Contact us today!

FRS Pros Blog

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

In a recent security report released by security company phishd by MMR InfoSecurity, the company simulated attack campaigns targeting almost a million users. ITProPortal reports that “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

These findings translate roughly to more than 10 percent of targeted users falling victim to the first two stages of the simulated attack and disclosing their user credentials. When you compare this rate to a traditional hacking method like spam email where the success rate is a fraction of a percentage point, you can see why hackers and scammers are turning to social media in droves.

Diving deeper into this study gives business owners even more reason to worry. James Moore, Managing Director of phishd by MWR InfoSecurity, observes, “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This means that a significant number of users have connected their social media activity to their work email accounts, a bad move that increases the risk of a company experiencing a data breach.

This study highlights the importance of businesses safeguarding their data by including strategies to protect them from phishing scams. Ultimately, this requires a multi-prong approach. In addition to implementing standard security tools like antivirus, spam blocking, and content filtering (which you can use to block social media websites on your network), you’ll want to include training so users will know how to spot a phishing scam, be it found on social media or elsewhere. Otherwise, hackers will utilize a lure so convincing that a user will bypass all of the security measures you’ve put in place--all so they can take advantage of a bogus deal, connect with a fake Facebook friend, respond to a fake job offer, etc.

Today’s businesses must protect their data from threats on every side: social media, email, mobile devices, malicious websites, and more. Is your business prepared to deal with the complex world of network security? If not, then scammers will take advantage of your blind spots and lure your network users into their traps. To make sure that your business is protected from the worst of the web, call FRS Pros at 561-795-2000.

You Deserve an IT Provider that Cares as Much as Y...
Tip of the Week: Cracked Your Phone’s Screen? Here...

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Privacy Internet Hackers User Tips Software Google Cloud Microsoft Efficiency Innovation Hardware Data Business Management Computer Communication Hosted Solutions Windows 10 Email Smartphones Tech Term IT Services Data Backup IT Support Malware Mobile Devices Cybersecurity Small Business Business Disaster Recovery Backup Data Recovery Workplace Tips Upgrade Browser Office 365 Android Smartphone Outsourced IT VoIP Internet of Things Gadgets Windows Collaboration Apps Users Communications Cloud Computing Business Continuity Data Security Phishing Cybercrime Saving Money Network Managed IT Services Ransomware Automation Information Operating System Miscellaneous Microsoft Office Managed Service Facebook Mobile Device Management Blockchain Employer-Employee Relationship Health Vulnerability Two-factor Authentication Wireless OneNote Money Artificial Intelligence Server Alert Passwords Law Enforcement Social Media Applications Quick Tips IT Support Chrome Virtualization Networking Managed IT Services Information Technology Managed IT Best Practice Holiday Mobile Office Spam Router Hacking Google Drive Settings Gmail Windows 10 Save Money Data Storage Computers Retail Mobile Device Windows 7 Conferencing Word Managed Service Provider Telephone Systems Patch Management Bandwidth Project Management Tech Support Unsupported Software Augmented Reality BYOD Access Control Data Breach Password App Printing Bring Your Own Device Excel Vendor File Sharing Proactive IT SaaS Fraud Wi-Fi Google Assistant Update Hybrid Cloud Remote Workers Hosted Solution Politics Avoiding Downtime Mobility Evernote Shortcut Voice over Internet Protocol Touchscreen Search WiFi User Error BDR Cortana Business Technology Budget Audit Software as a Service Wireless Technology Going Green Social Data Loss Data Protection Data Management Meetings Government Hard Drive Display Human Resources Application Wireless Charging Encryption Productivity Robot Google Docs Covid-19 IT Management Safety Payment Cards Sports Cost Management Devices Paperless Office Marketing The Internet of Things Management Telephony WannaCry Commerce VPN iPhone Risk Management History Travel Mobile Security HIPAA Entertainment PowerPoint Admin Uninterrupted Power Supply Processor Training Regulations Compliance Keyboard OneDrive Hosted Desktop Consultant Remote Computing Development Telework Compliance Break/Fix Fiber Optics Remote Monitoring Apple Identity Theft Hyperlink Sales Proactive Machine Learning Tablets Maintenance Identity Office Printers Server Maintenance Remote Work IT solutions Storage Social Engineering Wireless Internet Saving Time Benchmarks Sync Employee-Employer Relationship Smart Devices DDoS Micrsosoft Audits iOS WIndows Server 2008 Laptop FAQ Medical IT Files Holidays Transportation Edge Value Vendor Management Wasting Time Websites Amazon Downtime Disaster Managed IT Service Private Cloud NFL eWaste Data Privacy Scam Recovery Investment Net Neutrality Windows 10s HBO Identities Gamification Keyboard Shortcuts Myths Computer Care Nanotechnology Education Sabotage Troubleshooting Screen Mirroring Accessory Business Intelligence Solutions Touchpad Charger 5G Copiers Unified Threat Management Ciminal Samsung Data Theft Virtual Assistant E-Commerce Managed Services Provider Device Security ROI Administrator Internet Service Provider Solid State Drive Legislation Language Legal Memory Lithium-ion battery Threats Root Cause Analysis Adobe Workers Testing PC Streaming Media CRM Emails Cast Computer Forensics Peripheral Digital Signage Printer Computer Fan Humor YouTube Inventory Upgrades Antivirus Hard Disk Drive Gifts Computing Alexa for Business Facebook Privacy Windows Ink Chromebook Co-Managed Services Windows Server 2008 R2 Access Comparison Financial Payroll Scams Personal Information Licensing Updates Battery Camera Chromecast AI Firewall PCI DSS Outlook Instant Messaging Hacker Employees Microsoft Excel IT budget Workstation IT Solutions Credit Cards App store Emergency Employee eCommerce Reputation Google Maps Spyware Telephone Internet Exlporer Data storage Specifications Virus Security Cameras Virtual Private Network Microsoft Word Point of Sale Projects Smartwatch Webinar Monitors es Text Messaging Black Market Cleaning Big Data Television CrashOverride Automobile Company Culture Managing Stress Office tips USB Worker Regulation Advertising How To Books Video Games Experience Hiring/Firing Virtual Reality Work/Life Balance Twitter Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship Phone System HaaS Benefits End of Support Thank You Save Time Relocation Computer Accessories Flexibility Music Smart Technology Congratulations Communitications PDF Cache Scalability Analytics Mobile Computing