Compass IT Compliance Blog

What is a Vendor Management Program and Why Should You Care?

What is a Vendor Management Program and Why Should You Care?

Vendor Management is a term that is thrown around all the time, but what does it really mean? If we look at it on the surface, it is a method for managing your vendors and third party service providers. That's a little obvious of course, but let's look at the definition of Vendor Mana …

Read Story

PCI Compliance and the Transition to EMV

PCI Compliance and the Transition to EMV

One week ago today was a very big day in the world of credit card payments, credit card, processing, and ultimately a transfer in liability when credit card information is compromised. In case you are wondering, I am referring to the deadline that was set forth for October 1st for cre …

Read Story

IT Security vs. Regulatory Compliance: Which One Came First?

IT Security vs. Regulatory Compliance: Which One Came First?

Security or Compliance. Which one should we focus on? On the surface, this almost sounds like the question of which came first, the chicken or the egg. But if we dig deeper, we start to see that while they are similar and have similar goals, they can be very different in how they are …

Read Story

IT Risk Assessments: Why Don't Companies Conduct Them?

A group of business professionals debate at a meeting

Data breaches are everywhere! Every time you read the news online or watch the news, there is some form of Cybersecurity problem that has taken place somewhere in the world. Whether it is a credit card data breach or a healthcare data breach, there is no doubt that the security of our …

Read Story

Difference Between Vulnerability Scanning & Penetration Testing

Vulnerability Scanning vs Penetration Testing

As an IT Security Auditor with Compass IT Compliance over the past few years, I have had the privilege of engaging with a diverse range of individuals, from Boston to Los Angeles, and many places in between. A question that comes up frequently is about the distinction between vulnerab …

Read Story

IT Security Policies and Procedures: Why You Need Them

A group of business professionals debate at a meeting

Policies and Procedures are two of the words that most employees dread to hear, especially when it comes to IT Security. Why does this phenomenon occur? Is it because people don’t want to be told what to do? Is it because people feel as though they are being “micromanaged” when they h …

Read Story

Subscribe by email