Compass IT Compliance Blog / Social Engineering (2)

Physical Security Assessments: Covert Entry vs Escorted Walkthrough

Physical Security Assessments

When businesses seek a third-party physical security assessment, they must decide on the most appropriate testing methodology to gauge their security posture. These methodologies may go by several names, but the concepts and approaches often fit into one of two categories: covert entr …

Read Story

Season of Giving or Taking? Protect Yourself from Holiday Scams

Holiday Shopping Scams

The holiday season is a time for joy, connection, and generosity. Families gather to celebrate, communities embrace the spirit of giving, and stores offer enticing sales to meet the demands of holiday shoppers. Unfortunately, the same excitement and busyness that make the season speci …

Read Story

Almost Fooled by a Lululemon “Sale”: A Dad’s Lesson on Online Scams

Lululemon Scam

In the world of cybersecurity, we talk about vigilance and verifying links all day long. As a cybersecurity auditor, I focus on Payment Card Industry Data Security Standards (PCI DSS) and often find myself reminding clients and colleagues about the importance of secure online practice …

Read Story

Phishing vs. Pharming: What's the Difference?

Phishing & Pharming

Online security is a prime concern for individuals and organizations alike with cyber threats and scams targeting users often. Two prevalent cyber threats, phishing, and pharming, pose significant risks to users by attempting to deceive them into revealing sensitive information. Altho …

Read Story

What Is a Whaling Attack? (With Examples)

Whaling Attack

Cybercriminals deploy a wide variety of techniques to target both individuals and organizations, aiming to extract sensitive information. With numerous social engineering strategies at play, many are curious to know, "what is whale phishing?" Whaling attacks, often referred to as CEO …

Read Story

How to Identify Phishing & Online Security Breach Attempts

Phishing Attempts

In today's digital era, cybercrime is escalating at an alarming rate. Numerous studies indicate a continued upward trend in these incidents. Alarmingly, millions fall victim annually, often unaware of the breach.

Read Story

Subscribe by email