Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Take Social Media Scams Seriously

Take Social Media Scams Seriously

While social media has given us the capability to communicate beyond anything we’ve seen since the popularization of the Internet itself, this isn’t all a good thing. These platforms have made it easier for people to scam others, after all, making it necessary for everyone to take their personal cybersecurity and that of their company even more seriously.

Let’s talk about how these scams commonly work.

What is a Social Media Scam?

As the name suggests, a social media scam is a scam carried out via a social media network.

Generally speaking, an attacker will create fake profiles on applications and platforms that carry some inherent trust, posing as an entity that also carries some inherent trust with it—be that a family member or friend, romantic prospect, government entity, business, or otherwise. From this position, the attacker will manipulate their target based on what they can glean from their social media activity, impersonating someone, falsely claiming to represent an organization, or otherwise trying to gain people’s trust.

From there, the scam can take many forms, such as:

  • Offering a means of making fast money with little work or associated risk
  • Offering a sale of a valuable item, sight unseen
  • Offering a heavily discounted sale of a big-ticket item
  • Offering a sale, despite living overseas or otherwise being unable to meet in person
  • Offering something with the endorsement of a public figure
  • Pleading for financial support—despite never having met you in person—to assist with some personal emergency
  • Threats to share images of you unless some financial compensation is received 

You must watch for these warning signs and always do what you can to protect your data. For instance:

Do What You Can to Confirm the Poster’s Identity

Carefully consider any account that reaches out to you, noting how long it has been around, how active it has been, and how many followers it has. This could indicate that the profile is fraudulent. The same goes for unsolicited job offers and otherwise too-good-to-be-true opportunities. Do some digging to gauge the legitimacy of anything you see online.

Keep Private Information Private

If someone reaches out to you requesting financial assistance or photos of a particularly personal nature, stop and think for a moment. If it is someone you have ever only met online, stop. Even if you’ve met this person, it pays to consider how much you trust them and what ulterior motives they may have.

While We Appreciate Large Companies Spreading Awareness, You Need to Be the One to Act

To give credit where it is due, this conversation was inspired mainly by the guidance that Chase Bank provides about social media scams on their website, citing that almost half of all scams reported to the financial institution originate on social media. The bank has reportedly received reports from users that people are using Zelle to request electronic transfers to scam them from social media platforms and the integrated marketplaces found there.

While we have to give Chase a little credit for being open about the situation and offering a little guidance, it is crucial to recognize that Chase is also trying to mitigate its losses here. After all, its privacy and security page that discusses social media scams also establishes that various forms of payment—including Zelle, crypto, and gift cards—don’t give the consumer purchase protection.

Nevertheless, a bank has provided this information. While it is essential to pay attention to it, this advice cannot be restricted to Chase Bank or any other singular institution, for that matter. Instead, you should follow our advice—do all of the above, but everywhere, with every account.

