Compass IT Compliance Blog

Shipbuilders Council of America Spring Membership Meeting Takeaways

Shipbuilders Council of America

Earlier this month, I had the opportunity to attend the Shipbuilders Council of America (SCA) Spring Membership Meeting in Washington, D.C. The room was filled with national security leaders, lawmakers, and key players from across the U.S. shipbuilding ecosystem. What united everyone? …

Read Story

Your SOC 2 Audit Is Complete – What Comes Next?

SOC 2 Audit Completed

Congratulations on achieving SOC 2 compliance! At Compass, we understand the effort it takes to meet the rigorous Trust Services Criteria and successfully navigate the audit process. Securing your SOC 2 attestation is a significant milestone, demonstrating your organization’s commitme …

Read Story

10 Common Myths About SOC 2 Audits Debunked

SOC 2 Myths

SOC 2 audits play a pivotal role in helping businesses showcase their dedication to safeguarding data and building trust with customers, partners, and stakeholders. However, misconceptions about the process often give rise to confusion, unwarranted stress, and inefficiencies that can …

Read Story

The Hidden Risks of User-Installed Apps in Microsoft 365

Compromised Microsoft 365 Apps

The Microsoft 365 platform offers unparalleled flexibility, enabling users to collaborate, share, and automate workflows through an expansive catalog of third-party and custom-developed applications. But that convenience comes with a cost.

Read Story

Misconfigured Microsoft 365: A Growing Threat Surface

Misconfigured Microsoft 365

Microsoft 365 has become the backbone of modern business productivity. From Exchange Online and Teams to SharePoint, Power Apps, and Power Pages, its integrated services allow organizations to collaborate at scale. But with convenience comes complexity—and with complexity, misconfigur …

Read Story

Is Your Internal Pen Test Just a Glorified Vulnerability Scan?

Pen Test or Glorified Vulnerability Scan

Organizations today face an increasing number of internal threats—whether from malicious insiders, compromised credentials, or vulnerable systems exposed on the internal network. That’s why internal penetration testing has become a critical part of any mature cybersecurity program. Bu …

Read Story

Why One-Size-Fits-All vCISO Security Programs Fall Short

Custom vCISO Program

When people talk about virtual Chief Information Security Officer (vCISO) services, they tend to focus on access: access to strategic guidance, access to frameworks, access to a security expert at a fraction of the cost of a full-time executive. And those benefits are real. But what d …

Read Story

What Makes an Industry-Leading Cyber Insurance Policy Today?

Cyber Insurance Policy

Cyber insurance is no longer a niche product or an optional safeguard—it has become a critical pillar of enterprise risk management. As cyberattacks grow more sophisticated and regulatory pressures tighten, organizations of all sizes are reevaluating what they expect from their cyber …

Read Story

CMMC & the Executive Order: A New Era for Shipbuilders

Shipbuilders CMMC

America’s shipbuilding renaissance is underway. On April 9, 2025, President Trump signed a sweeping executive order aimed at revitalizing the U.S. shipbuilding industrial base—an industry long seen as vital to both economic strength and national defense. At the same time, shipbuilders …

Read Story

Subscribe by email