Home

    Body Temp Scanners

    About Us

    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Employment
    • Refer a Colleague or Friend

    IT Services

    • Managed IT Services
      • Managed Services
      • IT Consulting
      • Comprehensive IT Support
      • Remote Monitoring and Maintenance
      • IT Vendor Management
      • Co-Managed IT
      • Desktop Monitoring and Management
      • Infrastructure Support Services
      • Professional Server Support
      • vCIO
      • Business Computing Assessment
    • IT Security Services
      • Network Security
      • Unified Threat Management
      • Content Filtering
      • Spam Protection
      • Security Cameras
        • Thermal Body Temperature Camera Solutions
      • Email Encryption
      • Fully Hosted Security as a Service
      • Security Networking
      • Access Control Solutions
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Server
      • Hosted Desktop
      • Hardware Virtualization
      • Cloud Backup & File Sharing
    • Industry Specific
      • Health Care IT
      • IT for Law
      • Manufacturing IT
      • Point-of-Sale Technologies
      • IT for Education
      • IT for Accountants
      • Retail IT
      • IT for Engineers and Architects
    • Data Services
      • Business Continuity
      • Data Retrieval
      • Disaster Recovery as a Service
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Wireless Services
      • High-Speed Internet Consulting
      • Printer Management
      • Office Relocation Services
      • Server Migration
    • Software Services
      • Microsoft Office 365
      • G Suite by Google
      • Microsoft Partner Network
    • Business Communication
      • VoIP
      • Fax Server
      • Conferencing
      • Digital Signage
      • Unified Communications
    • Media & Internet Services
      • Website Design

    Understanding IT

    • Ransomware
    • Shadow IT
    • The Modern Office
    • IT Threat Glossary
    • Business Continuity
    • Windows 10
    • The Internet of Things
    • Network Security
    • BYOD
    • PCI DSS
    • HIPAA
    • Cloud Computing

    News

    • Events Calendar

    Blog

    Contact Us

    Support

    • Help Desk
    • Remote Support Tool
logo

(844)GEEK-BOX

  • Home
  • Body Temp Scanners
  • About Us
    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Employment
    • Refer a Colleague or Friend
  • IT Services
    • Managed IT Services
      • Managed Services
      • IT Consulting
      • Comprehensive IT Support
      • Remote Monitoring and Maintenance
      • IT Vendor Management
      • Co-Managed IT
      • Desktop Monitoring and Management
      • Infrastructure Support Services
      • Professional Server Support
      • vCIO
      • Business Computing Assessment
    • IT Security Services
      • Network Security
      • Unified Threat Management
      • Content Filtering
      • Spam Protection
      • Security Cameras
        • Thermal Body Temperature Camera Solutions
      • Email Encryption
      • Fully Hosted Security as a Service
      • Security Networking
      • Access Control Solutions
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Server
      • Hosted Desktop
      • Hardware Virtualization
      • Cloud Backup & File Sharing
    • Industry Specific
      • Health Care IT
      • IT for Law
      • Manufacturing IT
      • Point-of-Sale Technologies
      • IT for Education
      • IT for Accountants
      • Retail IT
      • IT for Engineers and Architects
    • Data Services
      • Business Continuity
      • Data Retrieval
      • Disaster Recovery as a Service
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Wireless Services
      • High-Speed Internet Consulting
      • Printer Management
      • Office Relocation Services
      • Server Migration
    • Software Services
      • Microsoft Office 365
      • G Suite by Google
      • Microsoft Partner Network
    • Business Communication
      • VoIP
      • Fax Server
      • Conferencing
      • Digital Signage
      • Unified Communications
    • Media & Internet Services
      • Website Design
  • Understanding IT
    • Ransomware
    • Shadow IT
    • The Modern Office
    • IT Threat Glossary
    • Business Continuity
    • Windows 10
    • The Internet of Things
    • Network Security
    • BYOD
    • PCI DSS
    • HIPAA
    • Cloud Computing
  • News
    • Events Calendar
  • Blog
  • Contact Us
  • Support
    • Help Desk
    • Remote Support Tool

GeekBox IT, LLC Blog

GeekBox IT Blog

Social Media Conditions People to Let Their Guard Down

Written by GeekBox IT
Published: 21 Mar 2022
Social Media Conditions People to Let Their Guard Down

How often do you check social media only to find your news feed clogged with your friends and family sharing the results of quizzes like, “Which Star Wars character are you,” or “What’s your superhero name based on your birthday.” While these quizzes might seem harmless on the surface, they often hide a far more sinister agenda, one which uses the personally identifiable information provided to them for nefarious purposes.

If your friends and family aren’t careful, these quizzes could be giving their hosts access to all the information they need to hijack someone’s social media profile.

