Compass IT Compliance Blog

The Gap Between Compliant & Secure Is Where Breaches Live

The Gap Between Compliant & Secure Is Where Breaches Live

There's a conversation happening in boardrooms, IT departments, and leadership meetings across every industry right now, and it usually starts the same way: "Are we compliant?"

Read Story

What the SEC Wants to See in Your 10-K Cybersecurity Disclosure

United States Securities and Exchange Commission

If you follow publicly traded companies closely, you may have noticed something tucked into their annual reports over the past few years that wasn't always there before: a section called "Item 1C – Cybersecurity." For investors, compliance professionals, and business leaders alike, th …

Read Story

Pen Testing Automation Problem: Why Human Expertise Matters

The Penetration Testing Industry Has an Automation Problem

The cybersecurity industry has a new buzzword problem, and this one could leave your organization dangerously exposed.

Read Story

What to Expect When Working with an IT Compliance Partner

What to Expect When Working with an IT Compliance Partner

Bringing on an IT compliance partner is a significant decision, one that often comes with as many questions as it does relief. Whether your organization has just experienced a security incident, is preparing for an audit, or has simply reached a point where internal resources can no l …

Read Story

HIPAA Updates 2026: What Healthcare Organizations Must Know

Critical HIPAA Updates for 2026 What Healthcare Organizations Need to Know

The healthcare industry is heading into one of its most significant regulatory shifts in over a decade. With proposed changes to both the HIPAA Security Rule and Privacy Rule expected to be finalized in 2026, organizations that handle electronic protected health information (ePHI) nee …

Read Story

How Human Error Causes Cybersecurity Breaches

How Human Error Leads to Cybersecurity Concerns

Most organizations invest in firewalls, encryption, and sophisticated security tools. Yet despite these technological defenses, humans remain the weakest link in the cybersecurity chain. A single misplaced click, a reused password, or a moment of distraction can unravel even the most …

Read Story

Subscribe by email