4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

In a recent security report released by security company phishd by MMR InfoSecurity, the company simulated attack campaigns targeting almost a million users. ITProPortal reports that “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

These findings translate roughly to more than 10 percent of targeted users falling victim to the first two stages of the simulated attack and disclosing their user credentials. When you compare this rate to a traditional hacking method like spam email where the success rate is a fraction of a percentage point, you can see why hackers and scammers are turning to social media in droves.

Diving deeper into this study gives business owners even more reason to worry. James Moore, Managing Director of phishd by MWR InfoSecurity, observes, “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This means that a significant number of users have connected their social media activity to their work email accounts, a bad move that increases the risk of a company experiencing a data breach.

This study highlights the importance of businesses safeguarding their data by including strategies to protect them from phishing scams. Ultimately, this requires a multi-prong approach. In addition to implementing standard security tools like antivirus, spam blocking, and content filtering (which you can use to block social media websites on your network), you’ll want to include training so users will know how to spot a phishing scam, be it found on social media or elsewhere. Otherwise, hackers will utilize a lure so convincing that a user will bypass all of the security measures you’ve put in place--all so they can take advantage of a bogus deal, connect with a fake Facebook friend, respond to a fake job offer, etc.

Today’s businesses must protect their data from threats on every side: social media, email, mobile devices, malicious websites, and more. Is your business prepared to deal with the complex world of network security? If not, then scammers will take advantage of your blind spots and lure your network users into their traps. To make sure that your business is protected from the worst of the web, call 4IT at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 18 February 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Business Management Hosted Solutions Managed Service Provider Google Malware Business IT Services Efficiency IT Support Windows Disaster Recovery Innovation Hardware Business Continuity Workplace Tips VoIP Computer Saving Money Mobile Devices User Tips Upgrade Windows 10 Network Security Miscellaneous Virtualization Mobile Device Management Data Server Email Mobile Computing communications Alert Communication Network Save Money Microsoft Office Smartphone Small Business Social Media Quick Tips Going Green Managed IT Services Outsourced IT Mobile Office Information Technology Smartphones BYOD Office Health Apps Android Ransomware Operating System Browser Chrome Gadgets Application Productivity Disaster Managed IT Tablet Cybersecurity Holiday Firewall WiFi The Internet of Things Avoiding Downtime Mobility Data Backup Telephone Systems Search Risk Management History Remote Computing Best Practice Unified Threat Management Data Recovery IT Solutions Data Management Passwords Spam Cybercrime BDR Employer-Employee Relationship Budget Automation Remote Monitoring VPN Hacking Facebook Apple Hard Drives Saving Time Vendor Management Marketing User Error Recovery Collaboration Phone System iPhone Customer Relationship Management Law Enforcement Wireless Technology Office Tips Big Data Content Filtering Money Phishing Password Proactive IT Hosted Solution Computers Telephony Intranet Humor Lithium-ion battery Administration Wearable Technology Work/Life Balance Maintenance PowerPoint Current Events Virus Office 365 Antivirus Printer Vulnerability Shortcut USB Social Analytics Encryption Bring Your Own Device Router Gmail Government Point of Sale Save Time Cost Management IT COnsultant Private Cloud Computer Repair Data Protection Data Security Bandwidth Printer Server Flexibility Laptop OneNote Trending SaaS Education Net Neutrality Users Audit HaaS Windows 8 Politics Personal Information Tech Support Business Intelligence Outlook Wireless Unsupported Software Social Engineering Google Drive Cloud Computing App Instant Messaging online currency Emails Internet Exlporer HIPAA Internet of Things Entertainment Identity Theft Benefits Solid State Drive DDoS Computer Accessories Sports Compliance Mouse Efficency Two-factor Authentication Samsung Social Networking Wi-Fi Managing Stress Emergency Artificial Intelligence Excel Applications IT Support Display Windows 10 hacker Travel Augmented Reality Transportation Paperless Office Customer Service Update Robot Biometrics Computer Care Data Loss Battery Fax Server Retail Virtual Reality Workplace Automobile Network Congestion Redundancy Data Storage End of Support Meetings Streaming Media Data Breach Uninterrupted Power Supply Help Desk Twitter Legal Touchpad Reliable Computing Mobile Device File Sharing Nokia Managed Security Surge Protector Cast Bloatware Scam Television Windows 10s Nanotechnology 3D Printing systems Employer Employee Relationship Tablets Hard Disk Drive Worker Commute Root Cause Analysis Operating Sysytem Branding hack HBO PDF Distributed Denial of Service ISP Files NFL Scalability best practices CrashOverride WIndows 7 Cortana Blogging Inbound Marketing Safety IT Management Text Messaging eWaste Programming Storage Chromecast Regulations Project Management Word How To data breach Hard Drive Settings Upgrades Legislation Website Value WIndows Server 2008 Administrator Cameras MSP Training Windows Ink risk management Images Colocation User Consultant Uograde The Blindside Of Patch Management OneDrive Science Access Virtual Desktop Amazon Presentation Company Culture Google Maps Black Market Commerce Bluetooth Best Available Touchscreen Co-managed IT IT Security Regulation IT Technicians Cleaning Software as a Service Experience Lifestyle SharePoint Ebay Keyboard Sync Avoid Downtime Wiring iOS Computing Information Music Managed IT Service Teamwork Busines Continuity Hiring/Firing Adobe Managed IT Services Computer Fan Data storage Networking Near Field Communication Debate Google Docs Books Smart Technology Licensing Video Games Dark Web Human Resources IT consulting Microsoft Excel Document Management Screen Mirroring Advertising Running Cable Spyware Mobile IT solutions FAQ Fraud Professional Services Taxes Charger Edge Supercomputer Wireless Charging Electronic Medical Records Gift Giving Ciminal IT Budget WannaCry Reputation IT service Evernote Microblogging Youtube Comparison Domains Workers Blockchain Sales Specifications Updates Managed Service Provder Identities Webinar Shadow IT Conferencing Relocation Microsoft Word Buisness Gifts Device Security Devices Tutorial Webinar Credit Cards