4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

In a recent security report released by security company phishd by MMR InfoSecurity, the company simulated attack campaigns targeting almost a million users. ITProPortal reports that “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

These findings translate roughly to more than 10 percent of targeted users falling victim to the first two stages of the simulated attack and disclosing their user credentials. When you compare this rate to a traditional hacking method like spam email where the success rate is a fraction of a percentage point, you can see why hackers and scammers are turning to social media in droves.

Diving deeper into this study gives business owners even more reason to worry. James Moore, Managing Director of phishd by MWR InfoSecurity, observes, “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This means that a significant number of users have connected their social media activity to their work email accounts, a bad move that increases the risk of a company experiencing a data breach.

This study highlights the importance of businesses safeguarding their data by including strategies to protect them from phishing scams. Ultimately, this requires a multi-prong approach. In addition to implementing standard security tools like antivirus, spam blocking, and content filtering (which you can use to block social media websites on your network), you’ll want to include training so users will know how to spot a phishing scam, be it found on social media or elsewhere. Otherwise, hackers will utilize a lure so convincing that a user will bypass all of the security measures you’ve put in place--all so they can take advantage of a bogus deal, connect with a fake Facebook friend, respond to a fake job offer, etc.

Today’s businesses must protect their data from threats on every side: social media, email, mobile devices, malicious websites, and more. Is your business prepared to deal with the complex world of network security? If not, then scammers will take advantage of your blind spots and lure your network users into their traps. To make sure that your business is protected from the worst of the web, call 4IT at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 21 August 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Internet Business Computing software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware IT Services Business Efficiency Google Windows Innovation IT Support Hardware Workplace Tips Disaster Recovery Saving Money Miscellaneous VoIP Windows 10 Computer Business Continuity Virtualization Upgrade User Tips Mobile Devices Data Mobile Device Management Server Mobile Computing Email Network Security Communication Network Save Money Alert Quick Tips Social Media communications Smartphones BYOD Going Green Mobile Office Information Technology Microsoft Office Office Smartphone Health Apps Small Business Outsourced IT Android Application Ransomware Operating System Browser Gadgets Managed IT Services Disaster Tablet Firewall Avoiding Downtime Unified Threat Management IT Solutions Managed IT Spam Passwords BDR Mobility Search Risk Management Holiday Chrome The Internet of Things WiFi Productivity Remote Computing Hard Drives Employer-Employee Relationship Saving Time Telephone Systems Budget Vendor Management Automation Hacking Best Practice Remote Monitoring History Data Management Facebook Password Big Data Cybercrime Hosted Solution Apple Computers Cybersecurity Marketing Recovery Phone System Office Tips VPN Wireless Technology Customer Relationship Management Phishing Printer USB Content Filtering Telephony Analytics Gmail Router Law Enforcement Proactive IT Bring Your Own Device User Error Lithium-ion battery Collaboration Humor Administration Money Wearable Technology Antivirus iPhone Current Events Maintenance PowerPoint Social Virus Users Tech Support Social Engineering Windows 8 Outlook Encryption Work/Life Balance Private Cloud Government App Office 365 Cost Management Intranet Point of Sale Bandwidth IT COnsultant Printer Server Laptop Computer Repair OneNote HaaS Wireless Unsupported Software Education Trending Shortcut Net Neutrality Business Intelligence Cloud Computing Google Drive Save Time Virtual Reality Augmented Reality Internet of Things Data Storage Paperless Office Identity Theft Meetings Solid State Drive Data Protection Flexibility Fax Server Instant Messaging Emails Workplace Data Backup HIPAA Streaming Media Entertainment Samsung Benefits DDoS Computer Accessories Uninterrupted Power Supply online currency Network Congestion Mouse Compliance Help Desk hacker Personal Information Two-factor Authentication Managing Stress Transportation SaaS Excel Efficency IT Support Audit Computer Care Battery Robot Automobile End of Support Social Networking Update Customer Service Display Internet Exlporer Biometrics Retail Managed IT Services Busines Continuity Uograde Images Managed Security Scam Networking Computer Fan Near Field Communication Ebay Employer Employee Relationship Sports Human Resources Computing Dark Web IT consulting Screen Mirroring Worker Commute Operating Sysytem Running Cable PDF Scalability Files Reliable Computing Cast Wiring Safety Text Messaging Bloatware Windows 10s Information How To Chromecast Nanotechnology Data Security Debate Upgrades Wi-Fi Emergency Artificial Intelligence Hard Disk Drive Twitter Training Administrator Branding Root Cause Analysis Colocation Distributed Denial of Service HBO Consultant Surge Protector Applications The Blindside Of best practices Television WIndows 7 Company Culture Black Market Access 3D Printing CrashOverride eWaste IT Management Inbound Marketing Touchscreen Politics IT Security data breach Regulations Nokia Settings Cleaning ISP WIndows Server 2008 Value Experience Keyboard Avoid Downtime risk management Cameras User Programming Patch Management Science Blogging Music Hiring/Firing Virtual Desktop Windows 10 Presentation Commerce Best Available Data storage Bluetooth IT Technicians Regulation Website Travel Books Smart Technology Video Games Vulnerability Data Recovery Document Management SharePoint Advertising OneDrive Sync Hard Drive Data Breach Legal Amazon iOS Managed IT Service Co-managed IT Mobile Device Touchpad Teamwork Adobe Sales Taxes Lifestyle Webinar Managed Service Provder Webinar Supercomputer IT solutions Electronic Medical Records IT Budget Tutorial Reputation Storage Shadow IT IT service Relocation Gift Giving Domains Buisness Microblogging Youtube