Compass IT Compliance Blog / Phishing (8)

Vishing – A Closer Look

mobile-605422_1920

Vishing, a shortened name for voice phishing, is the act of using a telephone to trick an individual into surrendering useful information to a fraudulent caller. Vishing is a form of social engineering, and as in most social engineering attempts, the attacker will create a false ident …

Read Story

Trends and Tactics in Phishing

get-me-out-1605906_1920

When I’m tasked with creating phishing emails for clients, I begin by looking up what the recent phishing trends are in the real world, or the top 10 most reported phishing attacks for the month / year. I often end up finding scams about winning the latest iPhone from a phone service …

Read Story

Tax Scam Phishing Examples

hacker-1944688_1280.jpg

Tax season is upon us once again. Just like every other tax year, this also marks the beginning of the annual tax season scams that bad actors use to try and steal your information or steal your money. One of the more common scams they run is they attempt to impersonate the IRS and sc …

Read Story

How To Prevent Phishing? More Like How To Train Your (Dragon) End-User

hacking-2903156_1280.jpg

The most dangerous threat to your company’s information isn’t as the movies would lead you to believe. The hacker in a warehouse surrounded with monitors, expounding upon government conspiracies isn’t knocking at your door. The biggest threat is in your building right now and is about …

Read Story

Beware of Hurricane Harvey Phishing Scams

key-west-86025_640.jpg

It is a shame that in the wake of a significant disaster we need to discuss the need for people to be alert of scammers and cyber criminals who are trying to use a tragedy to make money. But here we are and while the people of the great state of Texas deal with a tragedy, the good peo …

Read Story

Phishing Examples: Even the Security Folks Get Targeted... Again!

Phishing Email June 2017.png

If you have been reading the blog for a while, you know that I take phishing examples that I receive or my co-workers receive, post them to the blog, and point out the things that you need to be careful of. I do this primarily to educate folks about what the latest threats look like, …

Read Story

Subscribe by email