CompassITC Profile Banner
Compass IT Compliance Profile
Compass IT Compliance

@CompassITC

Followers
423
Following
132
Media
528
Statuses
2K

Compass IT Compliance is an IT security and compliance services firm specializing in helping organizations mitigate their risk of a data disaster!

North Providence, RI
Joined February 2015
Don't wanna be here? Send us removal request.
@CompassITC
Compass IT Compliance
2 days
From system descriptions to control matrices, strong SOC 2 documentation sets the stage for compliance success. Explore our guide on how to prepare effectively.
Tweet card summary image
compassitc.com
Learn the key steps to prepare your SOC 2 compliance documentation, from scoping & system descriptions to control matrices, diagrams, & audit readiness.
0
0
0
@CompassITC
Compass IT Compliance
8 days
Preventing social engineering attacks requires more than tools—it takes verification, training, and strong protocols. Our latest blog highlights practical ways organizations can stay ahead.
compassitc.com
Explore the best ways to prevent social engineering attacks by using verification and validation, employee training, and layered security defenses.
0
0
0
@CompassITC
Compass IT Compliance
13 days
Compass cybersecurity expert Patrick Laverty joined WPRI 12 News to discuss FTC data showing scammers stole $445M from Americans 60+ in 2024, often posing as agencies or businesses by phone or online.
Tweet card summary image
wpri.com
WPRI 12 News on WPRI.com is Rhode Island and Southeastern Massachusetts' local news, weather, sports, politics, and investigative journalism source.
0
0
0
@CompassITC
Compass IT Compliance
16 days
Compass cybersecurity expert Patrick Laverty is at the 2025 ChannelPro DEFEND: Boston event today, connecting with IT and security leaders to discuss the latest strategies for protecting businesses against evolving threats. Stop by and chat with him if you’re on-site!.
0
0
0
@CompassITC
Compass IT Compliance
20 days
From role definition to regulatory alignment, incident response planning requires more than a checklist. Our latest blog outlines the key elements of a high-performing IRP you can build and test with confidence.
Tweet card summary image
compassitc.com
Learn the best approach to incident response planning with expert strategies, framework alignment, & practical steps to build an effective, audit-ready IRP.
0
0
0
@CompassITC
Compass IT Compliance
21 days
As social engineering tactics grow more sophisticated, organizations must adapt. A Compass expert shares key insights into how these attacks succeed and what proactive measures can reduce risk.
Tweet card summary image
compassitc.com
Learn how social engineering exploits human behavior, why it’s a growing cybersecurity threat, and how businesses can defend against it.
0
0
0
@CompassITC
Compass IT Compliance
21 days
Jeff, Tommy, and Chanci from the Compass team were on the ground at Black Hat USA in Las Vegas this week. From cutting-edge threat intelligence to hands-on demos with leading technologies, they brought back critical insights to strengthen our clients’ #cybersecurity strategies.
Tweet media one
0
0
0
@CompassITC
Compass IT Compliance
23 days
This week, OSINT expert and Compass Social Engineer Patrick Laverty is speaking at OSMOSIS: DC Expo, while several members of our team are attending Black Hat USA in Las Vegas to connect with the infosec community and explore the latest in cybersecurity. Hope to see you there!.
0
0
1
@CompassITC
Compass IT Compliance
27 days
Even global brands aren't immune to simple cybersecurity mistakes—like using "12345" as a password. Our latest blog breaks down why small missteps can lead to big consequences and why every business needs a cybersecurity professional on their side.
Tweet card summary image
compassitc.com
A breach involving a weak password highlights why every business needs cybersecurity professionals to prevent mistakes from becoming costly incidents.
0
0
0
@CompassITC
Compass IT Compliance
28 days
As AI capabilities grow, so does the need for responsible oversight. Our latest blog unpacks the fundamentals of AI, the rise of agentic intelligence, and what organizations must do to stay ahead.
Tweet card summary image
compassitc.com
