Compass IT Compliance Blog / Social Engineering (7)

VA Data Breach Exposes the Personal Info of 46,000 Veterans

VA Data Breach Exposes the Personal Info of 46,000 Veterans

Being hacked is unfortunately still an all too common occurrence. Even as security measures get stronger, reports of breaches and compromises of individual’s personal information do not seem to be slowing down.

Read Story

Situational Awareness – How Strong Are Your Spidey Senses?

Spiderman

How aware are we of our surroundings? What is happening around us that we are not aware of? Being more cognitive of our surroundings at work and at home can bring a lot of positive results to our corporate security posture.

Read Story

Home Network Security for Remote Workers

Home Network Security for Remote Workers

The COVID-19 pandemic has presented unprecedented global challenges at all levels of society today, from healthcare to social concerns. With much of the East and West Coasts experiencing government-enforced social distancing lock downs, businesses have had to scramble to turn their da …

Read Story

Grocery Stores – A Hidden Gem for Cyber Criminals?

Grocery Stores – A Hidden Gem for Cyber Criminals?

Following the recent closures of many public-facing businesses in the United States (and across the globe) in response to the spread of Coronavirus (COVID-19), this week’s blog post will discuss some of the cybersecurity challenges and vulnerabilities facing one of the only industries …

Read Story

Microsoft Teams – The New Phishing Platform for Hackers?

Microsoft Teams – The New Phishing Platform for Hackers?

Many organizations are moving to cloud services for email, voice, and collaboration software. One of the major services being offered is Microsoft Teams. Teams is powerful collaboration software that allows users to share files, screen share, instant message, schedule meetings and voi …

Read Story

Examples of Effective Vishing Attacks

Examples of Effective Vishing Attacks

Vishing (not to be confused with phishing) is a form of social engineering that attempts to manipulate an individual to give an attacker personal information like usernames and passwords, credit card information, and social security numbers via the telephone. The attacker will call an …

Read Story

Subscribe by email