Discover what great technology looks like!

While Fun, Those Social Media Quizzes Can be Dangerous

While Fun, Those Social Media Quizzes Can be Dangerous

We’ve all seen our friends and family sharing quizzes on their social media profiles, prompting people to find out what their celebrity stage name or what Hogwarts house you would be in, or to share what their first concert experience was. These fun, lighthearted quizzes are a great way to get to know a little more about the people we’re connected with… and that’s the biggest problem.

Let’s go over how these quizzes can easily obtain the information needed to gain access to a person’s social media profile.

“Your New Last Name is the Name of the High School You Attended!”

The big problem with these quizzes is that, innocent as they may seem, a lot of the questions they ask line up with the security questions that numerous accounts—your bank and credit cards, for instance—will use to confirm your identity when you try to recover your password.

Or, when “you” try to recover your password.

These security systems can’t tell who it is typing in these answers, they can only tell whether or not the provided answer matches the one they have on file. Your bank doesn’t know that you figured out what your superhero name would be and revealed your first pet’s name in doing so. From the bank’s perspective, you just forgot your password, and need to use your recovery questions to reset it.

When you consider these online quizzes and the questions they frequently ask, they line up with the recovery questions that a lot of platforms request when resetting a password. Your first pet’s name, your mother’s maiden name, the model of your first car—all of these questions are commonly used as security measures. So, by sharing the answers to these questions in response to these quizzes, you are potentially giving someone easy access to your accounts.

These Questions are Effectively Phishing on Social Media

Phishing is nothing to take lightly in any of its forms—including that which appears on social media. It is important that you and your team always have an eye out for these attempts in the office and out. Keep an eye out for some of the hallmarks of a phishing attack—misspelled addresses, overly alarmist subject lines, and unprompted attachments—and impress these practices on your employees as well.

Unfortunately, cyberthreats are not confined to either the office or the home, so vigilance is always somewhat necessary. However, Techworks Consulting, Inc. is here to help keep an eye on your work processes. Give us a call at (631) 285-1527 to learn more.

Tip of the Week: Why Your Team is Resistant to IT ...
Consider These 4 Ideas for Improved Video Meetings
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Saturday, 23 November 2024

Captcha Image

Contact Us

Learn more about what Techworks Consulting, Inc. can do for your business.

Call Us Today
Call us today
(631) 285-1527


Headquarters
760 Koehler Ave, Unit #3
Ronkonkoma, New York 11779

HIPAA Seal of Compliance” width=

HIPAA Seal of Compliance” width=

Latest Blog

Spoiler alert: a business that lacks productivity is unlikely to see any amount of success. One of the best ways to ensure your productivity is to practice patience. How can patience improve your productivity?

TOP