Compass IT Compliance Blog / Security (14)

IT Security Policies and Procedures: Why You Need Them

A group of business professionals debate at a meeting

Policies and Procedures are two of the words that most employees dread to hear, especially when it comes to IT Security. Why does this phenomenon occur? Is it because people don’t want to be told what to do? Is it because people feel as though they are being “micromanaged” when they h …

Read Story

Top PCI Compliance Myths Debunked

Top PCI Compliance Myths Debunked

PCI Compliance is an industry regulation that we hear about all the time, yet there remains a significant amount of confusion around what is required, who needs to be compliant, and how to go about becoming PCI compliant. Couple this with the fact that regulations change frequently an …

Read Story

Healthcare Breaches and the HIPAA Risk Assessment

Healthcare Breaches and the HIPAA Risk Assessment

Healthcare attacks are on the rise, there is no doubt about that trend. In 2013 and 2014, credit card breaches are all everyone was talking about. While those still garner headlines today, healthcare breaches have taken over as the top news stories. In some of the largest breaches rep …

Read Story

Where to Start with PCI Compliance: The PCI Compliance Checklist

Where to Start with PCI Compliance: The PCI Compliance Checklist

Navigating the complexities of PCI Compliance can be challenging and time consuming, especially if it is your first time going through the process. What do you need to do to become PCI compliant and what is your plan for getting started? These are questions that are often asked that c …

Read Story

What is a PCI ROC?

ecommerce-2607114_1920

Often times we hear terms that are thrown around like PCI Risk Assessment and PCI Report on Compliance (ROC). Are you often struggling to understand the difference between these requirements and if / when you’re required to complete them? The good news is that you’re not alone and hop …

Read Story

Security Awareness Training is No Joke!

Without a doubt, almost every type of IT audit contains a section on security awareness training. And in many companies, it is a weakness that can be exploited easier than trying to hack a firewall or compromise a server. In many cases, it can be as easy as sending an email or making …

Read Story

Subscribe by email