4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

In a recent security report released by security company phishd by MMR InfoSecurity, the company simulated attack campaigns targeting almost a million users. ITProPortal reports that “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

These findings translate roughly to more than 10 percent of targeted users falling victim to the first two stages of the simulated attack and disclosing their user credentials. When you compare this rate to a traditional hacking method like spam email where the success rate is a fraction of a percentage point, you can see why hackers and scammers are turning to social media in droves.

Diving deeper into this study gives business owners even more reason to worry. James Moore, Managing Director of phishd by MWR InfoSecurity, observes, “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This means that a significant number of users have connected their social media activity to their work email accounts, a bad move that increases the risk of a company experiencing a data breach.

This study highlights the importance of businesses safeguarding their data by including strategies to protect them from phishing scams. Ultimately, this requires a multi-prong approach. In addition to implementing standard security tools like antivirus, spam blocking, and content filtering (which you can use to block social media websites on your network), you’ll want to include training so users will know how to spot a phishing scam, be it found on social media or elsewhere. Otherwise, hackers will utilize a lure so convincing that a user will bypass all of the security measures you’ve put in place--all so they can take advantage of a bogus deal, connect with a fake Facebook friend, respond to a fake job offer, etc.

Today’s businesses must protect their data from threats on every side: social media, email, mobile devices, malicious websites, and more. Is your business prepared to deal with the complex world of network security? If not, then scammers will take advantage of your blind spots and lure your network users into their traps. To make sure that your business is protected from the worst of the web, call 4IT at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 23 June 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet Business Computing software Hackers Hosted Solutions Productivity Backup Business Management Managed Service Provider Business Malware IT Services Google Innovation Efficiency Windows IT Support Workplace Tips Hardware Disaster Recovery Saving Money Computer Miscellaneous Windows 10 VoIP Business Continuity Upgrade Virtualization Mobile Devices Data User Tips Mobile Computing Server Mobile Device Management Save Money Communication Network Security Quick Tips Network Alert Smartphones Information Technology Going Green Mobile Office Email communications Social Media Office Health Smartphone BYOD Microsoft Office Apps Small Business Application Operating System Gadgets Android Managed IT Services Ransomware Firewall Disaster Tablet Browser BDR Search Passwords Holiday Chrome The Internet of Things Avoiding Downtime Mobility Remote Computing Unified Threat Management WiFi Outsourced IT Telephone Systems Employer-Employee Relationship Budget Automation Vendor Management Hacking Risk Management Best Practice IT Solutions Data Management Hard Drives Spam Remote Monitoring History Saving Time Cybercrime Productivity Apple Recovery VPN Marketing Wireless Technology Office Tips Facebook Big Data Customer Relationship Management Computers User Error Telephony Managed IT Lithium-ion battery Collaboration Phone System Cybersecurity Bring Your Own Device Law Enforcement Current Events Humor Printer Antivirus Administration USB Content Filtering Wearable Technology Money Social iPhone Analytics Maintenance Gmail PowerPoint Router Password Virus Cloud Computing Social Engineering Government App Hosted Solution Users Cost Management Save Time Intranet Windows 8 Bandwidth Private Cloud Printer Server Laptop Work/Life Balance Trending Education Net Neutrality Point of Sale IT COnsultant HaaS Computer Repair Tech Support Encryption Wireless Phishing Proactive IT Google Drive Uninterrupted Power Supply online currency Internet Exlporer Instant Messaging Emails Internet of Things HIPAA Identity Theft Solid State Drive Entertainment Flexibility Benefits DDoS Computer Accessories Efficency OneNote Mouse Samsung Network Congestion Two-factor Authentication Help Desk Office 365 Managing Stress SaaS Display Audit hacker Augmented Reality Personal Information Transportation Paperless Office Shortcut Business Intelligence Computer Care Battery Robot Customer Service Outlook Fax Server Update Biometrics Retail Workplace Unsupported Software Automobile End of Support Virtual Reality Social Networking Streaming Media Document Management Meetings Advertising Data Breach Twitter Legal Human Resources iOS IT consulting Uograde Images Mobile Device Running Cable Touchpad Surge Protector Managed Security Scam Television Computer Fan Reliable Computing 3D Printing Bloatware Data Protection Employer Employee Relationship Dark Web Sports Worker Commute Operating Sysytem PDF ISP Wiring Scalability Branding Data Backup Files Information Compliance Distributed Denial of Service Text Messaging Windows 10s Debate Programming Blogging Safety How To Nanotechnology Chromecast WIndows 7 Inbound Marketing Upgrades Wi-Fi eWaste Artificial Intelligence Hard Disk Drive Regulations Website Emergency Training Root Cause Analysis Administrator Excel Value Consultant Applications Colocation best practices Cameras OneDrive The Blindside Of Amazon Company Culture Black Market Access User Nokia Science Touchscreen Co-managed IT Politics Virtual Desktop data breach Presentation IT Security Cleaning Bluetooth Best Available Travel Experience IT Technicians Keyboard Avoid Downtime risk management Ebay Computing SharePoint Music Hiring/Firing Windows 10 Teamwork Data storage Busines Continuity Books Smart Technology Video Games Networking Vulnerability Near Field Communication Hard Drive Microblogging Youtube Managed IT Services Sales Taxes Managed Service Provder Webinar Webinar Supercomputer Gift Giving IT solutions Electronic Medical Records IT Budget Reputation Storage IT service Domains CrashOverride Shadow IT Lifestyle Relocation Buisness Tutorial