What Is AI Voice Spoofing? How to Protect Your Organization
by Louis Trout on September 17, 2025 at 3:17 PM
In today’s digital-first world, cybercriminals are constantly developing new methods to bypass security controls and exploit human trust. Among the most alarming of these threats is AI voice spoofing — a rapidly growing technique that uses artificial intelligence to replicate a person …
What to Do if Your Elderly Parent Is Being Scammed
by Peter Fellini on August 16, 2024 at 10:45 AM
Scams targeting seniors are on the rise, as fraudsters increasingly exploit the vulnerabilities of older adults. Many individuals are now seeking effective ways to protect their elderly parents from these malicious schemes, aiming to safeguard their financial security and well-being. …
How Effective Is Truecaller at Protecting You from Scams?
by Nicholas Foisy on July 31, 2024 at 1:42 PM
Truecaller has become a vital tool for many users seeking to protect themselves from scam calls and unwanted communications. By leveraging a comprehensive database of phone numbers and real-time identification, the app helps users make informed decisions about whether to answer incomi …
How Secure Is MFA Based on SMS?
by Adam Lyford on October 27, 2023 at 1:15 PM
In an era dominated by advanced technology and an increasing number of cyber threats, ensuring the security of our personal and professional accounts has become paramount. One of the best ways to secure our accounts is through multi-factor authentication (MFA). For those who may not k …
Vishing: Over-the-Phone Scamming
by Matthew Colson on June 8, 2023 at 5:00 PM
It's always scam season, so it helps to stay vigilant all year round. Cyberattackers scarcely rest. They are constantly developing novel approaches for stealing confidential information and vast sums of money from businesses worldwide, disrupting operations and causing considerable da …
Different Types of Social Engineering Attacks Explained
by Diann Davids on June 2, 2023 at 9:30 AM
What Are Social Engineering Attacks Social engineering attacks are a common method used by cybercriminals to manipulate people into divulging sensitive or confidential information about themselves or taking actions that may cause harm to themselves or their organization. Social engine …
.webp?width=2169&height=526&name=Compass%20regular%20transparent%20website%20(1).webp)
-1.webp?width=2169&height=620&name=Compass%20regular%20transparent%20website%20smaller%20(1)-1.webp)





