MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

In a recent security report released by security company phishd by MMR InfoSecurity, the company simulated attack campaigns targeting almost a million users. ITProPortal reports that “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

These findings translate roughly to more than 10 percent of targeted users falling victim to the first two stages of the simulated attack and disclosing their user credentials. When you compare this rate to a traditional hacking method like spam email where the success rate is a fraction of a percentage point, you can see why hackers and scammers are turning to social media in droves.

Diving deeper into this study gives business owners even more reason to worry. James Moore, Managing Director of phishd by MWR InfoSecurity, observes, “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This means that a significant number of users have connected their social media activity to their work email accounts, a bad move that increases the risk of a company experiencing a data breach.

This study highlights the importance of businesses safeguarding their data by including strategies to protect them from phishing scams. Ultimately, this requires a multi-prong approach. In addition to implementing standard security tools like antivirus, spam blocking, and content filtering (which you can use to block social media websites on your network), you’ll want to include training so users will know how to spot a phishing scam, be it found on social media or elsewhere. Otherwise, hackers will utilize a lure so convincing that a user will bypass all of the security measures you’ve put in place--all so they can take advantage of a bogus deal, connect with a fake Facebook friend, respond to a fake job offer, etc.

Today’s businesses must protect their data from threats on every side: social media, email, mobile devices, malicious websites, and more. Is your business prepared to deal with the complex world of network security? If not, then scammers will take advantage of your blind spots and lure your network users into their traps. To make sure that your business is protected from the worst of the web, call MERIT Solutions at (757) 420-5150.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 21 August 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Business Computing Best Practices Hackers Malware Hosted Solutions Backup Internet Software Network Security Productivity Computer google Microsoft Business Disaster Recovery Windows 10 Innovation Business Continuity Managed IT Services IT Services VoIP IT Support Hardware Business Management Outsourced IT User Tips communications Efficiency Windows Email Mobility Mobile Devices Telephone Systems Save Money Managed IT Saving Money Server Productivity Ransomware Apps Quick Tips Smartphone Virtualization Operating System Hosted Solution Mobile Device Management Information Technology Password Small Business Recovery Android Data Cybercrime BDR Passwords browser Law Enforcement Wireless Budget Cybersecurity upgrade Social Communication Hacking Avoiding Downtime BYOD Health Miscellaneous VPN Facebook Computers Money Unsupported Software Social Media Cloud Computing USB Gadgets Workplace Tips Save Time Smartphones Risk Management Data Management Chrome Microsoft Office Work/Life Balance search App Google Drive Firewall Automation Application Telephony Alert Current Events Managed Service Provider Office 365 Government Private Cloud Office tips Best Practice Update Internet of Things IT solutions The Internet of Things DDoS Humor Phone System Disaster Holiday Shortcut Employer-Employee Relationship Cost Management Television Social Engineering Identity Theft Data Backup Network Streaming Media Samsung Flexibility Hacker Audit WiFi Internet Exlporer Solid State Drive Going Green Wireless Technology Data Storage Compliance Bandwidth Wi-Fi Antivirus Spam Mobile Computing Transportation Battery HaaS Saving Time Office Robot Applications Personal Information Computer Care Phishing History Cleaning Gmail End of Support Remote Computing Automobile Users Proactive IT Data Protection Employer Employee Relationship Document Management Touchpad Experience calculator iOS Data Breach IT Support Reputation Keyboard Twitter control IT Management Advertising Computer Accessories Computer Fan Video Games Mobile Device Emails Commerce WSJ Virtual Reality Exchange WIndows Server 2008 Data storage Dark Web Distributed Denial of Service Music altivista Legal Data Recovery Administration Hiring/Firing Chromecast Encryption SBS Patch Management Vendor Management SaaS Analytics compaq Sports Business Intelligence Colocation Benefits Apple Instant Messaging Worker Commute Tech Support Outlook Hard Drives Marketing Wearable Technology Unified Threat Management Nanotechnology Big Data hp Files Managed IT Service Administrator Managing Stress Lithium-ion battery domain Excel Training Webinar Upgrades Root Cause Analysis Books Scalability Relocation Access Education remote Router Regulation Company Culture IT solutions Consultant Augmented Reality eWaste Yahoo How To Screen Mirroring iPhone Smart Technology Running Cable Server 2008 Sync PDF Value Windows 10s Two-factor Authentication Content Filtering Ali Rowghani Cast Trending User Error Entertainment Text Messaging Hard Disk Drive Touchscreen OneNote Electronic Medical Records Data Security Point of Sale HIPAA server installation dvd "cannot install required files" Windows 10 Meetings stock Black Market HBO Scam Laptop Politics Uninterrupted Power Supply Avoid Downtime Artificial Intelligence Vulnerability Managed IT Services Settings tweet Shadow IT

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.