Compass IT Compliance Blog

Security Awareness Training: The First Line of Defense

A group of business professionals debate at a meeting

Compass IT security auditors are often asked if there is a single “most important” factor involved in safeguarding a business’s data assets.

Read Story

Cybersecurity Insurance: Think You're Covered?

Cybersecurity Insurance: Think You're Covered?

IT security breaches have become so commonplace in recent years that they barely seem to raise an eyebrow anymore: Target, Bank of America, I.R.S., the list goes on. With that rise, the claims on Cybersecurity Insurance have risen as well.

Read Story

IT Auditing - Why It's a Smart Investment

A group of five business professionals celebrate

We have all heard the term "Audit" and most of the time it makes us cringe. The first thing that we think of is someone in a suit coming into our organization and poking holes in our Technology, People and Processes that we have built based on the needs of our company and business. Ho …

Read Story

Incident Response Management: What Is It and How to Implement It

Incident Response Management: What Is It and How to Implement It

An Incident Response Program is an aggregate of processes designed to minimize the impact of security incidents. The program is like a fire extinguisher case on the wall in a high school chemistry lab. It contains all of the components, including detailed instructions, for how to cont …

Read Story

Your PCI Risk Assessment: Security vs. Compliance

Your PCI Risk Assessment: Security vs. Compliance

Most people often think that security and compliance are the same thing, especially when looking at conducting a PCI Risk Assessment. Truth is, these are two very different topics yet are interchanged very frequently. A good place for us to start is to define these terms so that we kn …

Read Story

Vendor Management Software: Why You Need It Now

A group of business professionals debate at a meeting

Vendor Management is certainly not a new topic to discuss but it certainly has been gaining quite a bit of attention lately due to some high profile new articles, namely the Target breach of 2013. In that instance, hackers gained access to Target’s point-of-sale systems to steal the c …

Read Story

Subscribe by email