Compass IT Compliance Blog

Copyright Infringement Scams - All You Need to Know

Copyright Infringement Scams

In today’s digital-first world, content creators, website owners, and marketers are increasingly becoming targets of sophisticated scams. Among the most insidious are copyright infringement scams—fraudulent schemes designed to deceive recipients into handing over money, credentials, o …

Read Story

Replacing the FFIEC CAT with NIST CSF 2.0

Replacing the FFIEC CAT with NIST CSF 2.0

After nearly a decade of use, the Federal Financial Institutions Examination Council (FFIEC) is officially retiring its Cybersecurity Assessment Tool (CAT) on August 31, 2025. Originally released in 2015, the CAT served as a foundational tool for financial institutions—especially bank …

Read Story

Subcontractor Survival: Meeting Prime Contractor CMMC Requirements

CMMC Factory

The cybersecurity landscape for the defense industrial base (DIB) has shifted. With the Department of Defense’s (DoD) Cybersecurity Maturity Model Certification (CMMC) 2.0 moving swiftly toward full enforcement, subcontractors are finding themselves under growing pressure — not only f …

Read Story

Selecting Your SOC 2 Type 2 Observation Period

SOC 2 Type 2 Observation Period

Preparing for your first SOC 2 Type 2 audit—or planning your next—requires careful selection of a critical component: the observation period. This timeframe, also known as the monitoring period, audit period, or review window, defines when your organization's controls will be evaluate …

Read Story

Insights from Presenting at URMIA Northeast Regional Conference

URMIA Presentation

Last week, I had the opportunity to speak at the URMIA (University Risk Management and Insurance Association) Northeast Regional Conference in Norwood, MA. It was a fantastic event with an incredibly engaged audience—and it gave me the chance to share the stage with David Marion, Dire …

Read Story

How Long Does a SOC 2 Audit Take to Complete?

How Long Does a SOC 2 Audit Take to Complete

At Compass, we frequently get asked, “How long does a SOC 2 audit take?” The answer depends on several factors—but having a clear understanding of the typical phases, timelines, and what influences the duration can help your organization prepare and plan accordingly.

Read Story

Subscribe by email