{"id":10963,"date":"2020-03-31T10:57:34","date_gmt":"2020-03-31T10:57:34","guid":{"rendered":"https:\/\/complior.se\/?p=10963"},"modified":"2026-04-18T09:25:06","modified_gmt":"2026-04-18T07:25:06","slug":"it-compliance-vs-it-security-understanding-the-difference","status":"publish","type":"post","link":"https:\/\/complior.se\/en\/it-compliance-vs-it-security-understanding-the-difference\/","title":{"rendered":"IT Compliance vs. IT Security: Understanding the Difference"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-1c95cc62 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-627ud4 is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns10963_91b8d9-a3\"><a class=\"kb-button kt-button button kb-btn10963_57d663-16 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\" href=\"https:\/\/complior.se\/en\/resources\/\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowLeft kt-btn-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"19\" y1=\"12\" x2=\"5\" y2=\"12\"\/><polyline points=\"12 19 5 12 12 5\"\/><\/svg><\/span><span class=\"kt-btn-inner-text\">Tillbaka till resurser<\/span><\/a><\/div>\n\n\n\n<span class=\"kt-adv-heading10963_495f32-4a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10963_495f32-4a\">Blog<\/span>\n\n\n\n<h1 class=\"kt-adv-heading10963_61af0c-3e animated fadeIn wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10963_61af0c-3e\">IT Compliance vs. IT Security: Understanding the Difference<\/h1>\n\n\n\n<div class=\"wp-block-group animated fadeIn is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\"><div class=\"publish-date-container\">\r\n\t<svg\r\n\t\twidth=\"16\"\r\n\t\theight=\"16\"\r\n\t\tviewbox=\"0 0 24 24\"\r\n\t\tfill=\"none\"\r\n\t\tstroke=\"#4b4b4b\"\r\n\t\tstroke-width=\"2\"\r\n\t\tstroke-linecap=\"round\"\r\n\t\tstroke-linejoin=\"round\"\r\n\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\"\r\n\t\taria-hidden=\"true\"\r\n\t>\r\n\t\t<rect x=\"3\" y=\"4\" width=\"18\" height=\"18\" rx=\"2\" ry=\"2\"><\/rect>\r\n\t\t<line x1=\"16\" y1=\"2\" x2=\"16\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"8\" y1=\"2\" x2=\"8\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"3\" y1=\"10\" x2=\"21\" y2=\"10\"><\/line>\r\n\t<\/svg>\r\n\t<span class=\"date-text\">\r\n\t\tMar 31, 2020\t<\/span>\r\n<\/div>\n\n\n<h1 class=\"kt-adv-heading10963_2bc170-a0 wp-block-kadence-advancedheading kt-adv-heading-has-icon animated fadeIn delay-100ms\" data-kb-block=\"kb-adv-heading10963_2bc170-a0\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_clock kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 6 12 12 16 14\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">6 min <\/span><\/h1><\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-kadence-image kb-image10963_6b9c43-7e size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"411\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02-1024x411.png\" alt=\"an image showing the difference between IT security and compliance\" class=\"kb-img wp-image-51102\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02-1024x411.png 1024w, https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02-300x120.png 300w, https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02-768x308.png 768w, https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02-1536x616.png 1536w, https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02-18x7.png 18w, https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-2eeb7bfc alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-1xu4lx3 is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<p class=\"kt-adv-heading10963_571a92-f3 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10963_571a92-f3\">In these uncertain times of COVID-19 the entire business spectrum is changing. It is more important than ever to grasp the significance and difference of IT security vs IT compliance.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-10fir4i is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading10963_30c97d-d3 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10963_30c97d-d3\">Using the current global situation it can be best described as<\/h2>\n\n\n\n<p class=\"kt-adv-heading10963_cb60c8-6e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10963_cb60c8-6e\">The restrictions and rules many governments of numerous countries have laid out such as closing international borders, cancelling national bus and train lines, restricting physical contact with a 2m or 10ft distance, calling for citizens to stay home, could be compared to IT compliance. These are standards, rules, and laws in place to keep all citizens, and in the case of IT, businesses to a certain standard. They are laid out but it is up to each individual business to adhere to them, monitoring updates and changes and adapting as necessary.