Compass IT Compliance Blog / Security Awareness Training

What to Do if Your Elderly Parent Is Being Scammed

Elderly Parent Being Scammed

Scams targeting seniors are on the rise, as fraudsters increasingly exploit the vulnerabilities of older adults. Many individuals are now seeking effective ways to protect their elderly parents from these malicious schemes, aiming to safeguard their financial security and well-being. …

Read Story

Integrating Cybersecurity Education in the K-12 Curriculum

Cybersecurity in K-12 Schools

Cybersecurity has become a cornerstone of our digital society, influencing every aspect of our lives from personal privacy to national security. Given its importance, integrating cybersecurity education into the K-12 curriculum is not just an option; it is a necessity. But how do we w …

Read Story

Protecting Seniors from Scams: Thelma Movie Lessons (2024)

Elderly Scams

This blog post contains detailed information about the movie "Thelma." While we aim to provide a comprehensive overview and analysis, please be aware that reading further may reveal key plot points and spoilers. If you have not yet seen the movie and wish to avoid any spoilers, we rec …

Read Story

Human Risk Management (HRM) Defined: What You Need to Know

Human Risk Management

Human risk management (HRM) is crucial for any organization aiming to minimize potential risks stemming from human behavior and decisions. It addresses employee errors, ethical lapses, and poor management practices, which can significantly impact an organization's operations and reput …

Read Story

Phishing vs. Pharming: What's the Difference?

Phishing & Pharming

Online security is a prime concern for individuals and organizations alike with cyber threats and scams targeting users often. Two prevalent cyber threats, phishing, and pharming, pose significant risks to users by attempting to deceive them into revealing sensitive information. Altho …

Read Story

Credential Stuffing: How To Protect Yourself from Attack

Credential Stuffing

In an age where cybersecurity threats loom large, one of the most prevalent attacks facing both individuals and businesses alike is credential stuffing. This malicious technique preys on the unfortunate reality that many people reuse the same usernames and passwords across multiple ac …

Read Story

Subscribe by email