Compass IT Compliance Blog / Phishing (5)

It (Should) Be an MFA World, We Are Just Living in It

It (Should) Be an MFA World, We Are Just Living in It

Last week I was working in front of my laptop (happily, for any Compass staff reading) when I got an incoming text message. It was from Verizon. They had received my service request and were working on it. It was quickly followed by another text saying I could check the status of my r …

Read Story

Recommendations from CISA's Recent “Shields Up” Warning

Recommendations from CISA's Recent “Shields Up” Warning

On February 26th, 2022, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) issued immediate Shields Up actions for organizations to take in response to the ongoing conflict with Russia. The basic guidelines are as follows:

Read Story

The Greatest Vulnerability Still Remains – End Users

The Greatest Vulnerability Still Remains – End Users

Recently, I had the opportunity to attend the Boston Cyber Security Summit. One of the most common topics discussed at the event was organizations’ information being compromised by the end user.

Read Story

‘Tis the Season – Don’t Fa La La to Holiday Scams

‘Tis the Season – Don’t Fa La La to Holiday Scams

As another holiday season quickly approaches and holiday gift lists are started, the scammers are also looking to deck the halls during one of their favorite times of the year. As many begin planning for shopping and holiday festivities, unscrupulous scammers are presented with ample …

Read Story

QRishing – A New Version of an Old Scam

A QR code shows on a mobile screen

QR codes are everywhere these days. Codes can be found on restaurant menus (since the start of COVID), company websites, business cards, flyers, brochures, etc. Most individuals are likely to have seen one or scanned one at some point recently.

Read Story

Ransomware Disrupting Your Beer Supply

Ransomware Disrupting Your Beer Supply

When brainstorming blog topics, it often helps to find intersections between your profession and your personal interests. In this case, that intersection is cybersecurity and brewing beer, respectively. But what could beer possibly have to do with cybersecurity?

Read Story

Subscribe by email