Compass IT Compliance Blog

Different Types of Social Engineering Attacks Explained

Social Engineering

What Are Social Engineering Attacks Social engineering attacks are a common method used by cybercriminals to manipulate people into divulging sensitive or confidential information about themselves or taking actions that may cause harm to themselves or their organization. Social engine …

Read Story

Tug-of-War: Balancing Security and Efficiency

Tug of War

I find it helpful when explaining principles to think in extremes. So, when it comes to the principle of securing a system, what is the most secure? Let us use this computer I am typing on as an example. Off. That is the most secure. Let us even take the battery out, unplug everything …

Read Story

Smishing: Text Messages from Scammers

Smishing

Like most people, you have probably received a text message from a phone number that seemed a little “fishy”. The message may have claimed to be from your bank, asking you to verify your account information, or it may have promised you a gift card if you clicked on a provided link.

Read Story

MIME Sniffing: What Is It? What Are the Security Implications?

Mime Sniffing

Multipurpose Internet Mail Extension (MIME) sniffing has been in use for decades to allow a browser to render content when there is some question about what type of data the content contains. However, MIME sniffing can also open your organization and end users up to serious cybersecur …

Read Story

Addressing the Risks of Artificial Intelligence (AI)

AI ChatGPT

Artificial intelligence (AI) is a tool with transformative potential across various domains. It can enhance medical diagnoses and bolster cybersecurity, improving decision-making and efficiency. Nevertheless, like any emerging technology, AI carries certain risks.

Read Story

Here's Why You Need A Password Manager

Password Manager

My mother bragged to me once that she is very good with technology. When I (her free tech support) raised an eyebrow at this, she pulled out a notepad that had handwritten notes on how to change the TV input from cable to the DVD player.

Read Story

Subscribe by email