Compass IT Compliance Blog

New Year, New AI Rules: What Healthcare Organizations Need to Do Now

New Year, New AI Rules What Healthcare Organizations Need to Do Now

Several new state laws took effect on January 1, 2026, that directly govern how artificial intelligence is used and disclosed in healthcare settings. States are moving faster than federal lawmakers, and they are placing practical requirements on organizations that develop, deploy, or …

Read Story

How Much Does a Virtual CISO (vCISO) Cost in 2026?

How Much Does a Virtual CISO (vCISO) Cost in 2026?

If you’re considering a virtual CISO (vCISO) this year, you’re likely asking two practical questions: “How much does it cost?” and “What actually drives the price up or down?” The short answer is that vCISO services are flexible by design, and good programs are intentionally scalable. …

Read Story

New AI Executive Order: Why Your Business Can't Wait for Clarity

New AI Executive Order Why Your Business Can't Wait for Clarity

The landscape of artificial intelligence governance in the United States just shifted dramatically. President Trump's recent executive order attempting to establish federal primacy over AI regulation has ignited a national debate about who should be setting the rules for this transfor …

Read Story

The Double-Edged Sword: Why AI Presents Risks Whether You Use It or Not

The Double-Edged Sword Why AI Presents Risks Whether You Use It or Not

The boardroom debate about artificial intelligence has shifted from "should we explore AI?" to a far more complex question: "how do we navigate a landscape where both using AI and avoiding it exposes us to serious risks?"

Read Story

Which Industries Benefit Most from Cybersecurity Risk Assessments?

Which Industries Benefit Most from Cybersecurity Risk Assessments

Cybersecurity isn't just a concern for tech companies anymore. In today's interconnected world, every organization that handles digital data faces potential threats from hackers, ransomware, phishing attacks, and insider threats. While all businesses should prioritize cybersecurity, c …

Read Story

When Vendors Get Hacked: Your Guide to Third-Party Data Breaches

When Vendors Get Hacked Your Guide to Third-Party Data Breaches

In today's interconnected business ecosystem, organizations rely heavily on third-party vendors for everything from payroll and marketing to cloud hosting, customer support, and specialized financial-services processing. While these partnerships unlock efficiency and innovation, they …

Read Story

Subscribe by email