Explore what AI is, how it works—including agentic AI—and why organizations need governance frameworks to manage evolving risks responsibly.
0
0
0
@CompassITC
Compass IT Compliance
1 month
Higher education is undergoing a notable shift toward Virtual CISO models as institutions adapt to budget constraints and increased compliance demands. Our latest blog examines the factors driving this change.
Tweet card summary image
compassitc.com
Colleges & universities are increasingly turning to Virtual CISOs to strengthen cybersecurity programs, meet compliance, & address shrinking IT resources.
0
0
0
@CompassITC
Compass IT Compliance
1 month
For organizations balancing risk, compliance, and day-to-day security tasks, CIS Controls and NIST CSF 2.0 offer a powerful combination. Learn how to apply them together effectively.
Tweet card summary image
compassitc.com
Discover how CIS Controls align with NIST CSF to help organizations strengthen cybersecurity governance and reduce risk.
0
0
0
@CompassITC
Compass IT Compliance
1 month
SOC 2 audits are essential—but too often inefficient. Our latest blog explores how modern audit platforms are helping organizations streamline workflows, reduce confusion, and improve collaboration.
Tweet card summary image
compassitc.com
Learn how modern audit platforms streamline SOC 2 processes by improving evidence management, communication, and workflow efficiency across audit teams.
0
0
1
@CompassITC
Compass IT Compliance
1 month
Preparing for a SOC 2 audit starts well before the formal assessment begins. Our latest blog outlines the critical steps to take during the readiness phase to ensure a smoother, more successful audit experience.
Tweet card summary image
compassitc.com
Learn the essential steps to prepare for a SOC 2 readiness assessment, including scope definition, control evaluation, risk assessment, and audit planning.
0
0
0
@CompassITC
Compass IT Compliance
2 months
HIPAA is evolving in 2025, with major changes on the horizon. Learn what healthcare organizations need to know to stay compliant and reduce risk.
Tweet card summary image
compassitc.com
Explore key 2025 HIPAA updates—including AI, reproductive health, & tracking technologies—& learn how healthcare organizations can strengthen compliance.
0
0
0
@CompassITC
Compass IT Compliance
2 months
Hearing “CISO” can make some leaders assume Virtual CISO services are too advanced or expensive. Our latest blog explores why that perception is often misplaced—and what these scalable services actually look like in practice.
compassitc.com
The CISO title in Virtual CISO (vCISO) services can sound intimidating, but these engagements are designed to be flexible & right-sized for SMBs.
0
0
0
@CompassITC
Compass IT Compliance
2 months
Happy Independence Day from all of us at Compass. Today, we honor the values of freedom, resilience, and unity that define our nation.
Tweet media one
0
0
0
@CompassITC
Compass IT Compliance
2 months
As cybersecurity threats evolve, many organizations are turning to Managed Security Service Providers (MSSPs) for support. Our latest article explores the role MSSPs play, the services they offer, and their place within a comprehensive security strategy.
compassitc.com
Learn what a Managed Security Service Provider does, the core services MSSPs offer, & how they help organizations enhance cybersecurity & reduce risk.
0
0
0
@CompassITC
Compass IT Compliance
2 months
Cyber threats don’t just target service providers—and your security reporting shouldn’t be limited either. Explore how the SOC for Cybersecurity report helps organizations of all types demonstrate robust cyber risk management.
Tweet card summary image
compassitc.com
Learn what the SOC for Cybersecurity report is, how it differs from SOC 2, and why it’s a powerful tool for demonstrating enterprise-wide risk management.
0
0
0
@CompassITC
Compass IT Compliance
2 months
Effectively managing third-party risk starts with the right tools. Download our Vendor Security Risk Assessment Checklist—a structured resource to support due diligence, security assessments, and vendor onboarding decisions.
compassitc.com
Download our free Vendor Security Risk Assessment Checklist—a comprehensive vendor due diligence & audit tool to strengthen third-party risk management.
0
0
0