Compass IT Compliance Blog / Security Awareness Training (4)

Building a Privacy Culture This Data Privacy Week

Data Privacy

In 2022, data privacy became a hot topic as consumers became more aware of how their data was being tracked and used by companies. This was partly due to the efforts of companies like Apple to educate consumers about their privacy rights.

Read Story

Only YOU Can Prevent Cyberattacks This October (And Beyond)

Smokey the Bear stands next to a sign that reads "Fire Danger: Moderate"

Some of you may be old enough to remember Smokey the Bear. Created in 1944, the Smokey Bear Wildfire Prevention campaign is the longest-running public service advertising campaign in U.S. history. In 1947, Smokey’s slogan became "Remember... Only YOU Can Prevent Forest Fires".

Read Story

Are You Protecting Your Attack Surface?

An empty office with mostly gray tones

Does your organization understand its attack surface? Gartner, Inc., a technological research and consulting firm, recently published the top trends in Cybersecurity for 2022, with attack surface expansion coming in at number one.

Read Story

Karakurt Data Extortion Group – A New Approach to Ransomware

Karakurt Data Extortion Group – A New Approach to Ransomware

You may be growing tired of hearing the word “ransomware” by now, but this critical threat is unfortunately only continuing to grow at an exponential speed. The Verizon Business 2022 Data Breach Investigations Report (2022 DBIR) notes that ransomware breaches increased by thirteen per …

Read Story

Bypassing Multi-Factor Authentication via Prompt Bombing

A woman logs into Facebook on her phone

It is the middle of the night, and you have finally fallen asleep, only to be awakened by the constant beeping of your phone. Bleary-eyed, you look at your phone to see it is prompting you to agree to log in on one of your accounts. You half wonder if you are dreaming and may instinct …

Read Story

A True Story and Yet Another Cyberattack Victim

A man types in his pin at an ATM

Cybercriminals can act alone, but increasingly we are witnessing cyber gangs (who operate like a small business and are also often referred to as ransomware gangs), with leaders, developers, system administrators, intrusion experts, data exfiltration experts, and monetary experts work …

Read Story

Subscribe by email