Compass IT Compliance Blog / Security Awareness Training (3)

Understanding USB Flash Drive Security Risks and Forensics

USB Flash Drive

In the rapidly evolving landscape of corporate IT infrastructure, the use of USB devices in the workplace has become commonplace. While these devices offer flexibility and portability, they also bring a myriad of security concerns for organizations. The challenge lies in ensuring that …

Read Story

Vishing: Over-the-Phone Scamming

Vishing Phone Call

It's always scam season, so it helps to stay vigilant all year round. Cyberattackers scarcely rest. They are constantly developing novel approaches for stealing confidential information and vast sums of money from businesses worldwide, disrupting operations and causing considerable da …

Read Story

8 Different Types of Social Engineering Attacks Explained

Social Engineering

What Are Social Engineering Attacks Social engineering attacks are a common method used by cybercriminals to manipulate people into divulging sensitive or confidential information about themselves or taking actions that may cause harm to themselves or their organization. Social engine …

Read Story

Tug-of-War: Balancing Security and Efficiency

Tug of War

I find it helpful when explaining principles to think in extremes. So, when it comes to the principle of securing a system, what is the most secure? Let us use this computer I am typing on as an example. Off. That is the most secure. Let us even take the battery out, unplug everything …

Read Story

Smishing: Text Messages from Scammers

Smishing

Like most people, you have probably received a text message from a phone number that seemed a little “fishy”. The message may have claimed to be from your bank, asking you to verify your account information, or it may have promised you a gift card if you clicked on a provided link.

Read Story

What Is Password Spraying? How Can It Affect Customers?

Password Spraying

Brute force attacks like password spraying have been on the uptick recently, according to Microsoft's team of experts. Although only about 1% of these attacks are successful, they can be devastating. Affected companies often suffer serious financial and reputational damage.

Read Story

Subscribe by email