Compass IT Compliance Blog / Security Awareness Training (5)

A True Story and Yet Another Cyberattack Victim

A man types in his pin at an ATM

Cybercriminals can act alone, but increasingly we are witnessing cyber gangs (who operate like a small business and are also often referred to as ransomware gangs), with leaders, developers, system administrators, intrusion experts, data exfiltration experts, and monetary experts work …

Read Story

Weighing Your Multi-Factor Authentication Options

An old metal and wood scale

At this point most of us have heard that securing our accounts with only passwords, no matter how complex, is not enough. Do not get me wrong, requiring strong passwords (14 or more characters, composed of uppercase and lowercase letters, and including symbols and numbers) is essentia …

Read Story

Receiving a Scam Text… From My Own Phone Number

Verizon Building

Throughout my years working in the IT security and compliance field I have had the opportunity to learn about dozens of different social engineering attack strategies that malicious actors will utilize to achieve their goals. This past weekend, I had the unique opportunity to witness …

Read Story

Recommendations from CISA's Recent “Shields Up” Warning

Recommendations from CISA's Recent “Shields Up” Warning

On February 26th, 2022, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) issued immediate Shields Up actions for organizations to take in response to the ongoing conflict with Russia. The basic guidelines are as follows:

Read Story

The Greatest Vulnerability Still Remains – End Users

The Greatest Vulnerability Still Remains – End Users

Recently, I had the opportunity to attend the Boston Cyber Security Summit. One of the most common topics discussed at the event was organizations’ information being compromised by the end user.

Read Story

QRishing – A New Version of an Old Scam

A QR code shows on a mobile screen

QR codes are everywhere these days. Codes can be found on restaurant menus (since the start of COVID), company websites, business cards, flyers, brochures, etc. Most individuals are likely to have seen one or scanned one at some point recently.

Read Story

Subscribe by email