Compass IT Compliance Blog / Compliance

How to Reduce CMMC Scope: A Practical Guide for Defense Contractors

How to Reduce Your CMMC Scope: A Practical Guide for Defense Contractors

For defense contractors preparing for Cybersecurity Maturity Model Certification (CMMC), scope is the single biggest lever you have over cost, timeline, and audit complexity. The smaller and more clearly defined your scope, the fewer systems your assessor has to evaluate, the fewer co …

Read Story

The Gap Between Compliant & Secure Is Where Breaches Live

The Gap Between Compliant & Secure Is Where Breaches Live

There's a conversation happening in boardrooms, IT departments, and leadership meetings across every industry right now, and it usually starts the same way: "Are we compliant?"

Read Story

What the SEC Wants to See in Your 10-K Cybersecurity Disclosure

United States Securities and Exchange Commission

If you follow publicly traded companies closely, you may have noticed something tucked into their annual reports over the past few years that wasn't always there before: a section called "Item 1C – Cybersecurity." For investors, compliance professionals, and business leaders alike, th …

Read Story

What to Expect When Working with an IT Compliance Partner

What to Expect When Working with an IT Compliance Partner

Bringing on an IT compliance partner is a significant decision, one that often comes with as many questions as it does relief. Whether your organization has just experienced a security incident, is preparing for an audit, or has simply reached a point where internal resources can no l …

Read Story

HIPAA Updates 2026: What Healthcare Organizations Must Know

Critical HIPAA Updates for 2026 What Healthcare Organizations Need to Know

The healthcare industry is heading into one of its most significant regulatory shifts in over a decade. With proposed changes to both the HIPAA Security Rule and Privacy Rule expected to be finalized in 2026, organizations that handle electronic protected health information (ePHI) nee …

Read Story

SOC 2 Remediation Roadmap: Turn Exceptions Into Progress

Your SOC 2 Remediation Roadmap Turning Exceptions into Progress

Your SOC 2 audit report just landed on your desk, and you've spotted exceptions. Before the panic sets in, take a breath. Finding exceptions in your SOC 2 audit doesn't signal impending disaster or business failure. In fact, exceptions happen even to well-managed, security-conscious o …

Read Story

Subscribe by email