<\/p>\n\n\n\n<p class=\"kt-adv-heading10963_5ea45a-79 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10963_5ea45a-79\">IT security, on the other hand, is the actual protections taken to minimize risk of a data breach. Again compared to the current times this is the physical act of washing your hands, sanitizing clothes\/shoes\/phones upon returning home from the store, limiting trips outside and eliminating contact with others now called \u2018social distancing\u2019. IT security is utilizing the proper hardware and software to put barriers in place for hackers accessing private and confidential business data, including personal information of customers, employees, business partnerships and so on. Routine IT activities like password change prompts, remote access points when working out of the office and utilizing company issued equipment would all fall into this category.<\/p>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1omj4h1 is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading10963_04fd48-9e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10963_04fd48-9e\">IT Compliance<\/h3>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-1uvt5y2 has-manrope-font-family\">\n<li>Regulatory frameworks like GDPR<\/li>\n\n\n\n<li>Policies<\/li>\n\n\n\n<li>Standards like PCI DSS<\/li>\n\n\n\n<li>Processes<\/li>\n\n\n\n<li>Risk Analyses<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1omj4h1 is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading10963_6b6ef8-10 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10963_6b6ef8-10\">IT Security<\/h3>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-1uvt5y2 has-manrope-font-family\">\n<li>Secure network access like 2 factor authentication<\/li>\n\n\n\n<li>Strong identity controls<\/li>\n\n\n\n<li>Encryption controls with HSM<\/li>\n\n\n\n<li>Business processes<\/li>\n\n\n\n<li>Security frameworks like firewalls and antivirus<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-ohl4iy is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading10963_e0801d-5c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10963_e0801d-5c\">IT Security<\/h3>\n\n\n\n<p class=\"kt-adv-heading10963_2a17d1-41 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10963_2a17d1-41\">There has long been a confusion in the difference of IT Security and IT compliance. Are they not one and the same? If you follow all the latest regulations, do you achieve IT security?<\/p>\n\n\n\n<p class=\"kt-adv-heading10963_85fabc-ea wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10963_85fabc-ea\">As you can see there are actually vast differences between compliance and security and in fact not both rest on the shoulders of the IT department. While the IT department is critical in managing IT security, compliance may be a place where they are merely internal consultants. Protecting your business on both fronts is essential in achieving optimal operational excellence for your clients, your confidential processes, and in following the law. GDPR has had a tremendous impact on many businesses with multi-million dollar fines issued to the likes of British Airways.<\/p>\n\n\n\n<p class=\"kt-adv-heading10963_9dbd89-f5 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10963_9dbd89-f5\">We are operating in uncertain times and while there is currently a period of lull, waiting to see when and how the repercussions will unfold, cyber security is on the rise. The World Health Organization and health organizations have had numerous attempts in March to gain access to confidential information as reported by NS Tech. While your business may or may not be related to the medical field, with so many people telecommuting and working from home on personal wifi connections, hacks are on the rise. This is an opportune and absolutely critical time to check in on your compliance levels and IT security protocols and ensure everything is up to date and safeguarded. Not only will you protect your business in the case of an attack\u2014because hackers don\u2019t discriminate on business size, it is not just large health organizations at risk here. When COVID-19 settles, controls loosen and people begin to return closer to a normal pace of life, if you act now, your business will be prepared.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>In the times of COVID-19 the business spectrum is changing. It&#8217;s more important to understand and difference of IT security vs IT compliance<\/p>","protected":false},"author":2,"featured_media":51102,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"blogg","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_eb_attr":"","inline_featured_image":false,"_uag_custom_page_level_css":"","wpm_timeformat":"","_wpm_styles":"","footnotes":""},"categories":[118],"tags":[117],"class_list":["post-10963","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogg","tag-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Compliance vs. IT Security: Understanding the Difference - Complior<\/title>\n<meta name=\"description\" content=\"In the times of COVID-19 the business spectrum is changing. It&#039;s more important to understand and difference of IT security vs IT compliance\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/complior.se\/en\/it-compliance-vs-it-security-understanding-the-difference\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Compliance vs. IT Security: Understanding the Difference - Complior\" \/>\n<meta property=\"og:description\" content=\"In