Compass IT Compliance Blog

What is Phishing? Attack Techniques & Examples

What Is Phishing?

Ransomware has dominated the news recently when it comes to IT Security. In fact, it was recently reported that 1 out of 5 companies that suffers a Ransomware attack ends up going out of business at least temporarily and 30% of affected companies lost revenue. Now we turn to the quest …

Read Story

Moving From SSAE 16 to SSAE 18....

binding-contract-948442_1280.jpg

This is a guest post that was co-written by Mike Mellor, CPA and Nina Drury from DiSanto, Priest, & Co. in Warwick, RI. DiSanto, Priest, & Co. is a professional advisory firm that has been in business for over 50 years providing a range of services to their clients. These serv …

Read Story

IT GRC - Compliance

stockvault-book-ampamp-glasses-127786.jpg

Over the past week we have been discussing an overview of IT Governance, Risk, and Compliance as well as diving into each of the components that make up this program. Today we are going to talk about the final piece of the IT GRC puzzle: Compliance.

Read Story

IT GRC - Let's Talk About Risk!

hacker-1446193_1280.jpg

Earlier this week we discussed IT Governance, Risk, and Compliance (IT GRC) with a specific focus on IT Governance. To read more of that post, click here. Today we are going to focus on the second component of IT GRC, IT Risk. In keeping with consistency, Gartner defines IT Risk as "t …

Read Story

IT GRC - What is IT Governance?

A group of professionals holding iPads meets

In the world of Information Security, acronyms are a way of life. In fact, we often refer to all these different acronyms as "alphabet soup." Keeping track of what they all mean and what they stand for can be challenging. With that in mind, over the next 3 blog posts, we are going to …

Read Story

SSAE 16 SOC 2 Report: The 5 Trust Principles

stockvault-cyber-security-concept-with-red-padlock-on-data-screen180401.jpg

Over the past several weeks, we have been digging in to the SSAE 16 SOC 2 reports. We have looked at what a SOC 2 report is, the differences between a Type I and Type II report, and why the Section III is so important. This week we are going to look at what are called the 5 Trust Serv …

Read Story

Subscribe by email