croom new

Patriot Tech Services Inc. Blog

Patriot Tech Services Inc. has been serving the Wheelersburg area since 2006, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

In a recent security report released by security company phishd by MMR InfoSecurity, the company simulated attack campaigns targeting almost a million users. ITProPortal reports that “Almost a quarter of users clicked a link to be taken to a fake login screen. Out of that number, more than half (54 percent) provided user credentials, and 80 percent downloaded a file.”

These findings translate roughly to more than 10 percent of targeted users falling victim to the first two stages of the simulated attack and disclosing their user credentials. When you compare this rate to a traditional hacking method like spam email where the success rate is a fraction of a percentage point, you can see why hackers and scammers are turning to social media in droves.

Diving deeper into this study gives business owners even more reason to worry. James Moore, Managing Director of phishd by MWR InfoSecurity, observes, “More concerning is that out of those targeted with a social media request or a promotional offer, more than 10 percent downloaded a potentially malicious file via their corporate email accounts.” This means that a significant number of users have connected their social media activity to their work email accounts, a bad move that increases the risk of a company experiencing a data breach.

This study highlights the importance of businesses safeguarding their data by including strategies to protect them from phishing scams. Ultimately, this requires a multi-prong approach. In addition to implementing standard security tools like antivirus, spam blocking, and content filtering (which you can use to block social media websites on your network), you’ll want to include training so users will know how to spot a phishing scam, be it found on social media or elsewhere. Otherwise, hackers will utilize a lure so convincing that a user will bypass all of the security measures you’ve put in place--all so they can take advantage of a bogus deal, connect with a fake Facebook friend, respond to a fake job offer, etc.

Today’s businesses must protect their data from threats on every side: social media, email, mobile devices, malicious websites, and more. Is your business prepared to deal with the complex world of network security? If not, then scammers will take advantage of your blind spots and lure your network users into their traps. To make sure that your business is protected from the worst of the web, call Patriot Tech Services Inc. at 877-874-4629.

You Deserve an IT Provider that Cares as Much as Y...
Tip of the Week: Cracked Your Phone’s Screen? Here...
 

Comments 1

esperanza jpalmer on Saturday, 20 May 2017 03:18

An assortment of free and minimal effort instruments can be utilized to send taunt phishing messages to clients. They work by sending clusters of phishing messages to representatives, with the capacity to track which representatives associate with the email. A few apparatuses incorporate an instructive part that guides clients to a page clarifying they just tapped on a phishing email. This ongoing preparing has been appeared to twofold the standard for dependability of security ideas contrasted and classroom-based security mindfulness preparing.

ref: best essay writing service

An assortment of free and minimal effort instruments can be utilized to send taunt phishing messages to clients. They work by sending clusters of phishing messages to representatives, with the capacity to track which representatives associate with the email. A few apparatuses incorporate an instructive part that guides clients to a page clarifying they just tapped on a phishing email. This ongoing preparing has been appeared to twofold the standard for dependability of security ideas contrasted and classroom-based security mindfulness preparing. ref: [url=https://www.bestessaywritingservice.co/]best essay writing service[/url]
Guest
Already Registered? Login Here
Guest
Saturday, September 13 2025

Captcha Image

Mobile? Grab this Article!

Qr Code

Sign Up For Our Newsletter

  • First Name *
  • Last Name *

      Latest Blog Entry

      For the IT administrator and the small business owner, it can be a bewildering experience when your company comes under siege from employee-induced cyberthreats; especially if you, like many other companies, have started prioritizing security training. Even if the threat is ...

      Latest News

      Patriot Tech Services Inc. launches new website!

      Patriot Tech Services Inc. is proud to announce the launch of our new website at www.patriot-techs.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login