the times of COVID-19 the business spectrum is changing. It&#039;s more important to understand and difference of IT security vs IT compliance\" \/>\n<meta property=\"og:url\" content=\"https:\/\/complior.se\/en\/it-compliance-vs-it-security-understanding-the-difference\/\" \/>\n<meta property=\"og:site_name\" content=\"Complior\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-31T10:57:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-18T07:25:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"821\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kikki Bostrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kikki Bostrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/complior.se\\\/it-compliance-vs-it-security-understanding-the-difference\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/it-compliance-vs-it-security-understanding-the-difference\\\/\"},\"author\":{\"name\":\"Kikki Bostrom\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\"},\"headline\":\"IT Compliance vs. IT Security: Understanding the Difference\",\"datePublished\":\"2020-03-31T10:57:34+00:00\",\"dateModified\":\"2026-04-18T07:25:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/it-compliance-vs-it-security-understanding-the-difference\\\/\"},\"wordCount\":602,\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/it-compliance-vs-it-security-understanding-the-difference\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/IT-Compliance-vs-IT-Security-02.png\",\"keywords\":[\"Blog\"],\"articleSection\":[\"Blogg\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/complior.se\\\/it-compliance-vs-it-security-understanding-the-difference\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/it-compliance-vs-it-security-understanding-the-difference\\\/\",\"name\":\"IT Compliance vs. IT Security: Understanding the Difference - Complior\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/it-compliance-vs-it-security-understanding-the-difference\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/it-compliance-vs-it-security-understanding-the-difference\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/IT-Compliance-vs-IT-Security-02.png\",\"datePublished\":\"2020-03-31T10:57:34+00:00\",\"dateModified\":\"2026-04-18T07:25:06+00:00\",\"description\":\"In the times of COVID-19 the business spectrum is changing. It's more important to understand and difference of IT security vs IT compliance\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/complior.se\\\/it-compliance-vs-it-security-understanding-the-difference\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/complior.se\\\/it-compliance-vs-it-security-understanding-the-difference\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/it-compliance-vs-it-security-understanding-the-difference\\\/#primaryimage\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/IT-Compliance-vs-IT-Security-02.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/IT-Compliance-vs-IT-Security-02.png\",\"width\":2048,\"height\":821,\"caption\":\"an image showing the difference between IT security and compliance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/complior.se\\\/it-compliance-vs-it-security-understanding-the-difference\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/complior.se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Compliance vs. IT Security: Understanding the Difference\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/complior.se\\\/#website\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"name\":\"Complior\",\"description\":\"Security beyond compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/complior.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\",\"name\":\"Complior\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"width\":2560,\"height\":960,\"caption\":\"Complior\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\",\"name\":\"Kikki Bostrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"caption\":\"Kikki Bostrom\"},\"url\":\"https:\\\/\\\/complior.se\\\/en\\\/author\\\/kikki\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Compliance vs. IT Security: Understanding the Difference - Complior","description":"In the times of COVID-19 the business spectrum is changing. It's more important to understand and difference of IT security vs IT compliance","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/complior.se\/en\/it-compliance-vs-it-security-understanding-the-difference\/","og_locale":"en_GB","og_type":"article","og_title":"IT Compliance vs. IT Security: Understanding the Difference - Complior","og_description":"In the times of COVID-19 the business spectrum is changing. It's more important to understand and difference of IT security vs IT compliance","og_url":"https:\/\/complior.se\/en\/it-compliance-vs-it-security-understanding-the-difference\/","og_site_name":"Complior","article_published_time":"2020-03-31T10:57:34+00:00","article_modified_time":"2026-04-18T07:25:06+00:00","og_image":[{"width":2048,"height":821,"url":"https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02.png","type":"image\/png"}],"author":"Kikki Bostrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kikki Bostrom","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/complior.se\/it-compliance-vs-it-security-understanding-the-difference\/#article","isPartOf":{"@id":"https:\/\/complior.se\/it-compliance-vs-it-security-understanding-the-difference\/"},"author":{"name":"Kikki Bostrom","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016"},"headline":"IT Compliance vs. IT Security: Understanding the Difference","datePublished":"2020-03-31T10:57:34+00:00","dateModified":"2026-04-18T07:25:06+00:00","mainEntityOfPage":{"@id":"https:\/\/complior.se\/it-compliance-vs-it-security-understanding-the-difference\/"},"wordCount":602,"publisher":{"@id":"https:\/\/complior.se\/#organization"},"image":{"@id":"https:\/\/complior.se\/it-compliance-vs-it-security-understanding-the-difference\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02.png","keywords":["Blog"],"articleSection":["Blogg"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/complior.se\/it-compliance-vs-it-security-understanding-the-difference\/","url":"https:\/\/complior.se\/it-compliance-vs-it-security-understanding-the-difference\/","name":"IT Compliance vs. IT Security: Understanding the Difference - Complior","isPartOf":{"@id":"https:\/\/complior.se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/complior.se\/it-compliance-vs-it-security-understanding-the-difference\/#primaryimage"},"image":{"@id":"https:\/\/complior.se\/it-compliance-vs-it-security-understanding-the-difference\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02.png","datePublished":"2020-03-31T10:57:34+00:00","dateModified":"2026-04-18T07:25:06+00:00","description":"In the times of COVID-19 the business spectrum is changing. It's more important to understand and difference of IT security vs IT compliance","breadcrumb":{"@id":"https:\/\/complior.se\/it-compliance-vs-it-security-understanding-the-difference\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/complior.se\/it-compliance-vs-it-security-understanding-the-difference\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/it-compliance-vs-it-security-understanding-the-difference\/#primaryimage","url":"https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02.png","width":2048,"height":821,"caption":"an image showing the difference between IT security and compliance"},{"@type":"BreadcrumbList","@id":"https:\/\/complior.se\/it-compliance-vs-it-security-understanding-the-difference\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/complior.se\/"},{"@type":"ListItem","position":2,"name":"IT Compliance vs. IT Security: Understanding the Difference"}]},{"@type":"WebSite","@id":"https:\/\/complior.se\/#website","url":"https:\/\/complior.se\/","name":"Complior","description":"Security beyond compliance","publisher":{"@id":"https:\/\/complior.se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/complior.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/complior.se\/#organization","name":"Complior","url":"https:\/\/complior.se\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","width":2560,"height":960,"caption":"Complior"},"image":{"@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016","name":"Kikki Bostrom","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","caption":"Kikki Bostrom"},"url":"https:\/\/complior.se\/en\/author\/kikki\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02.png",2048,821,false],"thumbnail":["https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02-150x150.png",150,150,true],"medium":["https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02-300x120.png",300,120,true],"medium_large":["https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02-768x308.png",768,308,true],"large":["https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02-1024x411.png",1024,411,true],"1536x1536":["https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02-1536x616.png",1536,616,true],"2048x2048":["https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02.png",2048,821,false],"trp-custom-language-flag":["https:\/\/complior.se\/wp-content\/uploads\/2020\/03\/IT-Compliance-vs-IT-Security-02-18x7.png",18,7,true]},"uagb_author_info":{"display_name":"Kikki Bostrom","author_link":"https:\/\/complior.se\/en\/author\/kikki\/"},"uagb_comment_info":0,"uagb_excerpt":"In the times of COVID-19 the business spectrum is changing. It's more important to understand and difference of IT security vs IT compliance","_links":{"self":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/10963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/comments?post=10963"}],"version-history":[{"count":5,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/10963\/revisions"}],"predecessor-version":[{"id":80517,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/10963\/revisions\/80517"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media\/51102"}],"wp:attachment":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media?parent=10963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/categories?post=10963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/tags?post=10963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}