Compass IT Compliance Blog

Phishing Examples: Google Docs Scam

Friends of Compass,

On this blog, phishing examples are nothing new. But, it is our job to share this information with you so that you stay alert, know what the threats are, and what you can do in the event you fall victim to an attack.

You may have seen the recent reports of a Phishing scam involving Google docs currently making it’s rounds. To ensure your safety and spread awareness we’ve provided a brief outline for you and your staff detailing what to be on the lookout for and what should do in the event you’ve already clicked the bait. 

Social Engineering Techniques, the Stealth Bomber, and You!

We write a lot on this blog about the different Social Engineering Techniques that are being used by bad actors today. We do this to educate you on the threats that are out there and the methods that these organizations will use to achieve their main goal: Steal sensitive information from your company!

What is Social Engineering? Part III


What is Social Engineering? In this blog, I would like to shed some light on some other types of social engineering and provide some context on how to protect your business and self. In my first two blogs, I jumped into the Phishing and Spear Phishing pieces of a social engineering attack. There are numerous other social engineering attacks with some rather creative names.

What is Social Engineering? The Phishing Email

What is Social Engineering? Part 2

The seemingly most common way for an attacker to use social engineering to gain entry, exfiltrate information or disrupt business is through email phishing. As I mentioned in the previous blog, slick tactics like using nicknames and shockingly proper grammar are some of the more nefarious ways email phishing is successful.

What is Social Engineering? Part I

This post will be the first part in a series of three blog posts that outlines some of the most common methods “hackers” use, from a very high level, to gain access to your systems though social engineering tactics. The next two posts will dig a bit deeper into the different methods, what they look like, and how you can recognize them if they happen to you.

What is Social Engineering? Merriam Webster’s definition of Social Engineering is, “the management of human beings in accordance with their place and function in society”. I humbly find this definition not quite dialed in. Recently, I read “The Art of Deception” by Kevin Mitnick and in that book, he clarifies what social engineering is and how it’s used to deceptively accomplish a certain task, goal, or get sensitive data. People, at some time in their lives, may be socially engineered by another person. There could be malicious intent involved. The malicious intent may be part of information gathering to gain access into your company or personal information. As humans we have this trait to find commonality with others which is what opens us up to being social engineered.