Compass IT Compliance Blog / Information Security (12)

Where to Start with PCI Compliance: The PCI Compliance Checklist

Where to Start with PCI Compliance: The PCI Compliance Checklist

Navigating the complexities of PCI Compliance can be challenging and time consuming, especially if it is your first time going through the process. What do you need to do to become PCI compliant and what is your plan for getting started? These are questions that are often asked that c …

Read Story

What is a PCI ROC?

ecommerce-2607114_1920

Often times we hear terms that are thrown around like PCI Risk Assessment and PCI Report on Compliance (ROC). Are you often struggling to understand the difference between these requirements and if / when you’re required to complete them? The good news is that you’re not alone and hop …

Read Story

Security Awareness Training is No Joke!

Without a doubt, almost every type of IT audit contains a section on security awareness training. And in many companies, it is a weakness that can be exploited easier than trying to hack a firewall or compromise a server. In many cases, it can be as easy as sending an email or making …

Read Story

Security Awareness Training: The First Line of Defense

A group of business professionals debate at a meeting

Compass IT security auditors are often asked if there is a single “most important” factor involved in safeguarding a business’s data assets.

Read Story

Cybersecurity Insurance: Think You're Covered?

Cybersecurity Insurance: Think You're Covered?

IT security breaches have become so commonplace in recent years that they barely seem to raise an eyebrow anymore: Target, Bank of America, I.R.S., the list goes on. With that rise, the claims on Cybersecurity Insurance have risen as well.

Read Story

IT Auditing - Why It's a Smart Investment

A group of five business professionals celebrate

We have all heard the term "Audit" and most of the time it makes us cringe. The first thing that we think of is someone in a suit coming into our organization and poking holes in our Technology, People and Processes that we have built based on the needs of our company and business. Ho …

Read Story

Subscribe by email