Compass IT Compliance Blog / Social Engineering (4)

Smishing: Text Messages from Scammers

Smishing

Like most people, you have probably received a text message from a phone number that seemed a little “fishy”. The message may have claimed to be from your bank, asking you to verify your account information, or it may have promised you a gift card if you clicked on a provided link.

Read Story

Here's Why You Need A Password Manager

Password Manager

My mother bragged to me once that she is very good with technology. When I (her free tech support) raised an eyebrow at this, she pulled out a notepad that had handwritten notes on how to change the TV input from cable to the DVD player.

Read Story

Penetration Testing: Understanding Red, Blue, & Purple Teams

Red Team Blue Team

Data breaches are growing more expensive by the day. The average cost of a data breach is projected to reach $5 million by the end of 2023, up from $4.35 million in 2022. Penetration testing, or pen testing, helps you uncover unknown vulnerabilities and compliance gaps within your org …

Read Story

It Is Always Scam Season!

Scam Season

With the holiday season now behind us, we here in the northeast are fully entrenched in winter and I find myself looking forward already to the warm weather that comes with spring and summer. As these seasons come and go, we have learned that scam season is always here, and it is not …

Read Story

Are You Protecting Your Attack Surface?

An empty office with mostly gray tones

Does your organization understand its attack surface? Gartner, Inc., a technological research and consulting firm, recently published the top trends in Cybersecurity for 2022, with attack surface expansion coming in at number one.

Read Story

What Does a Passwordless Future Look Like?

A man logs into Instagram on his cellphone

Passwords have served as a critical element in the work we do here at Compass IT Compliance since our founding over a decade ago. Whether it is educating individuals on the best practices for developing strong passwords, creating a password policy, utilizing automated programs to atte …

Read Story

Subscribe by email