Compass IT Compliance Blog / Vendor Management (3)

A Detailed History of SOC 2 Compliance

History of SOC 2

Security threats do not only come from bad actors online or suspicious links in an email. Have you considered the security threats posed by your organization’s closest entities – like vendors and partners? Third party service providers may unknowingly pose security threats to their co …

Read Story

CDK Global Hit by Cyberattacks: The Impact on Auto Dealerships

Car Dealership

CDK Global, a major software-as-a-service (SaaS) provider for car dealerships, recently faced consecutive cyberattacks, severely disrupting the automotive sales and service industry. These breaches highlight the increasing sophistication of cyber threats and the widespread implication …

Read Story

Cl0p’s MOVEit Attack Victim Count Continues to Climb

Cl0p MOVEit Attack

The cyber threat landscape continues to evolve at an alarming pace, posing ever-increasing challenges to businesses, governments, and individuals. A particularly troubling development in recent months has been the dramatic rise in MOVEit attacks attributed to the Cl0p ransomware group …

Read Story

A Comprehensive Guide to Data Center Outsourcing (DCO)

Data Center Outsourcing

Outsourcing data storage to third-party providers is a trend gaining significant momentum across organizations worldwide. Adopting this strategy brings a plethora of benefits, including significant monetary savings, improved flexibility, and a notable decrease in operational responsib …

Read Story

Using the HECVAT to Measure Vendor Risk

Students gather in a lecture hall

Not a day goes by without a conversation about third-party risk management. Our clients are being bombarded in all directions; asked by regulators, auditors, their clients, and customers alike to complete third-party risk assessments (SIG, CAIQ, HECVAT).

Read Story

Are You Protecting Your Attack Surface?

An empty office with mostly gray tones

Does your organization understand its attack surface? Gartner, Inc., a technological research and consulting firm, recently published the top trends in Cybersecurity for 2022, with attack surface expansion coming in at number one.

Read Story

Subscribe by email