Compass IT Compliance Blog / Vishing

What Is AI Voice Spoofing? How to Protect Your Organization

What Is AI Voice Spoofing?

In today’s digital-first world, cybercriminals are constantly developing new methods to bypass security controls and exploit human trust. Among the most alarming of these threats is AI voice spoofing — a rapidly growing technique that uses artificial intelligence to replicate a person …

Read Story

What to Do if Your Elderly Parent Is Being Scammed

Elderly Parent Being Scammed

Scams targeting seniors are on the rise, as fraudsters increasingly exploit the vulnerabilities of older adults. Many individuals are now seeking effective ways to protect their elderly parents from these malicious schemes, aiming to safeguard their financial security and well-being. …

Read Story

How Effective Is Truecaller at Protecting You from Scams?

Answering Phone Call

Truecaller has become a vital tool for many users seeking to protect themselves from scam calls and unwanted communications. By leveraging a comprehensive database of phone numbers and real-time identification, the app helps users make informed decisions about whether to answer incomi …

Read Story

How Secure Is MFA Based on SMS?

Woman texting on phone

In an era dominated by advanced technology and an increasing number of cyber threats, ensuring the security of our personal and professional accounts has become paramount. One of the best ways to secure our accounts is through multi-factor authentication (MFA). For those who may not k …

Read Story

Vishing: Over-the-Phone Scamming

Vishing Phone Call

It's always scam season, so it helps to stay vigilant all year round. Cyberattackers scarcely rest. They are constantly developing novel approaches for stealing confidential information and vast sums of money from businesses worldwide, disrupting operations and causing considerable da …

Read Story

Different Types of Social Engineering Attacks Explained

Social Engineering

What Are Social Engineering Attacks Social engineering attacks are a common method used by cybercriminals to manipulate people into divulging sensitive or confidential information about themselves or taking actions that may cause harm to themselves or their organization. Social engine …

Read Story

Subscribe by email