Compass IT Compliance Blog / Compliance (6)

CJIS Security Policy v6.0: Key Changes & What They Mean

Criminal Justice Information Services (CJIS) Security Policy v6.0

The Criminal Justice Information Services (CJIS) Security Policy v6.0, released on December 27, 2024, introduces significant modernization efforts aimed at enhancing security, compliance, and risk management in handling Criminal Justice Information (CJI). As technology and cyber threa …

Read Story

How Can I Hire a Virtual CISO For My Business?

How Can I Hire a Virtual CISO For My Business?

As cybersecurity threats continue to evolve, businesses—especially small and mid-sized enterprises (SMEs)—are increasingly recognizing the need for strong security leadership. However, hiring a full-time Chief Information Security Officer (CISO) may not always be feasible due to budge …

Read Story

New PCI Requirements Released for SAQ A Merchant Validation

New SAQ A Requirements

The PCI Security Standards Council (PCI SSC) recently introduced significant updates for merchants validating their compliance using Self-Assessment Questionnaire A (SAQ A). These updates, part of PCI DSS v4.0.1, reflect industry feedback and evolving security concerns, particularly t …

Read Story

When SOC 2 Compliance Makes Sense

When SOC 2 Compliance Makes Sense

In today’s business landscape, security and trust are paramount. SOC 2 compliance has become a widely recognized standard for demonstrating a commitment to protecting sensitive data and maintaining robust security practices. Whether you’re working with enterprise clients, handling cri …

Read Story

Understanding SOC 2 Compliance & Vendor Management

SOC 2 Vendor Management

SOC 2 (System and Organization Controls 2) is a trusted auditing standard developed by the American Institute of Certified Public Accountants (AICPA). It assesses an organization’s information systems against the Trust Services Criteria (TSC): security, availability, processing integr …

Read Story

DoD Cloud Impact Levels Explained: IL2, IL4, IL5 & IL6

DoD Impact Levels

The security of information is a cornerstone of the Department of Defense's (DoD) operations. To safeguard sensitive data, the DoD has developed Impact Levels (ILs), a framework that categorizes information systems based on their sensitivity and the potential impact of a compromise. T …

Read Story

Subscribe by email