Compass IT Compliance Blog

Lessons Learned from the CrowdStrike Tech Outage

CrowdStrike Building

The recent global outage caused by CrowdStrike's faulty update has highlighted crucial lessons for organizations worldwide. By examining the factors that led to this disruption and understanding how to mitigate similar risks, organizations can enhance their resilience and ensure conti …

Read Story

Which NIST Standard Is Most Important for Small Businesses?

NIST for Small Business

Navigating the complexities of cybersecurity can be challenging for small businesses, but the National Institute of Standards and Technology (NIST) offers robust frameworks to help. This blog analyzes the various NIST initiatives and guidelines designed to enhance cybersecurity for sm …

Read Story

Beyond Data Classification: Unlocking the Power of Data Insights

Data Center

In today's data-driven world, businesses are inundated with vast amounts of data. While organizing this information through data classification—categorizing data based on defined criteria—is crucial, the real magic happens when we extract and leverage deeper insights from this data. T …

Read Story

Nobody Is Exempt from Vendor Security Questionnaires

Vendor Management

Increased supply chain and vendor breaches have underscored the critical importance of vendor security questionnaires for safeguarding organizational security. These questionnaires have emerged as essential tools for organizations to evaluate the security practices of their third-part …

Read Story

Once Human Terms of Service Highlights Growing Privacy Concerns

Once Human Gameplay

The recent launch of "Once Human," a survival game published by NetEase and developed by Starry Studios, has been met with significant controversy and mixed reviews. The primary concern revolves around the game's privacy policy, specifically the collection of personal data, including …

Read Story

What Are the 5 Trust Services Criteria (TSC) for SOC 2?


Adhering to industry standards is crucial for organizations that manage sensitive data and rely on robust information systems. The SOC 2 Trust Services Criteria (TSC) provides a comprehensive framework to ensure systems are secure, available, and reliable. This blog will explore the f …

Read Story

Subscribe by email