached but doesn’t kno …

Read Story

Subscribe by email