4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

In a recent security report released by security company phishd by MMR InfoSecurity, the company simulated attack campaigns targeting almost a million users. ITProPortal reports that “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

These findings translate roughly to more than 10 percent of targeted users falling victim to the first two stages of the simulated attack and disclosing their user credentials. When you compare this rate to a traditional hacking method like spam email where the success rate is a fraction of a percentage point, you can see why hackers and scammers are turning to social media in droves.

Diving deeper into this study gives business owners even more reason to worry. James Moore, Managing Director of phishd by MWR InfoSecurity, observes, “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This means that a significant number of users have connected their social media activity to their work email accounts, a bad move that increases the risk of a company experiencing a data breach.

This study highlights the importance of businesses safeguarding their data by including strategies to protect them from phishing scams. Ultimately, this requires a multi-prong approach. In addition to implementing standard security tools like antivirus, spam blocking, and content filtering (which you can use to block social media websites on your network), you’ll want to include training so users will know how to spot a phishing scam, be it found on social media or elsewhere. Otherwise, hackers will utilize a lure so convincing that a user will bypass all of the security measures you’ve put in place--all so they can take advantage of a bogus deal, connect with a fake Facebook friend, respond to a fake job offer, etc.

Today’s businesses must protect their data from threats on every side: social media, email, mobile devices, malicious websites, and more. Is your business prepared to deal with the complex world of network security? If not, then scammers will take advantage of your blind spots and lure your network users into their traps. To make sure that your business is protected from the worst of the web, call 4IT at 305-278-7100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 11 December 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Disaster Recovery Innovation Hardware Business Continuity Workplace Tips VoIP Computer User Tips Saving Money Windows 10 Miscellaneous Virtualization Upgrade Mobile Device Management Mobile Devices Data Network Security Server Mobile Computing Email Alert Communication Network Save Money Microsoft Office communications Small Business Smartphone Quick Tips Social Media Information Technology Smartphones BYOD Going Green Mobile Office Android Apps Office Health Application Browser Ransomware Gadgets Operating System Chrome Managed IT Services Outsourced IT Tablet Mobility WiFi Holiday Productivity Firewall Avoiding Downtime Managed IT Disaster Cybercrime Risk Management Spam Telephone Systems BDR Search Passwords The Internet of Things Best Practice Data Management Remote Computing Unified Threat Management Cybersecurity IT Solutions Hard Drives Saving Time Employer-Employee Relationship History Remote Monitoring Budget Automation Apple VPN Hacking Vendor Management Facebook Content Filtering Hosted Solution Data Backup Computers Proactive IT iPhone Customer Relationship Management User Error Recovery Phone System Money Collaboration Office Tips Wireless Technology Data Recovery Marketing Big Data Phishing Password Law Enforcement Humor Administration Analytics Encryption Office 365 Gmail Wearable Technology Router Telephony Government Maintenance PowerPoint Virus Lithium-ion battery Current Events Bring Your Own Device Vulnerability Antivirus Shortcut Social Printer Work/Life Balance USB Computer Repair Social Engineering Outlook Data Security App Private Cloud Politics Personal Information Cost Management Intranet Users Bandwidth Printer Server Wireless Windows 8 Unsupported Software Laptop OneNote SaaS Cloud Computing Google Drive Audit HaaS Save Time Education Trending Net Neutrality Business Intelligence Data Protection Point of Sale IT COnsultant Tech Support Meetings Samsung Fax Server Wi-Fi Artificial Intelligence Emergency Workplace Instant Messaging Applications Emails Streaming Media HIPAA hacker Uninterrupted Power Supply Entertainment online currency Social Networking Benefits DDoS Computer Accessories Transportation Computer Care Mouse Battery Compliance Robot Automobile End of Support Two-factor Authentication Managing Stress Efficency IT Support Excel Windows 10 Internet Exlporer Internet of Things Network Congestion Identity Theft Travel Solid State Drive Display Flexibility Sports Update Help Desk Customer Service Biometrics Augmented Reality Retail Data Storage Paperless Office Virtual Reality Dark Web How To Chromecast Microsoft Excel Computing Screen Mirroring Upgrades IT consulting Human Resources Running Cable Training Administrator File Sharing Cast Consultant Colocation The Blindside Of Reliable Computing Windows 10s Nanotechnology Company Culture Black Market Access systems Touchscreen Bloatware IT Security Tablets Hard Disk Drive Twitter Root Cause Analysis Cleaning Hard Drive hack HBO Surge Protector Experience Branding Keyboard Avoid Downtime NFL best practices Television 3D Printing Uograde CrashOverride Distributed Denial of Service Images Cortana IT Management Music Hiring/Firing WIndows 7 Word data breach Settings eWaste Storage Inbound Marketing Data storage Legislation Regulations ISP WIndows Server 2008 Books Smart Technology Video Games Windows Ink risk management Document Management Value Cameras Advertising Programming Patch Management Blogging Data Breach Wiring User Legal Google Maps Information Commerce Mobile Device Science Touchpad Presentation Regulation Website Virtual Desktop Managed Security Debate Bluetooth Scam Best Available Software as a Service IT Technicians OneDrive Sync iOS SharePoint Employer Employee Relationship Data Loss Amazon Managed IT Service Co-managed IT Worker Commute Operating Sysytem PDF Adobe Managed IT Services Computer Fan Teamwork Scalability Files Google Docs Nokia Lifestyle Busines Continuity Near Field Communication Text Messaging Licensing Ebay Networking Safety Credit Cards Reputation Mobile IT solutions FAQ Professional Services Tutorial Shadow IT Relocation Youtube Microblogging Sales Gift Giving Managed Service Provder IT service Webinar Comparison Domains Specifications Conferencing Taxes Gifts Supercomputer Buisness Electronic Medical Records Redundancy IT Budget Webinar