Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Ordinary fishing, where you hope for a simple-minded fish to latch onto your hook, relies on using a proper lure. The same can be said for the virtual method of phishing, where a hacker will use a similar type of “lure” to convince the target to bite. These phishing scams are especially useful for hackers who want to take advantage of social media to find new targets. A recent study has shown that this is a surprisingly effective method of phishing.

A report from phishd by MWR InfoSecurity orchestrated a simulated phishing attack that attempted to target a million users. ITProPortal told of their findings: “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

This means that about 10 percent of users fell victim to the first two stages of the simulation and gave up their account credentials. Now, compare this rate to how often a normal scam, like spam, accomplishes its goal. While the typical spam message will only have a fraction of a percentage point rate of success, social media provides a substantially larger chance of success to hackers.

James Moore, the Managing Director of phishd by MWR InfoSecurity, states: “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This is especially a problem, as there are so many people who connect their social media accounts to their work accounts--risky business for any organization that wants to avoid a critical data breach.

If anything, this study shows why your business needs to keep data safe. This includes being capable of identifying phishing scams and responding to them properly, but also the implementation of security tools like antivirus, spam blocking, and content filtering. If you’re very concerned about social media phishing, you can go so far as to block social media websites completely on your network. Additional measures such as comprehensive training can help your users identify phishing attacks both in and out of the office, on a variety of platforms. Often times, the lures used by hackers can be so tantalizing that they’re able to bypass your security, so the only thing standing between you and a data breach is the knowledge you’ve imparted to your users.

You can’t trust anyone on the Internet, be it a new friend on social media, a new entry into your address book, or a seemingly-legitimate website. You have to be ready for anything, but this can be a daunting task. Thankfully, you don’t have to endure it alone. With Total Tech Care by your side, you’ll be prepared to handle any cyber threat. To learn more about what we can offer your business, reach out to us at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Phishing Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Cloud Computing Server Save Money Windows 10 Passwords Saving Money Gadgets Holiday Chrome Tech Term Social Media Virtualization Managed IT Services Managed Service Automation Microsoft Office Computers Artificial Intelligence Operating System Facebook Cybercrime Internet of Things BYOD Mobile Device Management Wi-Fi Networking IT Support Hacking Health Remote Spam Alert Office 365 Covid-19 Information Telephone Systems Managed Service Provider Information Technology BDR Bandwidth Social Engineering Mobility Recovery Employer-Employee Relationship Router Mobile Computing Law Enforcement Application Remote Monitoring Password Money App History Big Data Encryption Applications Data Breach Human Resources Remote Computing Private Cloud Mobile Office How To Managed IT Blockchain Paperless Office Apps Data Storage Office Tips Patch Management Training VPN Government Avoiding Downtime Two-factor Authentication WiFi IT solutions Entertainment Data Security Website Budget Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Wireless Vulnerability Infrastructure Windows 7 Voice over Internet Protocol Word Gmail Google Drive Settings Servers Flexibility Marketing Virtual Reality Apple Social USB Save Time User Error Meetings Vendor Managed Services Staff Software as a Service Display Telephone System Cleaning Machine Learning Risk Management Connectivity Remote Work Hacker Conferencing Employee/Employer Relationship End of Support The Internet of Things RMM Education Physical Security Scam Lithium-ion battery Safety HIPAA Sports Redundancy Keyboard Firewall Vendor Management Data Protection SaaS YouTube Charger Procurement Black Market Workplace Strategy Comparison Net Neutrality Compliance Printer OneNote Bluetooth Computer Care Network Congestion CES Current Events Help Desk Document Management Telephony eWaste Printing Wireless Technology Samsung Solid State Drive How to Content Management Downtime Business Technology Access Control Value Managed Services Provider IT Consultant Data storage Virtual Assistant Automobile Wearable Technology Authentication Spam Blocking Database Electronic Medical Records Hard Drives Humor Retail Remote Workers Instant Messaging Computing Infrastructure Robot Hiring/Firing Excel Going Green Processor Biometrics Update Virtual Desktop Hard Drive Battery Google Docs DDoS Identity Theft Shadow IT Legal Business Intelligence SharePoint Computing Audit Internet Exlporer Worker IT Management Virus Augmented Reality Botnet PDF Customer Service Fraud Environment Unified Threat Management IT Plan Remote Worker Digital Signage Computer Accessories Fax Server Proactive IT Cryptocurrency Unsupported Software Best Practice Tablet Experience Cache AI Amazon Web Services IT Infrastructure Domains Criminal Supercomputer Bing Safe Mode FinTech Scalability Software Tips GDPR Business Owner Sync Hosted Computing Social Network Emails IaaS Wireless Internet Maintenance Online Shopping Investment NarrowBand Search Employee/Employer Relationships Bloatware File Sharing Employees Camera Windows 365 Inventory iPhone Netflix Specifications ISP Two Factor Authentication Printer Server Tablets Wire Video Conferencing Root Cause Analysis Evernote ROI HBO Bitcoin Knowledge Entrepreneur Travel Shortcuts Music Sales Printers Point of Sale Skype Personal Files Millennials Cryptomining Chromecast Smart Office Supply Chain Management Data loss Shortcut Wireless Charging Outlook Batteries Leadership Cost Management Troubleshooting Monitoring Virtual Private Network Windows 8.1 Start Menu Digitize Colocation Social Networking Workforce Uninterrupted Power Supply Loyalty Screen Mirroring Cables Windows Server 2008 R2 Frequently Asked Questions Monitor Books Customer relationships Project Management Email Best Practices Mobile Running Cable Nanotechnology IT Assessment Windows 10s Telecommuting Manufacturing Memory Cast Cortana Tip of the week Digital Signature Managed IT Service Reputation webinar Security Cameras Consultant Streaming Media Emergency Computer Tips Warranty Virtual CIO Content Professional Services OneDrive Public Cloud Biometric Security Tech Support Employer Employee Relationship Analytics Laptop Assessment HVAC Peripheral Techology Google Apps Windows Server 2008 Analysis Using Data Customers Best Available Digital Security Cameras Administrator Audiobook Tools Devices Copiers 5G WIndows 7 Science Touchpad Television Enterprise Content Management Quick Tip Accountants Smartwatch MSP Ergonomics Microchip Politics Distributed Denial of Service Thought Leadership Development Advertising Customer Relationship Management Credit Cards OLED Public Computer Analyitcs Password Management PCI DSS Password Manager Virtual Machine Regulations Fiber Optics Programming Multi-Factor Security Employee Notifications Transportation 2FA PowerPoint Windows Media Player Search Engine Twitter Messaging Computer Fan Cabling User Rootkit NIST Policy Business Mangement Hypervisor Dark mode Antivirus Smart Tech Trend Micro Relocation Workers Trending Benefits Addiction SMS FENG Amazon Default App Managing Stress Windows 8 IT service Recycling Saving Time IBM Procedure Video Games Wiring dark theme Worker Commute Flash Practices Shopping Google Search Smart Technology Cameras

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code