MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

In a recent security report released by security company phishd by MMR InfoSecurity, the company simulated attack campaigns targeting almost a million users. ITProPortal reports that “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

These findings translate roughly to more than 10 percent of targeted users falling victim to the first two stages of the simulated attack and disclosing their user credentials. When you compare this rate to a traditional hacking method like spam email where the success rate is a fraction of a percentage point, you can see why hackers and scammers are turning to social media in droves.

Diving deeper into this study gives business owners even more reason to worry. James Moore, Managing Director of phishd by MWR InfoSecurity, observes, “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This means that a significant number of users have connected their social media activity to their work email accounts, a bad move that increases the risk of a company experiencing a data breach.

This study highlights the importance of businesses safeguarding their data by including strategies to protect them from phishing scams. Ultimately, this requires a multi-prong approach. In addition to implementing standard security tools like antivirus, spam blocking, and content filtering (which you can use to block social media websites on your network), you’ll want to include training so users will know how to spot a phishing scam, be it found on social media or elsewhere. Otherwise, hackers will utilize a lure so convincing that a user will bypass all of the security measures you’ve put in place--all so they can take advantage of a bogus deal, connect with a fake Facebook friend, respond to a fake job offer, etc.

Today’s businesses must protect their data from threats on every side: social media, email, mobile devices, malicious websites, and more. Is your business prepared to deal with the complex world of network security? If not, then scammers will take advantage of your blind spots and lure your network users into their traps. To make sure that your business is protected from the worst of the web, call MERIT Solutions at (757) 420-5150. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 March 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Business Computing Hackers Network Security Malware Software Internet Hosted Solutions Backup google Business Management Managed IT Services Productivity Disaster Recovery Computer Microsoft VoIP Outsourced IT IT Support Business Continuity communications Mobile Devices Business User Tips Windows 10 Innovation Email IT Services Productivity Hardware Cybercrime Windows Managed IT Small Business Efficiency Mobility Data Backup Mobile Device Management browser Cybersecurity Apps Server Ransomware Smartphone Telephone Systems Internet of Things Save Money Saving Money Data Recovery Hosted Solution Quick Tips Android Virtualization Law Enforcement Operating System Passwords Microsoft Office Password Phishing Holiday BYOD Data BDR Office 365 Chrome Money Data Security Information Technology VPN Recovery Cloud Computing Vulnerability Gadgets Work/Life Balance Google Drive Hacking Wi-Fi Avoiding Downtime Automation Alert Health Miscellaneous Social upgrade Managed Service Provider Computers App Communication Best Practice Social Media Wireless IT Support Facebook Budget Risk Management Government Smartphones Unsupported Software Data Management Windows 10 Update Flexibility Shortcut Spam Workplace Tips Wireless Technology Managed IT Services Firewall Application Telephony Social Engineering Antivirus Data Breach Current Events Audit Applications Private Cloud Personal Information Office tips search History Politics Two-factor Authentication Proactive IT USB Collaboration The Internet of Things Save Time User Error Identity Theft Network Sports Tech Support Artificial Intelligence IT solutions Hacker Internet Exlporer Solid State Drive Cost Management Excel DDoS Blockchain Data Storage SaaS Television iPhone OneNote Samsung Mobile Computing Content Filtering Streaming Media Battery Apple Transportation HaaS Compliance WiFi Data Loss Robot Marketing Fraud Going Green Automobile Bandwidth End of Support Google Docs Remote Computing eWaste Saving Time Data Protection Cleaning Office Redundancy Humor Computer Care Disaster Phone System Project Management Commerce Employer-Employee Relationship Legal Encryption Users Gmail Cortana FAQ Patch Management Analytics intranet Instant Messaging tweet Colocation NFL Keyboard Augmented Reality Computer Accessories Business Intelligence Worker Commute Touchscreen Hard Drives Lifestyle calculator Charger Mobile Device Outlook Files Big Data Lithium-ion battery IT budget Managing Stress Twitter Word Administrator Managed IT Service control Legislation Wireless Charging Books iOS Maintenance Scalability Education WSJ Relocation Windows Ink Access Hiring/Firing Vendor Management Router Exchange Comparison altivista Evernote Regulation Computer Fan Device Security Distributed Denial of Service How To Identities Google Maps Benefits Specifications Screen Mirroring SBS PDF compaq Networking Unified Threat Management Sync Dark Web Devices Meetings IoT Software as a Service Sales Training Cast Entertainment Emails Wearable Technology Text Messaging hp Workers Upgrades Adobe Electronic Medical Records Spyware Settings Language Point of Sale Retail Company Culture HIPAA domain Black Market Updates Consultant Licensing WannaCry Smart Technology Tech Term Conferencing Laptop Value HBO Uninterrupted Power Supply Webinar Avoid Downtime remote Shadow IT Yahoo Microsoft Word Mobile Edge Virus Document Management Microsoft Excel Gifts Touchpad Experience IT solutions Running Cable Server 2008 Ali Rowghani Reputation Professional Services Ciminal Proactive Trending Advertising File Sharing IT Management Windows 10s Video Games Virtual Reality Travel Nanotechnology Data storage Scam Websites Storage server installation dvd "cannot install required files" Credit Cards WIndows Server 2008 Music Hard Disk Drive MSP stock Administration Tablets Chromecast Root Cause Analysis Employer Employee Relationship Congratulations CrashOverride Safety Cache Emergency Monitors Remote Monitoring Worker Thank You

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...