Compass IT Compliance Blog / IT Audit

What to Look for When Choosing a SOC 2 Audit Firm

SOC 2 Proposals

Selecting a SOC 2 auditor can be challenging for many business leaders. This significant financial commitment demonstrates your dedication to data security to your business partners and customers. With numerous audit firms vying for your SOC 2 business, what criteria should you consid …

Read Story

SOC 1 vs SOC 2 Reports - What's the Difference?

SOC Reports

As the landscape of modern business shifts, one thing becomes clearer: outsourcing is not just a fleeting trend, but a strategic move adopted by companies across industries. With this increasing reliance on third-party services, there emerges an unprecedented need for more rigorous me …

Read Story

Center for Internet Security (CIS) Controls V8 – What's New?

Center for Internet Security (CIS) Controls V8 – What's New?

With the advent of the novel Coronavirus and the subsequent lockdowns, companies were forced to innovate on how and where they did work. The workforce shifted from the familiar physical and logical boundaries of corporate offices to home offices that provided greater flexibility but a …

Read Story

The Difference Between IT Risk Assessments and IT Audits

The Difference Between IT Risk Assessments and IT Audits

While information technology (IT) risk assessments and information technology (IT) audits go hand in hand with one another, the two terms are often misused. There are quite a few key differences to note when it comes to IT risk assessments and IT audits and determining which is best f …

Read Story

IT Audit: Because you know I'm all about that Scope, 'bout that scope.

IT Audit: Because you know I'm all about that Scope, 'bout that scope.

The term IT Audit is so often used and misused by IT and business professionals in all industries. According to Wikipedia, IT Audit is defined as, “an examination of the management controls within an Information technology (IT) infrastructure. The evaluation of obtained evidence deter …

Read Story

SSAE 16 SOC 2 Report: The 5 Trust Principles

stockvault-cyber-security-concept-with-red-padlock-on-data-screen180401.jpg

Over the past several weeks, we have been digging in to the SSAE 16 SOC 2 reports. We have looked at what a SOC 2 report is, the differences between a Type I and Type II report, and why the Section III is so important. This week we are going to look at what are called the 5 Trust Serv …

Read Story

Subscribe by email