Compass IT Compliance Blog / Security (9)

Why Your Staff Needs Security Awareness Training Now!

security-265130_640.jpg

We have all been there. We are sitting at our desks, doing our work and the email pops up. Usually from our IT Department or our boss, the email tells us that we need to complete our annual Security Awareness Training within the next 2 weeks. What's the first thought that goes through …

Read Story

What is Phishing? Attack Techniques & Examples

What Is Phishing?

Ransomware has dominated the news recently when it comes to IT Security. In fact, it was recently reported that 1 out of 5 companies that suffers a Ransomware attack ends up going out of business at least temporarily and 30% of affected companies lost revenue. Now we turn to the quest …

Read Story

SSAE 16 SOC 2 Report: The 5 Trust Principles

stockvault-cyber-security-concept-with-red-padlock-on-data-screen180401.jpg

Over the past several weeks, we have been digging in to the SSAE 16 SOC 2 reports. We have looked at what a SOC 2 report is, the differences between a Type I and Type II report, and why the Section III is so important. This week we are going to look at what are called the 5 Trust Serv …

Read Story

AT 101 SOC 2 Report: What is a Section III?

castle-979597_640.jpg

In the last couple of posts, we talked about how an AT 101 SOC 2 report differs from a SOC 1 and SOC 3 report and also what the differences are between a SOC 2 Type I and Type II report. In this post, we are going to continue dissecting the different terminology and components of the …

Read Story

3 Reasons Why You Need a HIPAA Risk Assessment Right Now

stockvault-stethoscope127462.jpg

HIPAA is in the news all the time. Whether it is the tragedy that struck Orlando last weekend, the news of the HIPAA Audits coming, or a new healthcare breach being reported, we are constantly bombarded with why HIPAA compliance is critical. As with any organization, protecting and sa …

Read Story

Critical Security Control 19: The Incident Response Plan

A flow chart showing a cycle

In the world of Information Security, we have all heard of the Center for Internet Security Top 20 Critical Security Controls (CSC's) which is formerly known as the SANS Top 20. This is a list of the 20 IT Security Controls that an organization can implement to strengthen their IT Sec …

Read Story

Subscribe by email