Compass IT Compliance Blog / Phishing (8)

Network Defense - Look at Policies and Training First

network-4393368_1920

I live in two worlds. The first is with Compass IT Compliance where most of our clients are small to medium businesses that don’t have their own security teams in house. The second is with the US Air Force where my only job is to help secure the entire enterprise. I am always blown aw …

Read Story

Spear Phishing: Targeted Attacks with Higher Success Rates

mohamed-ahzam-5rVQPPN7fNg-unsplash

Spear phishing is a deadly form of targeted social engineering. The main difference between spear phishing and traditional phishing is that spear phishing targets a certain user or users by using important facets of their life against them, while traditional phishing targets a broad g …

Read Story

Vishing – A Closer Look

mobile-605422_1920

Vishing, a shortened name for voice phishing, is the act of using a telephone to trick an individual into surrendering useful information to a fraudulent caller. Vishing is a form of social engineering, and as in most social engineering attempts, the attacker will create a false ident …

Read Story

Trends and Tactics in Phishing

get-me-out-1605906_1920

When I’m tasked with creating phishing emails for clients, I begin by looking up what the recent phishing trends are in the real world, or the top 10 most reported phishing attacks for the month / year. I often end up finding scams about winning the latest iPhone from a phone service …

Read Story

Tax Scam Phishing Examples

hacker-1944688_1280.jpg

Tax season is upon us once again. Just like every other tax year, this also marks the beginning of the annual tax season scams that bad actors use to try and steal your information or steal your money. One of the more common scams they run is they attempt to impersonate the IRS and sc …

Read Story

How To Prevent Phishing? More Like How To Train Your (Dragon) End-User

hacking-2903156_1280.jpg

The most dangerous threat to your company’s information isn’t as the movies would lead you to believe. The hacker in a warehouse surrounded with monitors, expounding upon government conspiracies isn’t knocking at your door. The biggest threat is in your building right now and is about …

Read Story

Subscribe by email