Compass IT Compliance Blog / Social Engineering

Almost Fooled by a Lululemon “Sale”: A Dad’s Lesson on Online Scams

Lululemon Scam

In the world of cybersecurity, we talk about vigilance and verifying links all day long. As a cybersecurity auditor, I focus on Payment Card Industry Data Security Standards (PCI DSS) and often find myself reminding clients and colleagues about the importance of secure online practice …

Read Story

What to Do if Your Elderly Parent Is Being Scammed

Elderly Parent Being Scammed

Scams targeting seniors are on the rise, as fraudsters increasingly exploit the vulnerabilities of older adults. Many individuals are now seeking effective ways to protect their elderly parents from these malicious schemes, aiming to safeguard their financial security and well-being. …

Read Story

How Effective Is Truecaller at Protecting You from Scams?

Answering Phone Call

Truecaller has become a vital tool for many users seeking to protect themselves from scam calls and unwanted communications. By leveraging a comprehensive database of phone numbers and real-time identification, the app helps users make informed decisions about whether to answer incomi …

Read Story

Protecting Seniors from Scams: Thelma Movie Lessons (2024)

Elderly Scams

This blog post contains detailed information about the movie "Thelma." While we aim to provide a comprehensive overview and analysis, please be aware that reading further may reveal key plot points and spoilers. If you have not yet seen the movie and wish to avoid any spoilers, we rec …

Read Story

Phishing vs. Pharming: What's the Difference?

Phishing & Pharming

Online security is a prime concern for individuals and organizations alike with cyber threats and scams targeting users often. Two prevalent cyber threats, phishing, and pharming, pose significant risks to users by attempting to deceive them into revealing sensitive information. Altho …

Read Story

What Is a Whaling Attack? (With Examples)

Whaling Attack

Cybercriminals deploy a wide variety of techniques to target both individuals and organizations, aiming to extract sensitive information. With numerous social engineering strategies at play, many are curious to know, "what is whale phishing?" Whaling attacks, often referred to as CEO …

Read Story

Subscribe by email