The Compass:
More posts

Article
How a Cyber Spring Cleaning Can Protect Data, Build Client Trust
Discover how to empower your business with better data security to boost customer confidence.
READ MORE


Blog Post
8 min read
How do I communicate my new SOC 2® Report? SOC 2 Certified?
We highly recommend you do not use the phrase “SOC 2 Certified." Yes, you see it everywhere, and your competitors are celebrating their certificate - but don’t do it because such a thing does not exist.
READ MORE


Article
Penetration Testing: Why It’s Important + Common Types
Penetration testing simulates an outside attack on your applications and network. Drata shares the types of pen tests and how to conduct one to prevent risk.
READ MORE
