Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Ordinary fishing, where you hope for a simple-minded fish to latch onto your hook, relies on using a proper lure. The same can be said for the virtual method of phishing, where a hacker will use a similar type of “lure” to convince the target to bite. These phishing scams are especially useful for hackers who want to take advantage of social media to find new targets. A recent study has shown that this is a surprisingly effective method of phishing.

A report from phishd by MWR InfoSecurity orchestrated a simulated phishing attack that attempted to target a million users. ITProPortal told of their findings: “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

This means that about 10 percent of users fell victim to the first two stages of the simulation and gave up their account credentials. Now, compare this rate to how often a normal scam, like spam, accomplishes its goal. While the typical spam message will only have a fraction of a percentage point rate of success, social media provides a substantially larger chance of success to hackers.

James Moore, the Managing Director of phishd by MWR InfoSecurity, states: “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This is especially a problem, as there are so many people who connect their social media accounts to their work accounts--risky business for any organization that wants to avoid a critical data breach.

If anything, this study shows why your business needs to keep data safe. This includes being capable of identifying phishing scams and responding to them properly, but also the implementation of security tools like antivirus, spam blocking, and content filtering. If you’re very concerned about social media phishing, you can go so far as to block social media websites completely on your network. Additional measures such as comprehensive training can help your users identify phishing attacks both in and out of the office, on a variety of platforms. Often times, the lures used by hackers can be so tantalizing that they’re able to bypass your security, so the only thing standing between you and a data breach is the knowledge you’ve imparted to your users.

You can’t trust anyone on the Internet, be it a new friend on social media, a new entry into your address book, or a seemingly-legitimate website. You have to be ready for anything, but this can be a daunting task. Thankfully, you don’t have to endure it alone. With Total Tech Care by your side, you’ll be prepared to handle any cyber threat. To learn more about what we can offer your business, reach out to us at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware VoIP Disaster Recovery Android communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Upgrade Windows Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Cloud Computing Office Server Save Money Windows 10 Passwords Chrome Virtualization Social Media Gadgets Saving Money Holiday Tech Term Automation Managed IT Services Managed Service Microsoft Office Computers Facebook Cybercrime Artificial Intelligence Operating System Internet of Things BYOD Mobile Device Management Health Wi-Fi Networking IT Support Hacking Office 365 Telephone Systems Information Information Technology Remote Alert Covid-19 Managed Service Provider Spam Router BDR Recovery Employer-Employee Relationship Bandwidth Social Engineering Mobility Applications App History Mobile Computing Law Enforcement Application Human Resources Data Breach Password Money Big Data Remote Monitoring Encryption How To Blockchain Paperless Office Office Tips Government Training Data Storage VPN Private Cloud Patch Management Managed IT Remote Computing Apps Mobile Office Google Drive Flexibility Marketing Wireless WiFi Avoiding Downtime IT solutions Entertainment Gmail Website Budget Vulnerability Infrastructure Settings Windows 7 Voice over Internet Protocol Word Two-factor Authentication Bring Your Own Device Data Management Work/Life Balance Servers Mouse HaaS Data Security Safety HIPAA Sports Redundancy Risk Management Keyboard Hacker Telephone System Staff Software as a Service The Internet of Things Machine Learning Lithium-ion battery Remote Work Connectivity Conferencing USB Save Time Scam Firewall Vendor Virtual Reality Apple Managed Services Cleaning Vendor Management Display Social Data Protection User Error End of Support Employee/Employer Relationship Education Physical Security Meetings RMM Samsung Computing Retail Hard Drives Instant Messaging Business Technology Virus Content Management Robot PDF Excel Access Control Unified Threat Management Value Biometrics Virtual Assistant Computer Accessories Virtual Desktop Spam Blocking Authentication Proactive IT Electronic Medical Records Digital Signage Best Practice DDoS YouTube Hiring/Firing Black Market SharePoint Printer Update Bluetooth Procurement Net Neutrality Workplace Strategy Document Management Google Docs Identity Theft Help Desk Customer Service Solid State Drive Wireless Technology Business Intelligence Environment Downtime Printing How to Worker IT Consultant Fax Server Audit IT Management Data storage Automobile Augmented Reality Managed Services Provider Fraud SaaS Botnet Humor IT Plan Database Remote Worker Computing Infrastructure Remote Workers Going Green Unsupported Software Cryptocurrency Network Congestion eWaste Processor Charger Battery Shadow IT Compliance Hard Drive Comparison Computer Care Legal OneNote Current Events CES Wearable Technology Telephony Internet Exlporer Evernote Smartwatch Root Cause Analysis Ergonomics Wire HBO Knowledge Development Notifications Music OLED Travel Running Cable User Skype Printers PowerPoint PCI DSS Windows Media Player Virtual Machine Millennials Smart Office Fiber Optics Wireless Charging Employee Data loss 2FA Memory Outlook Relocation Leadership Messaging Troubleshooting Cabling Workforce Managing Stress Start Menu Virtual Private Network Policy Hypervisor Loyalty Trend Micro Cables Video Games Screen Mirroring Dark mode Worker Commute Frequently Asked Questions Cameras SMS Books Default App Telecommuting Experience Mobile Project Management Windows 10s Procedure Science Nanotechnology Saving Time Shopping Cortana Google Search Scalability Cast dark theme Business Owner Tip of the week webinar AI Digital Signature Emergency IT Infrastructure Bing Distributed Denial of Service Professional Services Customer Relationship Management Warranty Public Cloud FinTech NarrowBand Employer Employee Relationship Analyitcs HVAC Assessment Social Network Google Apps Search Windows Server 2008 Programming iPhone Printer Server Analysis Investment Tools Administrator Employees Devices Employee/Employer Relationships Windows 365 Enterprise Content Management Television ISP Antivirus MSP Files Video Conferencing Accountants ROI Bitcoin Credit Cards Shortcuts Microchip Sales Windows 8 Thought Leadership Chromecast Point of Sale Password Management Public Computer Personal Password Manager Cryptomining IT service Regulations Colocation Supply Chain Management Uninterrupted Power Supply Transportation Multi-Factor Security Rootkit Batteries Search Engine Computer Fan Monitoring Tablet Twitter Windows 8.1 NIST Monitor Digitize Business Mangement Domains Workers Smart Tech Benefits Windows Server 2008 R2 Trending Amazon IaaS Maintenance FENG Customer relationships Addiction Consultant Email Best Practices Bloatware Reputation IBM IT Assessment Recycling Streaming Media Manufacturing Content Flash Wiring Analytics Practices Tech Support Smart Technology Laptop Managed IT Service Amazon Web Services Security Cameras Techology Computer Tips Tablets Cache Best Available Software Tips Virtual CIO Entrepreneur Safe Mode Customers Supercomputer OneDrive Criminal Biometric Security Audiobook WIndows 7 Sync GDPR Emails Peripheral Hosted Computing Touchpad Using Data Online Shopping Shortcut Digital Security Cameras Wireless Internet Cost Management File Sharing Copiers 5G Politics Social Networking Camera Advertising Netflix Quick Tip Inventory Two Factor Authentication Specifications

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code