“Your New Last Name is the Thing You Ate Last!”

The major concern we have about these quizzes is that they might appear to be lighthearted on the surface, but that the questions line up suspiciously close to the security questions that one might use to protect an account. For example, your bank and credit card accounts use security questions to keep them secure, so what happens if you give up this information to an online quiz?

That’s right—the hacker might use the information you willingly provided to hijack your account. All the hacker has to do is click that Forgot Your Password prompt and boom, they’re in.

This is because these security systems can’t always tell who is typing in the answers; all they do is check to make sure that the answer matches the one provided in the past. From the bank’s perspective, you’re just another customer who forgot their password and is using their recovery question to gain access to your account.

When you look at online quizzes and questions they might ask, they line up quite closely with the recovery questions that are often associated with resetting passwords, like your first pet’s name, your mother’s maiden name, the model of your first car, and so on. When you share the answers to these questions, you effectively give someone on the Internet everything they need for easy access to your accounts.

This Is How Social Engineering Attacks Work

Even the most unlikely suspects could be considered social engineering attacks, especially on social media. It’s important that you give your team the tools and knowledge they need to identify these threats so as to avoid them. The same hallmarks of phishing attacks are present here, too: misspelled addresses, alarming subject lines, unprompted attachments, etc.

Cyberthreats are everywhere, so you can never be too careful. Remain ever-vigilant and be sure to train your employees on how to identify and respond to threats. To talk to an IT expert on training your staff and securing your business, reach out to us at (336) 790-1000.

Add new comment 

Posted in Blog, Security  
Tagged Network Security, Phishing, Social Media  

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

 

Posts by Topic

  • Alerts
  • Best practices
  • Blog
  • Business
  • Cloud
  • How to
  • IT Blog
  • Miscellaneous
  • Off Topic/Fun
  • Security
  • Technology
  • Tip of the Week

Mobile? Grab this Article!

Tag Cloud

Android Best practices Business Business Computing Cloud Collaboration Communications Computer Cybersecurity Data Disaster Recovery Efficiency Email Google Hackers Hardware Hosted Solutions Innovation Internet IT Services IT Support Malware Managed IT Services Microsoft Miscellaneous Mobile Device Mobile Devices Network Security Phishing Privacy Productivity Quick Tips Ransomware Remote Security Small Business Smartphones Software Technology Tip of the Week Users User Tips VoIP Workplace Strategy Workplace Tips

Blog Archive

  • ►2023 (15)
    • ▼February (2)
    • ►January (13)
  • ►2022 (157)
    • ►December (12)
    • ►November (15)
    • ►October (13)
    • ►September (13)
    • ►August (14)
    • ►July (13)
    • ►June (13)
    • ►May (13)
    • ►April (13)
    • ►March (13)
    • ►February (12)
    • ►January (13)
  • ►2021 (158)
    • ►December (14)
    • ►November (13)
    • ►October (13)
    • ►September (14)
    • ►August (13)
    • ►July (13)
    • ►June (13)
    • ►May (13)
    • ►April (13)
    • ►March (14)
    • ►February (12)
    • ►January (13)
  • ►2020 (158)
    • ►December (13)
    • ►November (13)
    • ►October (14)
    • ►September (12)
    • ►August (13)
    • ►July (14)
    • ►June (13)
    • ►May (13)
    • ►April (13)
    • ►March (13)
    • ►February (12)
    • ►January (15)
  • ►2019 (148)
    • ►December (12)
    • ►November (13)
    • ►October (13)
    • ►September (13)
    • ►August (12)
    • ►July (13)
    • ►June (12)
    • ►May (14)
    • ►April (13)
    • ►March (13)
    • ►February (12)
    • ►January (8)
  • ►2018 (5)
    • ►December (5)
Home > Blog > Security > Social Media Conditions People to Let Their Guard Down

Latest Blog

Tech Giants are Looking to Ditch the Password

Passwords, as annoying as they are sometimes, are the front line of defense to almost every account and profile your business depends on. That doesn’t stop security professionals from trying to develop better strategies to secure digital systems. Some of the biggest names in tech are searching for ways to forge ahead passwordless. Let’s take a look at one example... Read More

Contact Us

Learn more about what GeekBox IT
can do for your business.

(336) 790-1000

GeekBox IT
1250 Revolution Mill Drive
Suite 166
Greensboro, NC 27405

facebook RSS feed

About GeekBox IT

GeekBox IT strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges, starting with planning, implementing, and supporting the IT solutions that are critical to your growth and success.
About Us

Privacy Policy | Terms & Conditions | Copyright GeekBox IT.   All Rights Reserved.
Powered by JoomConnect

S5 Box – Login

Publish a login form or anything you want to this position.

S5 Box – Register

Publish a registration form or anything you want to this position.