David Bienkiewicz

David Bienkiewicz

David Bienkiewicz is an IT Security and an IT Development Specialist at Compass IT Compliance. He specializes in phishing assessments and penetration testing. David holds a Bachelor of Science degree in Cyber Security and Network Engineering and an Associates Degree in Information Technology and Network Engineering at the New England Institute of Technology.

Posts by David Bienkiewicz

What Are DKIM, SPF, & DMARC? Why Are They So Important?

What Are DKIM, SPF, & DMARC? Why Are They So Important?

If you are asking yourself, "what is DKIM, DMARC, and SPF", you have come to the right place. DKIM, SPF, and DMARC are all email authentication technologies that are free to use for your organization. These technologies can be very useful for your organization and for domains out in t …

Read Story

Examples of Effective Vishing Attacks

Examples of Effective Vishing Attacks

Vishing (not to be confused with phishing) is a form of social engineering that attempts to manipulate an individual to give an attacker personal information like usernames and passwords, credit card information, and social security numbers via the telephone. The attacker will call an …

Read Story

What You Can Do to Better Prepare Yourself for Holiday Scams

christmas-1911637_1920

It’s that time of the year again! With the holiday season upon us, many criminals will be attempting to scam people via phishing emails. This time of the year (Black Friday, Christmas) is the most lucrative for attackers due to the fact that stores are having a crazy amount of sales w …

Read Story

Spear Phishing: Targeted Attacks with Higher Success Rates

mohamed-ahzam-5rVQPPN7fNg-unsplash

Spear phishing is a deadly form of targeted social engineering. The main difference between spear phishing and traditional phishing is that spear phishing targets a certain user or users by using important facets of their life against them, while traditional phishing targets a broad g …

Read Story

Trends and Tactics in Phishing

get-me-out-1605906_1920

When I’m tasked with creating phishing emails for clients, I begin by looking up what the recent phishing trends are in the real world, or the top 10 most reported phishing attacks for the month / year. I often end up finding scams about winning the latest iPhone from a phone service …

Read Story

Subscribe by email