MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

In a recent security report released by security company phishd by MMR InfoSecurity, the company simulated attack campaigns targeting almost a million users. ITProPortal reports that “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

These findings translate roughly to more than 10 percent of targeted users falling victim to the first two stages of the simulated attack and disclosing their user credentials. When you compare this rate to a traditional hacking method like spam email where the success rate is a fraction of a percentage point, you can see why hackers and scammers are turning to social media in droves.

Diving deeper into this study gives business owners even more reason to worry. James Moore, Managing Director of phishd by MWR InfoSecurity, observes, “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This means that a significant number of users have connected their social media activity to their work email accounts, a bad move that increases the risk of a company experiencing a data breach.

This study highlights the importance of businesses safeguarding their data by including strategies to protect them from phishing scams. Ultimately, this requires a multi-prong approach. In addition to implementing standard security tools like antivirus, spam blocking, and content filtering (which you can use to block social media websites on your network), you’ll want to include training so users will know how to spot a phishing scam, be it found on social media or elsewhere. Otherwise, hackers will utilize a lure so convincing that a user will bypass all of the security measures you’ve put in place--all so they can take advantage of a bogus deal, connect with a fake Facebook friend, respond to a fake job offer, etc.

Today’s businesses must protect their data from threats on every side: social media, email, mobile devices, malicious websites, and more. Is your business prepared to deal with the complex world of network security? If not, then scammers will take advantage of your blind spots and lure your network users into their traps. To make sure that your business is protected from the worst of the web, call MERIT Solutions at (757) 420-5150.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 25 June 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Business Computing Hackers Best Practices Malware Hosted Solutions Backup Internet Software Computer Network Security google Productivity Business Microsoft Windows 10 Innovation Business Continuity Managed IT Services Disaster Recovery VoIP IT Services Business Management Hardware Mobility IT Support Mobile Devices Ransomware Efficiency Save Money Productivity Saving Money communications Telephone Systems Outsourced IT Apps User Tips Smartphone Operating System Windows Quick Tips Server BDR Small Business Law Enforcement Information Technology Email Recovery Cybercrime Mobile Device Management Passwords Virtualization Data Health Miscellaneous Cybersecurity Password Money upgrade Social Budget Communication Hosted Solution VPN Facebook Managed IT Android Hacking Wireless Avoiding Downtime browser Alert Gadgets Workplace Tips Managed Service Provider Computers Office tips Private Cloud Social Media Work/Life Balance Chrome Firewall Smartphones Application search App Data Management Current Events Office 365 Government Cloud Computing BYOD Automation USB Telephony Save Time Update Mobile Computing Transportation Risk Management Robot DDoS Applications Holiday Identity Theft History End of Support Remote Computing Samsung Television Flexibility Social Engineering Audit Best Practice Streaming Media Internet of Things The Internet of Things Humor Disaster Wi-Fi WiFi Going Green Employer-Employee Relationship Antivirus Bandwidth Battery HaaS Saving Time Office Personal Information Computer Care Cleaning Hacker Solid State Drive Microsoft Office Internet Exlporer Automobile Unsupported Software Wireless Technology Users Google Drive Gmail Video Games OneNote Mobile Device Phone System Marketing Shortcut Virtual Reality calculator Text Messaging Windows 10 IT solutions Twitter Music Legal control Meetings Cost Management Hiring/Firing Encryption Vulnerability Vendor Management WSJ Analytics Exchange SaaS Benefits Distributed Denial of Service Instant Messaging altivista Artificial Intelligence iOS Laptop Uninterrupted Power Supply Worker Commute Proactive IT Big Data SBS Unified Threat Management Managing Stress compaq Computer Fan Touchpad Training Apple Books Wearable Technology Scalability Reputation Upgrades Advertising Compliance Education hp Router Dark Web Company Culture How To domain Consultant Data storage Smart Technology Data Backup Value Chromecast Content Filtering remote Administration Two-factor Authentication eWaste Yahoo Nanotechnology Network Sports Entertainment Electronic Medical Records Running Cable Server 2008 Colocation Touchscreen Hard Drives Webinar Tech Support Point of Sale Ali Rowghani Root Cause Analysis Trending Files HIPAA Administrator User Error Lithium-ion battery Black Market Phishing IT solutions Scam Avoid Downtime Augmented Reality Politics Access Shadow IT server installation dvd "cannot install required files" Relocation Data Breach Windows 10s Employer Employee Relationship Document Management stock Spam Experience Keyboard iPhone Emails PDF Hard Disk Drive Computer Accessories tweet

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.