Compass IT Compliance Blog / Social Engineering (7)

Situational Awareness – How Strong Are Your Spidey Senses?

Spiderman

How aware are we of our surroundings? What is happening around us that we are not aware of? Being more cognitive of our surroundings at work and at home can bring a lot of positive results to our corporate security posture.

Read Story

Home Network Security for Remote Workers

Home Network Security for Remote Workers

The COVID-19 pandemic has presented unprecedented global challenges at all levels of society today, from healthcare to social concerns. With much of the East and West Coasts experiencing government-enforced social distancing lock downs, businesses have had to scramble to turn their da …

Read Story

Grocery Stores – A Hidden Gem for Cyber Criminals?

Grocery Stores – A Hidden Gem for Cyber Criminals?

Following the recent closures of many public-facing businesses in the United States (and across the globe) in response to the spread of Coronavirus (COVID-19), this week’s blog post will discuss some of the cybersecurity challenges and vulnerabilities facing one of the only industries …

Read Story

Microsoft Teams – The New Phishing Platform for Hackers?

Microsoft Teams – The New Phishing Platform for Hackers?

Many organizations are moving to cloud services for email, voice, and collaboration software. One of the major services being offered is Microsoft Teams. Teams is powerful collaboration software that allows users to share files, screen share, instant message, schedule meetings and voi …

Read Story

Examples of Effective Vishing Attacks

Examples of Effective Vishing Attacks

Vishing (not to be confused with phishing) is a form of social engineering that attempts to manipulate an individual to give an attacker personal information like usernames and passwords, credit card information, and social security numbers via the telephone. The attacker will call an …

Read Story

Microsoft Office Add-ins, Reason for Concern?

The outside of Microsoft headquarters

This question came into Compass IT Compliance from a client the other day: “How risky are 3rd party plugins? Should I be concerned about them?”. I had to stop and think about this for a while. In my years of working on vulnerability and penetration testing projects for Compass IT Comp …

Read Story

Subscribe by email