Compass IT Compliance Blog / Compliance (2)

Do SOC 2 Auditors Read and Review Code?

SOC 2 Code Review

For organizations pursuing SOC 2 compliance, understanding the scope and focus of the audit process is crucial. A common question that arises is whether auditors review source code as part of the SOC 2 audit. Having clarity on this topic is essential, and organizations can benefit fro …

Read Story

NIST AI Risk Management Framework Explained

NIST AI RMF

Artificial intelligence (AI) is transforming industries, but with its rapid adoption come risks that organizations must address to ensure safe and ethical use. The NIST Artificial Intelligence Risk Management Framework (AI RMF), developed by the National Institute of Standards and Tec …

Read Story

10 Common Myths About SOC 2 Audits Debunked

SOC 2 Myths

SOC 2 audits play a pivotal role in helping businesses showcase their dedication to safeguarding data and building trust with customers, partners, and stakeholders. However, misconceptions about the process often give rise to confusion, unwarranted stress, and inefficiencies that can …

Read Story

Your SOC 2 Audit Is Complete – What Comes Next?

SOC 2 Audit Completed

Congratulations on achieving SOC 2 compliance! At Compass, we understand the effort it takes to meet the rigorous Trust Services Criteria and successfully navigate the audit process. Securing your SOC 2 attestation is a significant milestone, demonstrating your organization’s commitme …

Read Story

Here's Why Your Car Dealership Needs Cybersecurity

Car Dealership Cybersecurity

In previous blogs, we’ve explored TISAX and the cybersecurity challenges facing the automotive supply chain. However, there’s another critical area in the automotive sector increasingly targeted by cybercriminals: auto dealerships. As the backbone of vehicle sales and services, dealer …

Read Story

What Is a SOC 1 Audit? A Guide to the Report

SOC 1 Reports

When it comes to demonstrating trust and reliability to clients, few tools are as powerful as a SOC 1 report. These reports play a pivotal role in showcasing an organization’s commitment to safeguarding financial data and maintaining robust internal controls.

Read Story

Subscribe by email