MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

In a recent security report released by security company phishd by MMR InfoSecurity, the company simulated attack campaigns targeting almost a million users. ITProPortal reports that “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

These findings translate roughly to more than 10 percent of targeted users falling victim to the first two stages of the simulated attack and disclosing their user credentials. When you compare this rate to a traditional hacking method like spam email where the success rate is a fraction of a percentage point, you can see why hackers and scammers are turning to social media in droves.

Diving deeper into this study gives business owners even more reason to worry. James Moore, Managing Director of phishd by MWR InfoSecurity, observes, “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This means that a significant number of users have connected their social media activity to their work email accounts, a bad move that increases the risk of a company experiencing a data breach.

This study highlights the importance of businesses safeguarding their data by including strategies to protect them from phishing scams. Ultimately, this requires a multi-prong approach. In addition to implementing standard security tools like antivirus, spam blocking, and content filtering (which you can use to block social media websites on your network), you’ll want to include training so users will know how to spot a phishing scam, be it found on social media or elsewhere. Otherwise, hackers will utilize a lure so convincing that a user will bypass all of the security measures you’ve put in place--all so they can take advantage of a bogus deal, connect with a fake Facebook friend, respond to a fake job offer, etc.

Today’s businesses must protect their data from threats on every side: social media, email, mobile devices, malicious websites, and more. Is your business prepared to deal with the complex world of network security? If not, then scammers will take advantage of your blind spots and lure your network users into their traps. To make sure that your business is protected from the worst of the web, call MERIT Solutions at (757) 420-5150. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 16 January 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Business Computing Hackers Network Security Malware Software Hosted Solutions Backup google Internet Productivity Microsoft Managed IT Services Computer Disaster Recovery IT Support Business Continuity Business User Tips Windows 10 Mobile Devices VoIP Outsourced IT Business Management Email Hardware communications IT Services Innovation Productivity Mobility Windows Managed IT Data Backup Cybersecurity Efficiency Smartphone Cybercrime Server Ransomware Mobile Device Management Small Business Apps Data Recovery Saving Money Telephone Systems Save Money Hosted Solution Quick Tips Android Operating System Virtualization browser Law Enforcement Holiday Recovery Chrome Microsoft Office Office 365 BYOD Data BDR VPN Money Passwords Information Technology Password Work/Life Balance Budget Smartphones Data Management Social upgrade App Google Drive Hacking Communication Avoiding Downtime Alert Wireless Health Miscellaneous Phishing Facebook Managed Service Provider Computers Government Unsupported Software Cloud Computing Social Media Gadgets Shortcut Data Security Wi-Fi Firewall Application Collaboration Current Events IT Support Audit Wireless Technology search Personal Information Automation Windows 10 Politics Two-factor Authentication Telephony Vulnerability User Error USB Save Time Office tips Applications Private Cloud Managed IT Services Risk Management History Identity Theft Proactive IT Best Practice The Internet of Things Workplace Tips Humor Disaster DDoS Marketing Cost Management Employer-Employee Relationship Google Docs Television Social Engineering SaaS Network Sports Samsung Apple Antivirus Data Protection Streaming Media Content Filtering Battery WiFi HaaS Hacker Redundancy Internet Exlporer Solid State Drive Commerce Going Green Compliance Bandwidth Automobile Cortana iPhone Mobile Computing Transportation Saving Time Spam Cleaning Office Robot Excel Computer Care Phone System Data Storage Remote Computing Gmail End of Support OneNote Users Encryption Data Breach Update Internet of Things Artificial Intelligence IT solutions Flexibility Data Loss Settings Managing Stress WSJ Retail Data storage Licensing WannaCry Books Exchange Scalability Updates Education Distributed Denial of Service Hiring/Firing altivista Vendor Management Webinar Router Administration Conferencing Chromecast HBO Mobile SBS How To Microsoft Word Microsoft Excel Benefits compaq IT solutions Colocation Gifts Professional Services Unified Threat Management Tech Support Wearable Technology Hard Drives File Sharing Files hp Training Lithium-ion battery Windows 10s Entertainment Administrator IT Management Travel Upgrades Nanotechnology Electronic Medical Records domain Point of Sale Storage Company Culture Hard Disk Drive HIPAA Relocation Credit Cards Access WIndows Server 2008 Tablets Consultant Root Cause Analysis remote Black Market eWaste Smart Technology Yahoo Patch Management Value Avoid Downtime FAQ PDF NFL Augmented Reality Running Cable Server 2008 Shadow IT Touchscreen Ali Rowghani Document Management Lifestyle Business Intelligence Outlook Trending Experience Charger Text Messaging Word Legislation Managed IT Service iOS Video Games Wireless Charging Windows Ink server installation dvd "cannot install required files" Virtual Reality stock Maintenance Comparison Scam Regulation Computer Fan Music Legal Evernote Laptop Google Maps Uninterrupted Power Supply tweet Specifications Screen Mirroring Employer Employee Relationship Sync Dark Web Analytics Networking Touchpad Software as a Service Meetings Keyboard calculator Instant Messaging Emails Twitter Worker Commute Reputation Sales Cast Computer Accessories Adobe Mobile Device Big Data control Advertising Workers Cache Monitors Remote Monitoring Safety Emergency CrashOverride Worker Thank You Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...