MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

In a recent security report released by security company phishd by MMR InfoSecurity, the company simulated attack campaigns targeting almost a million users. ITProPortal reports that “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

These findings translate roughly to more than 10 percent of targeted users falling victim to the first two stages of the simulated attack and disclosing their user credentials. When you compare this rate to a traditional hacking method like spam email where the success rate is a fraction of a percentage point, you can see why hackers and scammers are turning to social media in droves.

Diving deeper into this study gives business owners even more reason to worry. James Moore, Managing Director of phishd by MWR InfoSecurity, observes, “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This means that a significant number of users have connected their social media activity to their work email accounts, a bad move that increases the risk of a company experiencing a data breach.

This study highlights the importance of businesses safeguarding their data by including strategies to protect them from phishing scams. Ultimately, this requires a multi-prong approach. In addition to implementing standard security tools like antivirus, spam blocking, and content filtering (which you can use to block social media websites on your network), you’ll want to include training so users will know how to spot a phishing scam, be it found on social media or elsewhere. Otherwise, hackers will utilize a lure so convincing that a user will bypass all of the security measures you’ve put in place--all so they can take advantage of a bogus deal, connect with a fake Facebook friend, respond to a fake job offer, etc.

Today’s businesses must protect their data from threats on every side: social media, email, mobile devices, malicious websites, and more. Is your business prepared to deal with the complex world of network security? If not, then scammers will take advantage of your blind spots and lure your network users into their traps. To make sure that your business is protected from the worst of the web, call MERIT Solutions at (757) 420-5150. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 23 October 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Business Computing Privacy Best Practices Hackers Malware Software Network Security Hosted Solutions Backup Internet google Computer Disaster Recovery Microsoft Productivity Business Continuity Managed IT Services Business Windows 10 IT Support VoIP Innovation IT Services Outsourced IT User Tips Hardware Mobile Devices communications Business Management Email Windows Mobility Mobile Device Management Ransomware Productivity Efficiency Smartphone Managed IT Cybercrime Saving Money Server Telephone Systems Save Money Cybersecurity Hosted Solution Quick Tips Operating System Android Virtualization Law Enforcement Apps Recovery Chrome Microsoft Office Data Backup BYOD VPN Data BDR Passwords Money browser Password Information Technology Small Business Data Management Social upgrade Communication Hacking Avoiding Downtime Office 365 Facebook Health Miscellaneous Managed Service Provider Computers Wireless Data Recovery Unsupported Software Budget Smartphones Cloud Computing Shortcut Work/Life Balance search App Wi-Fi Firewall Application Current Events Google Drive Audit Data Security Automation Telephony Government Alert Office tips Applications Private Cloud USB Gadgets Workplace Tips Proactive IT Save Time Social Media Risk Management Spam Apple Phishing Streaming Media Employer-Employee Relationship Flexibility WiFi Data Storage Managed IT Services Network Cost Management Going Green Bandwidth Hacker Solid State Drive Internet Exlporer Wireless Technology Samsung Antivirus Battery iPhone User Error HaaS Compliance Mobile Computing Transportation Personal Information Automobile Gmail Robot Politics IT Support Update History End of Support Saving Time Remote Computing IT solutions Cleaning Office Computer Care DDoS Phone System Best Practice Internet of Things Holiday Windows 10 The Internet of Things Disaster Encryption Television Humor Users Social Engineering Identity Theft Data storage Word Analytics compaq Managed IT Service Instant Messaging Keyboard Administration Computer Accessories Wearable Technology Chromecast Excel Worker Commute iOS Artificial Intelligence Mobile Device Windows Ink Big Data hp Sports Managing Stress Colocation Regulation domain Computer Fan Hard Drives Google Maps Books Tech Support OneNote Scalability Files Screen Mirroring Education Data Breach Hiring/Firing Vendor Management Administrator Sync remote Lithium-ion battery Dark Web Router SaaS eWaste Yahoo Meetings How To Benefits Cast Emails Relocation Running Cable Access Adobe Server 2008 Unified Threat Management Data Loss Content Filtering Ali Rowghani Settings Marketing Trending Training Licensing Entertainment PDF Upgrades Google Docs Electronic Medical Records HBO Point of Sale Webinar Company Culture Mobile HIPAA server installation dvd "cannot install required files" Black Market Text Messaging Consultant stock Smart Technology Data Protection IT solutions Value Professional Services Collaboration Avoid Downtime Shadow IT Two-factor Authentication tweet IT Management Document Management Windows 10s Travel Experience calculator Nanotechnology Commerce Laptop Twitter Uninterrupted Power Supply WIndows Server 2008 control Hard Disk Drive Tablets Root Cause Analysis Video Games Virtual Reality Touchpad WSJ Reputation Scam Patch Management Exchange Advertising Distributed Denial of Service NFL Music altivista Augmented Reality Legal Business Intelligence Touchscreen Employer Employee Relationship Outlook SBS Vulnerability CrashOverride Software as a Service WannaCry Cache Monitors Remote Monitoring Thank You Microsoft Excel Safety Congratulations File Sharing Emergency Storage Worker

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...