The Compass:
More posts
![](https://cdn.prod.website-files.com/64352e4889525a0a8fed9833/6658da8c20d33692110ea391_3_742%E2%80%8A%C3%97%E2%80%8A610.png)
Article
Unlocking Trust: How SOC 2 Validated Our Security Program
Check out Software Secured's story focused on the process of working on their SOC 2 report with MJD Advisors
READ MORE
![](https://cdn.prod.website-files.com/642ff28937bbf1fc6c797cd5/6433fb6c35c4e26e3ba24582_arrow-p.webp)
![](https://cdn.prod.website-files.com/64352e4889525a0a8fed9833/6658da71248d42f5a42efc75_1_742%E2%80%8A%C3%97%E2%80%8A610.png)
Blog Post
What should the scope period be for my SOC 2® Type 2 report?
Are you looking to better understand scope periods and how to decide on yours? Our latest blog outlines some things to consider.
READ MORE
![](https://cdn.prod.website-files.com/642ff28937bbf1fc6c797cd5/6433fb6c35c4e26e3ba24582_arrow-p.webp)
![](https://cdn.prod.website-files.com/64352e4889525a0a8fed9833/6658dc074d3771676acb720c_4_742%E2%80%8A%C3%97%E2%80%8A610.png)
Article
How a Cyber Spring Cleaning Can Protect Data, Build Client Trust
Discover how to empower your business with better data security to boost customer confidence.
READ MORE
![](https://cdn.prod.website-files.com/642ff28937bbf1fc6c797cd5/6433fb6c35c4e26e3ba24582_arrow-p.webp)