For newbies

Newbies’ Guide to Compliance: Unicorn Tactics

For newbies, security and compliance aren't topics you necessarily rush headfirst into. Or are they?  (Image credit: Background photo created by dashu83 -

How many acronyms does it take to confuse a middle-aged woman with a background in social sciences? Just one as it turns out, and I’ll need to know many. I am new to the InfoSec world, and as such, I need to learn as much as I can about audits, security certifications, and compliance as fast as I can.

Which brings me to my informal invitation to the “Newbies’ Guide” series in which I impart my learnings from discovering the InfoSec world upon you poor souls who might be going through a similar process.


But, what was this about a unicorn?

Fabuloso, isn't it? (The unicorn that is, but I guess you could say the same for SOC 2)

Back when I was still working through university, I edited essays for students to earn a little bit of side cash. Whenever I had a paper I had limited knowledge in, I would substitute words, often ones like “unicorn” whenever I went a little cross-eyed to keep my mind on track. However, turning SOC 2 into a unicorn might not be the correct approach.


Taking difficult or complex concepts and turning them into conquerable encounters might be exactly what my nerd brain needs!

So stay tuned for my first encounter with SOC 2, where I’ll be breaking down what it is, how it works, and whether or not it really is a unicorn.

Related Articles

Backup and Recovery Process: Choose It or Lose It

Backup and Recovery Process: Choose It or Lose It

Despite our best efforts, sometimes things go wrong. The best way to handle situations should they arise, is to have a plan to act in advance, and keep that plan updated when threats change. This not only covers risks to your data by bad actors but plans in the event of a server outage or a natural disaster as a few examples.

read more


Pin It on Pinterest

Share This