MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

In a recent security report released by security company phishd by MMR InfoSecurity, the company simulated attack campaigns targeting almost a million users. ITProPortal reports that “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

These findings translate roughly to more than 10 percent of targeted users falling victim to the first two stages of the simulated attack and disclosing their user credentials. When you compare this rate to a traditional hacking method like spam email where the success rate is a fraction of a percentage point, you can see why hackers and scammers are turning to social media in droves.

Diving deeper into this study gives business owners even more reason to worry. James Moore, Managing Director of phishd by MWR InfoSecurity, observes, “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This means that a significant number of users have connected their social media activity to their work email accounts, a bad move that increases the risk of a company experiencing a data breach.

This study highlights the importance of businesses safeguarding their data by including strategies to protect them from phishing scams. Ultimately, this requires a multi-prong approach. In addition to implementing standard security tools like antivirus, spam blocking, and content filtering (which you can use to block social media websites on your network), you’ll want to include training so users will know how to spot a phishing scam, be it found on social media or elsewhere. Otherwise, hackers will utilize a lure so convincing that a user will bypass all of the security measures you’ve put in place--all so they can take advantage of a bogus deal, connect with a fake Facebook friend, respond to a fake job offer, etc.

Today’s businesses must protect their data from threats on every side: social media, email, mobile devices, malicious websites, and more. Is your business prepared to deal with the complex world of network security? If not, then scammers will take advantage of your blind spots and lure your network users into their traps. To make sure that your business is protected from the worst of the web, call MERIT Solutions at (757) 420-5150.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 21 May 2018

Captcha Image

Tag Cloud

Security Tip of the Week Best Practices Technology Privacy Cloud Business Computing Network Security Hackers Malware Internet Software Hosted Solutions Backup google Business Management Productivity Managed IT Services Mobile Devices Computer Disaster Recovery VoIP Microsoft IT Support communications Outsourced IT Business Continuity Business Email User Tips Windows 10 Cybersecurity Productivity Hardware IT Services Innovation Cybercrime Data Backup Efficiency Windows Managed IT Server Saving Money Ransomware Mobile Device Management Small Business Mobility Apps Smartphone Operating System Data browser Law Enforcement Internet of Things Data Recovery Tech Term Android Virtualization Telephone Systems Save Money Hosted Solution Quick Tips Phishing BDR Data Security Money Cloud Computing Passwords Smartphones Office 365 Chrome Microsoft Office Communication BYOD Automation VPN Information Technology Password Holiday Recovery Network Vulnerability Social upgrade App Two-factor Authentication Google Drive Hacking Data Breach Wireless Avoiding Downtime Alert Health Miscellaneous Risk Management Managed Service Provider Facebook Unsupported Software Government Computers Social Media Update Collaboration Best Practice IT Support Work/Life Balance Gadgets Cost Management Wi-Fi Budget Data Management Streaming Media Spam Personal Information Managed IT Services search Politics Wireless Technology Cleaning USB Save Time Telephony User Error Office tips Applications Identity Theft Private Cloud History Proactive IT Flexibility Data Protection Shortcut The Internet of Things Workplace Tips Firewall Application Employer-Employee Relationship Antivirus Windows 10 Current Events Social Engineering Audit HaaS Sports Apple Compliance Tech Support Excel Fraud WiFi Wireless Charging Hacker Solid State Drive Automobile Internet Exlporer Value Data Storage Going Green Bandwidth OneNote Saving Time eWaste iPhone Office Mobile Computing Computer Care Phone System Project Management Transportation Data Loss Marketing Legal Users Robot Encryption Google Docs End of Support Gmail Remote Computing Artificial Intelligence Big Data Redundancy IT solutions Blockchain Humor Commerce DDoS Disaster SaaS Cortana Mobile Security Samsung Content Filtering Patch Management Television Devices Battery Lifestyle Identity Training Business Intelligence Entertainment Touchscreen compaq Spyware Electronic Medical Records Charger Google Assistant Upgrades Colocation Outlook Hard Drives Word Language Wearable Technology Point of Sale Legislation Data Privacy Company Culture Managed IT Service HIPAA Files hp Safety Administrator iOS Black Market Lithium-ion battery Computer Forensics Consultant Windows Ink Smart Technology domain Avoid Downtime Comparison Hard Drive Relocation Regulation Edge Access Computer Fan Shadow IT Evernote Google Maps Virus Document Management remote Yahoo Specifications Chromebook Screen Mirroring Experience Sync Ciminal Dark Web Networking PDF Software as a Service Proactive Meetings Running Cable Server 2008 Emails Ali Rowghani Video Games Sales Smart Tech Cast Adobe Trending Virtual Reality Workers Text Messaging Websites Scam Settings Music Retail Connectivity Licensing MSP WannaCry Updates Data Theft Employer Employee Relationship server installation dvd "cannot install required files" Analytics Webinar stock Conferencing Content Filter HBO Mobile intranet Keyboard Instant Messaging Microsoft Word Microsoft Excel Computing Computer Accessories Laptop Worker Commute Uninterrupted Power Supply IT solutions tweet Gifts Monitoring Mobile Device Professional Services IT budget Managing Stress File Sharing Analysis Touchpad calculator Books Windows 10s Twitter Scalability Management Reputation IT Management Maintenance Advertising Travel Hiring/Firing Nanotechnology Education control Router Storage App store Vendor Management Hard Disk Drive WSJ How To Credit Cards Financial Technology WIndows Server 2008 Device Security Tablets Identities Benefits Data storage Root Cause Analysis Exchange Distributed Denial of Service altivista Chromecast FAQ Printing Unified Threat Management Administration NFL IoT Augmented Reality SBS CrashOverride Emergency Worker Cache Thank You Monitors Remote Monitoring Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...