Compass IT Compliance Blog / Phishing (9)

Tax Scam Phishing Examples

hacker-1944688_1280.jpg

Tax season is upon us once again. Just like every other tax year, this also marks the beginning of the annual tax season scams that bad actors use to try and steal your information or steal your money. One of the more common scams they run is they attempt to impersonate the IRS and sc …

Read Story

How To Prevent Phishing? More Like How To Train Your (Dragon) End-User

hacking-2903156_1280.jpg

The most dangerous threat to your company’s information isn’t as the movies would lead you to believe. The hacker in a warehouse surrounded with monitors, expounding upon government conspiracies isn’t knocking at your door. The biggest threat is in your building right now and is about …

Read Story

Beware of Hurricane Harvey Phishing Scams

key-west-86025_640.jpg

It is a shame that in the wake of a significant disaster we need to discuss the need for people to be alert of scammers and cyber criminals who are trying to use a tragedy to make money. But here we are and while the people of the great state of Texas deal with a tragedy, the good peo …

Read Story

Phishing Examples: Even the Security Folks Get Targeted... Again!

Phishing Email June 2017.png

If you have been reading the blog for a while, you know that I take phishing examples that I receive or my co-workers receive, post them to the blog, and point out the things that you need to be careful of. I do this primarily to educate folks about what the latest threats look like, …

Read Story

Phishing Examples: Google Docs Scam

Screenshot_20170503-212824.png

Friends of Compass, On this blog, phishing examples are nothing new. But, it is our job to share this information with you so that you stay alert, know what the threats are, and what you can do in the event you fall victim to an attack. You may have seen the recent reports of a Phishi …

Read Story

What is Social Engineering? The Phishing Email

Bad Phishing Email.png

What is Social Engineering? Part 2 The seemingly most common way for an attacker to use social engineering to gain entry, exfiltrate information or disrupt business is through email phishing. As I mentioned in the previous blog, slick tactics like using nicknames and shockingly proper …

Read Story

Subscribe by email