Compass IT Compliance Blog / Compliance (14)

Building a Privacy Culture This Data Privacy Week

Data Privacy

In 2022, data privacy became a hot topic as consumers became more aware of how their data was being tracked and used by companies. This was partly due to the efforts of companies like Apple to educate consumers about their privacy rights.

Read Story

What Does It Mean to Be CJIS Compliant?

CJIS Compliance

If your organization is involved with government entities and operations, chances are you have heard of Criminal Justice Information Services (CJIS) compliance. The term is commonly used in law enforcement but can also apply to civil entities.

Read Story

OWASP Top 10: Why Compliance to OWASP Matters

OWASP Top 10: Why Compliance to OWASP Matters

During a recent web application penetration test, my Compass IT Compliance colleague Jesse Roberts was quickly able to identify and exploit a coding vulnerability on a client’s public facing web portal. As part of the engagement, Jesse was initially granted “standard user” access to t …

Read Story

A Closer Look at PCI DSS v4.0 Vulnerability Scanning Requirements

A Closer Look at PCI DSS v4.0 Vulnerability Scanning Requirements

The Payment Card Industry Data Security Standard (PCI DSS) requires vulnerability scanning of any organization’s network assets. Quarterly network scans are required of all companies to be conducted by a certified third-party Approved Scanning Vendors (ASV) or Qualified Security Asses …

Read Story

Self-Assessment Questionnaire (SAQ) A Changes in PCI DSS v4.0

Self-Assessment Questionnaire (SAQ) A Changes in PCI DSS v4.0

With the recent updates to the Payment Card Industry Data Security Standard (PCI DSS) requirements, many organizations that are currently PCI compliant in accordance with version 3.2.1 may become noncompliant with version 4.0.

Read Story

Using the HECVAT to Measure Vendor Risk

Students gather in a lecture hall

Not a day goes by without a conversation about third-party risk management. Our clients are being bombarded in all directions; asked by regulators, auditors, their clients, and customers alike to complete third-party risk assessments (SIG, CAIQ, HECVAT).

Read Story

Subscribe by email