Compass IT Compliance Blog / Social Engineering (3)

How to Identify Phishing & Online Security Breach Attempts

Phishing Attempts

In today's digital era, cybercrime is escalating at an alarming rate. Numerous studies indicate a continued upward trend in these incidents. Alarmingly, millions fall victim annually, often unaware of the breach.

Read Story

Understanding AI-Powered Social Engineering Attacks

AI Social Engineering

Social engineering manipulates people into revealing sensitive information or granting access to systems. Traditionally, it has involved phishing emails or impersonating authority figures. Today, artificial intelligence (AI) is taking social engineering to a new level. AI attackers ca …

Read Story

How Secure Is MFA Based on SMS?

Woman texting on phone

In an era dominated by advanced technology and an increasing number of cyber threats, ensuring the security of our personal and professional accounts has become paramount. One of the best ways to secure our accounts is through multi-factor authentication (MFA). For those who may not k …

Read Story

How Secure Is Your Crypto Wallet?

Crypto Wallet

Over the past decade, cryptocurrency has shifted from a largely disregarded entity to a highly coveted investment class. Its appeal stems from its nature as a form of digital currency, protected by cryptography and complex computer networks, free from the influence of traditional cent …

Read Story

Safeguard Your Website From SEO Poisoning

Website URL

In today's digital landscape, search engine optimization (SEO) plays a crucial role in enhancing a website's visibility and attracting organic traffic. However, with every advancement in technology, new risks emerge. One such risk is SEO poisoning, a deceptive technique employed by ma …

Read Story

Insider Threats – Your Employee May Be Your Greatest Risk

Office Employees

In February of 2018, Ashley Liles was working as an IT Security Analyst at an Oxford based company that suffered a ransomware attack. Ashley jumped at the opportunity, not to help the company, but to enrich himself by piggybacking on the initial ransomware attack and attempting to tri …

Read Story

Subscribe by email