Compass IT Compliance Blog / Security

QR Code Package Scam: What You Need to Know

QR Code Package Scam

In recent months, reports of a new scam involving unexpected packages and QR codes have emerged, raising concerns among consumers and cybersecurity experts alike. This scam, which appears to be an evolution of the well-known "brushing" scheme, is designed to trick recipients into scan …

Read Story

Cyber Insurance in 2025: Navigating Emerging Threats & Trends

Cyber Liability Insurance

As we enter 2025, the cyber insurance landscape is undergoing transformative changes driven by escalating cyber threats, shifting regulatory requirements, and evolving market conditions. Businesses must proactively stay informed on these trends to safeguard their digital assets, optim …

Read Story

Physical Security Assessments: Covert Entry vs Escorted Walkthrough

Physical Security Assessments

When businesses seek a third-party physical security assessment, they must decide on the most appropriate testing methodology to gauge their security posture. These methodologies may go by several names, but the concepts and approaches often fit into one of two categories: covert entr …

Read Story

Domain Name Server (DNS) Hijacking Defined

DNS Hijacking

The Domain Name System (DNS) serves as the backbone of internet communication, translating human-readable domain names into machine-readable IP addresses. Despite its importance, DNS is often targeted by malicious actors due to vulnerabilities that can compromise its integrity. One of …

Read Story

Do SOC 2 Auditors Read and Review Code?

SOC 2 Code Review

For organizations pursuing SOC 2 compliance, understanding the scope and focus of the audit process is crucial. A common question that arises is whether auditors review source code as part of the SOC 2 audit. Having clarity on this topic is essential, and organizations can benefit fro …

Read Story

The Value of Penetration Testing in SOC 2 Audits

SOC 2 Penetration Testing

Where data breaches and cyber threats have become increasingly common, organizations adopt robust security measures to protect their sensitive information. For businesses seeking SOC 2 compliance, penetration testing (pen testing) serves as an invaluable tool in assessing and enhancin …

Read Story

Subscribe by email