4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

In a recent security report released by security company phishd by MMR InfoSecurity, the company simulated attack campaigns targeting almost a million users. ITProPortal reports that “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

These findings translate roughly to more than 10 percent of targeted users falling victim to the first two stages of the simulated attack and disclosing their user credentials. When you compare this rate to a traditional hacking method like spam email where the success rate is a fraction of a percentage point, you can see why hackers and scammers are turning to social media in droves.

Diving deeper into this study gives business owners even more reason to worry. James Moore, Managing Director of phishd by MWR InfoSecurity, observes, “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This means that a significant number of users have connected their social media activity to their work email accounts, a bad move that increases the risk of a company experiencing a data breach.

This study highlights the importance of businesses safeguarding their data by including strategies to protect them from phishing scams. Ultimately, this requires a multi-prong approach. In addition to implementing standard security tools like antivirus, spam blocking, and content filtering (which you can use to block social media websites on your network), you’ll want to include training so users will know how to spot a phishing scam, be it found on social media or elsewhere. Otherwise, hackers will utilize a lure so convincing that a user will bypass all of the security measures you’ve put in place--all so they can take advantage of a bogus deal, connect with a fake Facebook friend, respond to a fake job offer, etc.

Today’s businesses must protect their data from threats on every side: social media, email, mobile devices, malicious websites, and more. Is your business prepared to deal with the complex world of network security? If not, then scammers will take advantage of your blind spots and lure your network users into their traps. To make sure that your business is protected from the worst of the web, call 4IT at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 24 May 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet Business Computing software Productivity Hackers Backup Business Management Hosted Solutions Managed Service Provider Business Malware IT Services Google Innovation Efficiency Windows IT Support Hardware Workplace Tips Saving Money Miscellaneous VoIP Computer Disaster Recovery Upgrade Windows 10 Business Continuity Virtualization Mobile Devices Data User Tips Server Mobile Computing Mobile Device Management Communication Save Money Network Security Quick Tips Network Alert Going Green Mobile Office Information Technology Email Smartphones Smartphone BYOD Health Apps Small Business communications Microsoft Office Office Social Media Operating System Gadgets Disaster Tablet Firewall Browser Application Managed IT Services Ransomware Passwords Mobility Search Holiday Avoiding Downtime Android WiFi Remote Computing Unified Threat Management Saving Time Automation BDR Vendor Management Hacking Best Practice Data Management Risk Management Chrome The Internet of Things History Remote Monitoring Outsourced IT Telephone Systems Employer-Employee Relationship IT Solutions Hard Drives Marketing Office Tips VPN Wireless Technology Customer Relationship Management Cybercrime Facebook Productivity Big Data Budget Spam Recovery Apple Gmail Law Enforcement Router Bring Your Own Device User Error Lithium-ion battery Collaboration Antivirus Humor Administration Social Money Current Events Password Wearable Technology iPhone Maintenance PowerPoint Computers Printer Telephony Managed IT USB Content Filtering Analytics Phone System Work/Life Balance Proactive IT Government Cost Management Intranet HaaS Bandwidth Point of Sale Printer Server IT COnsultant Laptop Computer Repair Wireless Phishing Trending Education Net Neutrality Social Engineering Hosted Solution Save Time Virus Tech Support Users Private Cloud Windows 8 Encryption Cybersecurity Mouse Streaming Media Samsung Uninterrupted Power Supply App online currency Two-factor Authentication Managing Stress Office 365 SaaS Network Congestion Help Desk hacker Personal Information Transportation Business Intelligence Efficency Shortcut Battery Robot OneNote Update Customer Service Biometrics Unsupported Software Automobile Retail Virtual Reality End of Support Cloud Computing Google Drive Display Internet Exlporer Social Networking Instant Messaging Emails Internet of Things Identity Theft HIPAA Paperless Office Entertainment Solid State Drive Flexibility Benefits DDoS Computer Accessories Outlook Fax Server Workplace Distributed Denial of Service Compliance Text Messaging best practices Safety WIndows 7 Wiring How To Chromecast eWaste Information Upgrades Wi-Fi Inbound Marketing Regulations Artificial Intelligence data breach Twitter Emergency Debate Training Administrator Surge Protector Consultant Excel Applications Value Colocation Cameras risk management Television The Blindside Of Company Culture User Black Market 3D Printing Audit Access Touchscreen Science Politics Presentation Virtual Desktop IT Security Bluetooth Cleaning Best Available IT Technicians Nokia Experience ISP Travel Avoid Downtime Keyboard SharePoint Computer Care Blogging Music Programming Hiring/Firing Teamwork Data storage Website Books Busines Continuity Near Field Communication Video Games Networking Smart Technology Meetings Document Management Data Breach OneDrive Advertising IT consulting Legal Amazon Human Resources Running Cable Mobile Device Hard Drive Touchpad Co-managed IT Augmented Reality Managed Security Reliable Computing Scam Uograde Images Ebay Windows 10s Bloatware Data Protection Employer Employee Relationship Computing Sports Worker Commute Operating Sysytem PDF Hard Disk Drive Scalability Files Branding IT Budget Tutorial Storage Reputation IT service Domains Windows 10 Shadow IT Gift Giving Relocation Vulnerability iOS Buisness Managed IT Services Webinar IT solutions Youtube Microblogging Lifestyle Taxes Sales Supercomputer Electronic Medical Records Managed Service Provder Webinar