ControlScan Blog

Posts Tagged: Social Engineering

November 17, 2017Published by

When they’re successful, phishing attempts can have a significant impact on you personally, as well as on your workplace. They begin innocently enough—a seemingly legitimate DocuSign request or email from a friend—but they can quickly turn your world upside down.Avoid becoming a victim of phishing by following these 3 best practices.


March 31, 2017Published by

Historically speaking, tax season is prime for tax-themed scams and social engineering attacks. Specifically, the number of W-2 phishing scams have peaked recently. Attackers and social engineers begin by targeting finance and HR departments with spear phishing emails that spoof C-level executives and request employee W-2 forms.


May 12, 2016Published by

Internet connectivity drives the way today’s businesses operate. From communicating via email, to processing electronic payment transactions, to managing employee payrolls, nearly everything we do touches the Internet in some way. Unfortunately, the same technology that serves as our business backbone also empowers criminal activity.



April 12, 2016Published by

Chances are you’ve helped someone get into a building without verifying whether or not they should be allowed in, or even asking if they had a legitimate reason for being there. It might have been at a hotel, or the building in which you work, or a building where you had a meeting. […]


November 25, 2015Published by

Social engineers play to people’s wants and needs, focusing on the mental triggers that can make a person do something. Learn what you can do to combat it.


October 23, 2015Published by

Phishing remains a top organizational security vulnerability because it involves the exploitation of human weakness. If you have humans at your workplace—and we all do!—then you are at risk.


June 25, 2015Published by

Last week’s news that the popular password manager LastPass had been breached sent many of its users into a panic, rushing to change their “master passwords.” The reality of the situation is, however, that the stolen master password data was well hashed, making it essentially useless to those on the outside. So there’s absolutely no worry then, right? Wrong.


April 8, 2015Published by

While your bank is doing all it can to keep cybercriminals from accessing your merchant account, your own staff could be undermining the bank’s efforts.


December 5, 2014Published by

Whether your business has 1, 101 or 1001 employees, each person must understand the role they play in protecting the organization’s informational assets, which often include sensitive employee and customer information.

  Read More