4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

In a recent security report released by security company phishd by MMR InfoSecurity, the company simulated attack campaigns targeting almost a million users. ITProPortal reports that “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

These findings translate roughly to more than 10 percent of targeted users falling victim to the first two stages of the simulated attack and disclosing their user credentials. When you compare this rate to a traditional hacking method like spam email where the success rate is a fraction of a percentage point, you can see why hackers and scammers are turning to social media in droves.

Diving deeper into this study gives business owners even more reason to worry. James Moore, Managing Director of phishd by MWR InfoSecurity, observes, “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This means that a significant number of users have connected their social media activity to their work email accounts, a bad move that increases the risk of a company experiencing a data breach.

This study highlights the importance of businesses safeguarding their data by including strategies to protect them from phishing scams. Ultimately, this requires a multi-prong approach. In addition to implementing standard security tools like antivirus, spam blocking, and content filtering (which you can use to block social media websites on your network), you’ll want to include training so users will know how to spot a phishing scam, be it found on social media or elsewhere. Otherwise, hackers will utilize a lure so convincing that a user will bypass all of the security measures you’ve put in place--all so they can take advantage of a bogus deal, connect with a fake Facebook friend, respond to a fake job offer, etc.

Today’s businesses must protect their data from threats on every side: social media, email, mobile devices, malicious websites, and more. Is your business prepared to deal with the complex world of network security? If not, then scammers will take advantage of your blind spots and lure your network users into their traps. To make sure that your business is protected from the worst of the web, call 4IT at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 20 October 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Business Computing Internet software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows Innovation Disaster Recovery IT Support Hardware Workplace Tips Business Continuity VoIP Saving Money Computer Windows 10 Miscellaneous Virtualization User Tips Upgrade Mobile Devices Mobile Device Management Data Network Security Server Mobile Computing Email Save Money Microsoft Office Alert Communication Network Quick Tips communications Information Technology Smartphone Social Media Smartphones BYOD Going Green Mobile Office Android Apps Small Business Health Office Operating System Gadgets Chrome Application Ransomware Browser Outsourced IT Firewall Avoiding Downtime Disaster Productivity Tablet Managed IT Services WiFi Holiday Cybersecurity The Internet of Things Mobility Remote Computing Unified Threat Management Passwords IT Solutions Data Management Spam BDR Cybercrime Risk Management Telephone Systems Search Managed IT Automation VPN Apple Facebook Hacking Best Practice Vendor Management Hard Drives Saving Time Employer-Employee Relationship Budget History Remote Monitoring Phone System Recovery Wireless Technology Law Enforcement Office Tips Big Data Marketing Phishing Password Proactive IT Hosted Solution Computers User Error iPhone Collaboration Customer Relationship Management PowerPoint Virus Current Events Office 365 Data Recovery Printer Antivirus Bring Your Own Device USB Shortcut Content Filtering Social Analytics Encryption Money Gmail Router Data Backup Humor Administration Telephony Wearable Technology Lithium-ion battery Maintenance Laptop OneNote Work/Life Balance Users Trending Education Net Neutrality Windows 8 Audit HaaS Tech Support Business Intelligence Outlook Point of Sale Wireless IT COnsultant Unsupported Software Social Engineering Government App Computer Repair Cloud Computing Google Drive Cost Management Intranet Data Security Save Time Bandwidth Private Cloud Printer Server Flexibility Social Networking Efficency Mouse Compliance Samsung Two-factor Authentication IT Support Managing Stress Wi-Fi SaaS Excel Windows 10 Emergency Display Applications Vulnerability Augmented Reality hacker Politics Personal Information Paperless Office Travel Transportation Network Congestion Update Fax Server Customer Service Data Storage Biometrics Computer Care Battery Robot Workplace Help Desk Retail Virtual Reality Automobile Streaming Media End of Support Meetings Uninterrupted Power Supply online currency Emails Internet Exlporer Instant Messaging HIPAA Entertainment Internet of Things Benefits Identity Theft Solid State Drive DDoS Computer Accessories Data Protection Employer Employee Relationship ISP Sports CrashOverride Branding IT Management Hard Drive Worker Commute Operating Sysytem PDF Distributed Denial of Service Word data breach Scalability Programming Files Blogging Settings WIndows Server 2008 Uograde WIndows 7 Images Text Messaging eWaste Windows Ink risk management Inbound Marketing Safety Regulations How To Chromecast Website Patch Management Upgrades Artificial Intelligence Google Maps Value Commerce Cameras Training OneDrive Administrator Amazon Regulation User Consultant Colocation The Blindside Of Co-managed IT Science Presentation Company Culture Wiring Black Market Access Virtual Desktop Bluetooth Sync Information Best Available Touchscreen IT Security IT Technicians Data Loss iOS Managed IT Service Debate Cleaning Ebay Computing SharePoint Adobe Managed IT Services Experience Keyboard Avoid Downtime Computer Fan Teamwork Licensing Music Busines Continuity Hiring/Firing Dark Web Networking Screen Mirroring Near Field Communication Data storage Nokia Books Smart Technology Video Games Human Resources Cast Twitter IT consulting Document Management Advertising Running Cable Windows 10s Data Breach Legal Nanotechnology Surge Protector Television Reliable Computing Mobile Device Touchpad 3D Printing Tablets Hard Disk Drive Managed Security Scam Bloatware Root Cause Analysis HBO NFL best practices Gift Giving Supercomputer Electronic Medical Records Microblogging Youtube IT Budget Storage Sales IT service Reputation Managed Service Provder Webinar Domains Software as a Service Lifestyle Shadow IT Relocation Google Docs Buisness Webinar Microsoft Excel Tutorial Mobile IT solutions File Sharing Professional Services Taxes