We Can Assist Businesses in Educating Employees with Such Information

You can trust Voyage Technology to do everything possible to protect your business against cybersecurity threats, from implementing practical protections to educating your workforce on the best practices that will help keep them safe. Give us a call at 800.618.9844 to learn more.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Computer Email Workplace Tips Phishing Hosted Solutions IT Services Collaboration Users Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Microsoft Cybersecurity Communication Passwords Data Backup Saving Money Smartphone Backup Android Managed Service Business Management Smartphones VoIP Upgrade Mobile Devices communications Disaster Recovery Browser Data Recovery Windows Managed IT Services Social Media Microsoft Office Remote Tech Term Current Events Network Internet of Things Productivity Automation Facebook Artificial Intelligence Covid-19 Gadgets Cloud Computing AI Managed Service Provider Remote Work Miscellaneous Server Holiday Outsourced IT Information Training Employee/Employer Relationship Compliance Spam Encryption Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology IT Support Virtualization Bandwidth Blockchain Wi-Fi Two-factor Authentication Apps Data Security Vendor Mobile Office Mobile Device Management Gmail Chrome Budget Managed Services Voice over Internet Protocol Networking Employer-Employee Relationship Apple App BYOD Information Technology Access Control Conferencing Tip of the week Office 365 WiFi How To BDR HIPAA Hacker Applications Avoiding Downtime Computing Marketing Help Desk Risk Management Health Office Tips Analytics Augmented Reality Retail Big Data Storage Password Managed IT Services Bring Your Own Device Healthcare Router Computers Operating System Website Virtual Private Network Solutions Monitoring Printer Paperless Office Infrastructure Firewall Document Management Telephone The Internet of Things Social Scam Cooperation Data loss Remote Workers Windows 11 Patch Management 2FA Customer Service Save Money Going Green Remote Monitoring Free Resource End of Support Vulnerability Project Management Excel Windows 7 Vendor Management Microsoft 365 Cybercrime Physical Security Display Cryptocurrency Computer Repair Smart Technology Word Employees Integration Saving Time Data Privacy Virtual Desktop Data storage LiFi Managed IT Service Machine Learning Outlook Holidays Safety Downloads Data Storage Money Humor Licensing Video Conferencing Maintenance Entertainment Antivirus Managed Services Provider Professional Services Virtual Machines Sports Mouse Telephone System Cost Management Administration Customer Relationship Management iPhone Robot Supply Chain Vulnerabilities Hacking Presentation Settings Images 101 Modem Printing IT Management Wireless Technology Wireless User Tip Content Filtering Processor VPN Mobile Security Multi-Factor Authentication Meetings Mobility YouTube Mirgation Electronic Health Records Scams Hard Drives Videos Nanotechnology Hybrid Work Network Management Wasting Time Domains Tech Support 5G Security Cameras Experience Monitors Addiction Google Docs Language Trend Micro Unified Communications Human Resources Chatbots Software as a Service Bitcoin Cables Running Cable Refrigeration Management Screen Reader Google Wallet Distributed Denial of Service Managing Costs Public Speaking Websites SSID Service Level Agreement Computing Infrastructure eCommerce Google Apps Lithium-ion battery SharePoint Identity Surveillance Windows 8 IT Maintenance Virtual Assistant Laptop Electronic Medical Records Entrepreneur Bookmark Smart Tech Drones Business Intelligence Virtual Machine Medical IT Writing Download Reviews Lenovo Alerts Shortcuts Development Ransmoware Transportation Halloween Undo Virtual Reality Browsers Connectivity Vendors Server Management Break Fix Hypervisor Private Cloud Identity Theft PowerPoint Upload Shopping Superfish Optimization Be Proactive Hacks Workforce Multi-Factor Security Employer/Employee Relationships Scary Stories Twitter Social Network IoT PCI DSS Threats Dark Web Error Navigation Fun Application Social Engineering Trends Gig Economy Deep Learning Workplace Strategies Regulations Internet Service Provider Meta Google Calendar Teamwork Remote Computing Customer Resource management Data Analysis Star Wars Regulations Compliance Amazon Microsoft Excel Education IBM Evernote Tablet Gamification Staff Memes Social Networking Net Neutrality Mobile Computing Outsource IT Legislation SQL Server Alert Dark Data Fileless Malware Financial Data Environment Managed IT History Media File Sharing Search How To Content Smartwatch Wearable Technology IT Best Practice Motherboard Procurement Small Businesses Comparison Azure Buisness Competition Notifications Health IT Directions Assessment Telework Legal Displays Permissions Cyber security IT solutions Travel Tech Google Maps CES Techology Communitications Business Growth Supply Chain Management Outsourcing Specifications User Microchip Internet Exlporer FinTech Fraud Unified Threat Management Term Cortana Alt Codes Workplace Username Unified Threat Management IT Assessment Flexibility Hiring/Firing Black Friday Value Downtime Network Congestion Database Organization Hosted Solution Paperless IP Address Smart Devices Typing Co-managed IT Digital Security Cameras User Error IT Technicians Proxy Server Cookies Remote Working Technology Care Cyber Monday Memory Google Play Knowledge Recovery Tactics Google Drive Hotspot Data Breach Business Communications Point of Sale

Blog Archive