Compass IT Compliance Blog

Physical Security Assessments: Covert Entry vs Escorted Walkthrough

Physical Security Assessments

When businesses seek a third-party physical security assessment, they must decide on the most appropriate testing methodology to gauge their security posture. These methodologies may go by several names, but the concepts and approaches often fit into one of two categories: covert entr …

Read Story

How Can Businesses Stay Updated on Evolving Cybersecurity Threats?

Stay Updated on Cybersecurity News

In today’s interconnected world, cybersecurity threats are more dynamic and pervasive than ever. From ransomware to phishing scams, zero-day vulnerabilities to advanced persistent threats (APTs), the nature of cyber risks is constantly evolving. Businesses, regardless of size or indus …

Read Story

When SOC 2 Compliance Makes Sense

When SOC 2 Compliance Makes Sense

In today’s business landscape, security and trust are paramount. SOC 2 compliance has become a widely recognized standard for demonstrating a commitment to protecting sensitive data and maintaining robust security practices. Whether you’re working with enterprise clients, handling cri …

Read Story

Understanding SOC 2 Compliance & Vendor Management

SOC 2 Vendor Management

SOC 2 (System and Organization Controls 2) is a trusted auditing standard developed by the American Institute of Certified Public Accountants (AICPA). It assesses an organization’s information systems against the Trust Services Criteria (TSC): security, availability, processing integr …

Read Story

What Will Quantum Computing Mean for Passwords & Encryption?

Quantum Computing

Quantum computing is one of the most groundbreaking technological advancements of the 21st century. While its potential applications range from solving complex scientific problems to optimizing logistics, its implications for cybersecurity are profound. Specifically, the advent of qua …

Read Story

Chinese RedNote App Rises Amid TikTok Ban: New Privacy Concerns

Chinese RedNote App

As TikTok faces a looming ban in the United States, a new player has emerged on the social media stage: RedNote. Known as Xiaohongshu (Little Red Book) in China, RedNote has skyrocketed in popularity, especially among American users seeking alternatives. However, its meteoric rise com …

Read Story

Understanding DoD Impact Levels for Cloud Security

DoD Impact Levels

The security of information is a cornerstone of the Department of Defense's (DoD) operations. To safeguard sensitive data, the DoD has developed Impact Levels (ILs), a framework that categorizes information systems based on their sensitivity and the potential impact of a compromise. T …

Read Story

SAS 145 and IT General Controls: What Organizations Need to Know

SAS 145 and IT General Controls

The release of SAS 145 (Statement on Auditing Standards No. 145) represents a significant shift in how auditors evaluate and respond to the risks of material misstatements, particularly in complex IT environments. As IT General Controls (ITGCs) underpin key financial processes and rep …

Read Story

Leveraging a Virtual CISO (vCISO) for SOC 2 Compliance

Leveraging Virtual CISO for SOC 2 Compliance

In the rapidly evolving landscape of cybersecurity and data privacy, achieving and maintaining compliance with industry standards like SOC 2 is critical for businesses of all sizes. However, this process can be daunting, especially for organizations lacking the internal expertise or r …

Read Story

What is TISAX Assessment Level 2.5 (AL 2.5)?

TISAX Assessment Level 2.5

In the realm of automotive and industrial information security, TISAX (Trusted Information Security Assessment Exchange) plays a vital role in standardizing security assessments among partners and suppliers. One of its unique features is the concept of assessment levels, which determi …

Read Story

Unlocking Higher Education Security: SOC 2 Compliance & Universities

SOC 2 Higher Education

In an era where data security is paramount, universities find themselves grappling with the dual challenge of advancing academic research and protecting sensitive information. From personal student data to cutting-edge research, universities manage vast amounts of sensitive informatio …

Read Story

Domain Name Server (DNS) Hijacking Defined

DNS Hijacking

The Domain Name System (DNS) serves as the backbone of internet communication, translating human-readable domain names into machine-readable IP addresses. Despite its importance, DNS is often targeted by malicious actors due to vulnerabilities that can compromise its integrity. One of …

Read Story

What Is the OSI Model? 7 Layers Explained

OSI Model Explained

Networking can seem like a complex web of processes and protocols, but the OSI model simplifies this by breaking it into well-defined layers. Understanding the OSI model is essential for anyone involved in IT, as it serves as a universal framework for how data is transmitted, processe …

Read Story

Be Cautious When Following Links on Instagram

Instagram Link Safety

In today's world, Instagram has evolved into more than just a platform for sharing photos and videos. With over a billion active users, it has transformed into a space for networking, marketing, shopping, and even activism. However, with this widespread popularity comes an increasing …

Read Story

Subscribe by email