Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Take Social Media Scams Seriously

Take Social Media Scams Seriously

While social media has given us the capability to communicate beyond anything we’ve seen since the popularization of the Internet itself, this isn’t all a good thing. These platforms have made it easier for people to scam others, after all, making it necessary for everyone to take their personal cybersecurity and that of their company even more seriously.

Let’s talk about how these scams commonly work.

What is a Social Media Scam?

As the name suggests, a social media scam is a scam carried out via a social media network.

Generally speaking, an attacker will create fake profiles on applications and platforms that carry some inherent trust, posing as an entity that also carries some inherent trust with it—be that a family member or friend, romantic prospect, government entity, business, or otherwise. From this position, the attacker will manipulate their target based on what they can glean from their social media activity, impersonating someone, falsely claiming to represent an organization, or otherwise trying to gain people’s trust.

From there, the scam can take many forms, such as:

  • Offering a means of making fast money with little work or associated risk
  • Offering a sale of a valuable item, sight unseen
  • Offering a heavily discounted sale of a big-ticket item
  • Offering a sale, despite living overseas or otherwise being unable to meet in person
  • Offering something with the endorsement of a public figure
  • Pleading for financial support—despite never having met you in person—to assist with some personal emergency
  • Threats to share images of you unless some financial compensation is received 

You must watch for these warning signs and always do what you can to protect your data. For instance:

Do What You Can to Confirm the Poster’s Identity

Carefully consider any account that reaches out to you, noting how long it has been around, how active it has been, and how many followers it has. This could indicate that the profile is fraudulent. The same goes for unsolicited job offers and otherwise too-good-to-be-true opportunities. Do some digging to gauge the legitimacy of anything you see online.

Keep Private Information Private

If someone reaches out to you requesting financial assistance or photos of a particularly personal nature, stop and think for a moment. If it is someone you have ever only met online, stop. Even if you’ve met this person, it pays to consider how much you trust them and what ulterior motives they may have.

While We Appreciate Large Companies Spreading Awareness, You Need to Be the One to Act

To give credit where it is due, this conversation was inspired mainly by the guidance that Chase Bank provides about social media scams on their website, citing that almost half of all scams reported to the financial institution originate on social media. The bank has reportedly received reports from users that people are using Zelle to request electronic transfers to scam them from social media platforms and the integrated marketplaces found there.

While we have to give Chase a little credit for being open about the situation and offering a little guidance, it is crucial to recognize that Chase is also trying to mitigate its losses here. After all, its privacy and security page that discusses social media scams also establishes that various forms of payment—including Zelle, crypto, and gift cards—don’t give the consumer purchase protection.

Nevertheless, a bank has provided this information. While it is essential to pay attention to it, this advice cannot be restricted to Chase Bank or any other singular institution, for that matter. Instead, you should follow our advice—do all of the above, but everywhere, with every account.

We Can Assist Businesses in Educating Employees with Such Information

You can trust Voyage Technology to do everything possible to protect your business against cybersecurity threats, from implementing practical protections to educating your workforce on the best practices that will help keep them safe. Give us a call at 800.618.9844 to learn more.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery AI Android Disaster Recovery VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Covid-19 Gadgets Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Conferencing How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services Operating System Computers 2FA Router Risk Management Virtual Private Network Website Health Healthcare Help Desk Analytics Office Tips Document Management Firewall Free Resource Project Management Windows 7 Telephone The Internet of Things Scam Data loss Microsoft 365 Cooperation Solutions Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Windows 11 Cybercrime Physical Security Display Excel Printer Paperless Office Remote Workers Infrastructure Monitoring Money Saving Time Humor Vulnerabilities Data Privacy Managed IT Service Images 101 Safety Maintenance Downloads Antivirus Sports Multi-Factor Authentication Mobility Mouse Licensing Administration Entertainment Employees Integration Robot Telephone System Customer Relationship Management Cost Management Settings Wireless Printing Holidays Content Filtering IT Management Hacking VPN Data Storage Presentation YouTube Meetings Supply Chain Cryptocurrency Video Conferencing Modem Managed Services Provider User Tip Wireless Technology Processor Virtual Machines Computer Repair Mobile Security Professional Services Virtual Desktop Data storage LiFi Word Smart Technology Outlook iPhone Machine Learning Public Speaking Screen Reader Cyber security Writing Distributed Denial of Service Tech Human Resources Lenovo Telework CES Lithium-ion battery Service Level Agreement Communitications Virtual Reality Computing Infrastructure Cables Entrepreneur Hacks Server Management Supply Chain Management Scary Stories Private Cloud Identity Identity Theft Smart Tech Fun Term Google Apps Superfish Bookmark FinTech Deep Learning Download IT Assessment Twitter Alerts IT Maintenance Flexibility Undo Error Value Business Intelligence Education Connectivity Social Engineering Break Fix Shortcuts Browsers Organization Digital Security Cameras Upload Smart Devices Remote Computing Ransmoware Multi-Factor Security Mobile Computing Social Network Remote Working Memory Vendors Tablet IoT Data Breach Search Dark Web Google Play Be Proactive Videos Best Practice Trends Electronic Health Records Application Alert Workforce Dark Data Google Calendar Managed IT Customer Resource management Buisness File Sharing Regulations Wasting Time Threats IBM IT solutions Star Wars Trend Micro How To Microsoft Excel Security Cameras Workplace Strategies Legal Data Analysis Business Growth Gamification Software as a Service Notifications Staff Meta Legislation Travel Social Networking Managing Costs Amazon Google Maps eCommerce Cortana SSID Techology Fileless Malware Alt Codes Content Surveillance Wearable Technology Virtual Assistant Outsource IT Comparison Media Health IT Competition Downtime Unified Threat Management Motherboard Virtual Machine Environment Hosted Solution Assessment Permissions Medical IT Unified Threat Management Directions Reviews Typing Development Transportation Small Businesses Network Congestion Specifications Hypervisor Displays Google Drive User Error Microchip Shopping Internet Exlporer Optimization User Knowledge Fraud PowerPoint Username Employer/Employee Relationships Outsourcing Point of Sale 5G Black Friday Navigation PCI DSS Google Docs Gig Economy IP Address Unified Communications Database Experience Workplace Bitcoin Network Management Internet Service Provider Running Cable Tech Support IT Technicians Teamwork Hiring/Firing Cookies Monitors Cyber Monday Evernote Paperless Google Wallet Proxy Server Regulations Compliance Tactics Memes Recovery Hotspot Co-managed IT Windows 8 Net Neutrality Hard Drives Laptop Websites Mirgation SQL Server Technology Care Domains Nanotechnology History Business Communications Drones Financial Data SharePoint Smartwatch Addiction IT Electronic Medical Records Language Scams Management Procurement Refrigeration Halloween Chatbots Azure Hybrid Work

Blog Archive