Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Take Social Media Scams Seriously

Take Social Media Scams Seriously

While social media has given us the capability to communicate beyond anything we’ve seen since the popularization of the Internet itself, this isn’t all a good thing. These platforms have made it easier for people to scam others, after all, making it necessary for everyone to take their personal cybersecurity and that of their company even more seriously.

Let’s talk about how these scams commonly work.

What is a Social Media Scam?

As the name suggests, a social media scam is a scam carried out via a social media network.

Generally speaking, an attacker will create fake profiles on applications and platforms that carry some inherent trust, posing as an entity that also carries some inherent trust with it—be that a family member or friend, romantic prospect, government entity, business, or otherwise. From this position, the attacker will manipulate their target based on what they can glean from their social media activity, impersonating someone, falsely claiming to represent an organization, or otherwise trying to gain people’s trust.

From there, the scam can take many forms, such as:

  • Offering a means of making fast money with little work or associated risk
  • Offering a sale of a valuable item, sight unseen
  • Offering a heavily discounted sale of a big-ticket item
  • Offering a sale, despite living overseas or otherwise being unable to meet in person
  • Offering something with the endorsement of a public figure
  • Pleading for financial support—despite never having met you in person—to assist with some personal emergency
  • Threats to share images of you unless some financial compensation is received 

You must watch for these warning signs and always do what you can to protect your data. For instance:

Do What You Can to Confirm the Poster’s Identity

Carefully consider any account that reaches out to you, noting how long it has been around, how active it has been, and how many followers it has. This could indicate that the profile is fraudulent. The same goes for unsolicited job offers and otherwise too-good-to-be-true opportunities. Do some digging to gauge the legitimacy of anything you see online.

Keep Private Information Private

If someone reaches out to you requesting financial assistance or photos of a particularly personal nature, stop and think for a moment. If it is someone you have ever only met online, stop. Even if you’ve met this person, it pays to consider how much you trust them and what ulterior motives they may have.

While We Appreciate Large Companies Spreading Awareness, You Need to Be the One to Act

To give credit where it is due, this conversation was inspired mainly by the guidance that Chase Bank provides about social media scams on their website, citing that almost half of all scams reported to the financial institution originate on social media. The bank has reportedly received reports from users that people are using Zelle to request electronic transfers to scam them from social media platforms and the integrated marketplaces found there.

While we have to give Chase a little credit for being open about the situation and offering a little guidance, it is crucial to recognize that Chase is also trying to mitigate its losses here. After all, its privacy and security page that discusses social media scams also establishes that various forms of payment—including Zelle, crypto, and gift cards—don’t give the consumer purchase protection.

Nevertheless, a bank has provided this information. While it is essential to pay attention to it, this advice cannot be restricted to Chase Bank or any other singular institution, for that matter. Instead, you should follow our advice—do all of the above, but everywhere, with every account.

We Can Assist Businesses in Educating Employees with Such Information

You can trust Voyage Technology to do everything possible to protect your business against cybersecurity threats, from implementing practical protections to educating your workforce on the best practices that will help keep them safe. Give us a call at 800.618.9844 to learn more.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Workplace Tips Computer Google Email IT Services Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Quick Tips Passwords Managed Service Saving Money Cybersecurity Communication Data Backup Smartphone Android Data Recovery AI Upgrade Disaster Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Apple Networking App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Managed Services Voice over Internet Protocol Budget WiFi How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing Managed IT Services Big Data Operating System Computers Router Virtual Private Network Risk Management 2FA Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Customer Service Cybercrime Physical Security Display Windows 11 Printer Paperless Office Infrastructure Monitoring Excel Document Management Firewall Remote Workers Telephone The Internet of Things Scam Data loss Data Privacy Administration Vulnerabilities Entertainment Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Customer Relationship Management Settings Wireless Printing Content Filtering Hacking IT Management Presentation VPN Employees YouTube Meetings Integration Cryptocurrency Wireless Technology User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays LiFi Supply Chain Data storage Data Storage Smart Technology Word Outlook Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Humor Managed IT Service Safety Maintenance Downloads Antivirus Sports iPhone Mouse Licensing Multi-Factor Security Tech Mobile Computing Social Network Telework Cyber security Tablet IoT Communitications Search Dark Web Google Apps CES Application Best Practice Trends Supply Chain Management Alert IT Maintenance Business Intelligence Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Buisness File Sharing Regulations IT solutions Star Wars IT Assessment How To Microsoft Excel Shortcuts IBM Legal Data Analysis Business Growth Gamification Flexibility Notifications Staff Value Ransmoware Vendors Legislation Organization Travel Social Networking Google Maps Smart Devices Cortana Be Proactive Techology Fileless Malware Digital Security Cameras Alt Codes Content Remote Working Wearable Technology Memory Workforce Threats Comparison Google Play Competition Health IT Downtime Unified Threat Management Motherboard Data Breach Hosted Solution Assessment Electronic Health Records Permissions Workplace Strategies Unified Threat Management Directions Videos Typing Wasting Time Meta Amazon Network Congestion Specifications Security Cameras Trend Micro User Internet Exlporer Software as a Service Knowledge Fraud Google Drive User Error Microchip Username Managing Costs Outsource IT Environment 5G Black Friday SSID Media Point of Sale eCommerce Unified Communications Database Surveillance Experience Virtual Assistant IP Address Google Docs Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Small Businesses Displays Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Cookies Recovery Tactics Development Hotspot Transportation Hard Drives Windows 8 Laptop Websites Mirgation Hypervisor Outsourcing PowerPoint Domains Drones Shopping Nanotechnology Optimization SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Workplace Refrigeration Management PCI DSS Halloween Chatbots Hiring/Firing Navigation Screen Reader Writing Distributed Denial of Service Paperless Public Speaking Lenovo Gig Economy Lithium-ion battery Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Co-managed IT Evernote Hacks Server Management Regulations Compliance Entrepreneur Scary Stories Private Cloud Identity Technology Care Identity Theft Smart Tech Memes Fun Business Communications Superfish Bookmark Deep Learning Download Net Neutrality Twitter Alerts SQL Server Scams Undo Financial Data Error History Hybrid Work Education Connectivity IT Social Engineering Break Fix Human Resources Browsers Smartwatch Upload Procurement Remote Computing Azure Cables

Blog Archive