Back
Cyber Security Training & Software for Companies | MetaCompliance

Products

Discover our suite of personalised Security Awareness Training solutions, designed to empower and educate your team against modern cyber threats. From policy management to phishing simulations, our platform equips your workforce with the knowledge and skills needed to safeguard your organisation.

Cyber Security eLearning

Cyber Security eLearning to Explore our Award-Winning eLearning Library, Tailored for Every Department

Security Awareness Automation

Schedule Your Annual Awareness Campaign In A Few Clicks

Phishing Simulation

Stop Phishing Attacks In Their Tracks With Award-Winning Phishing Software

Policy Management

Centralise Your Policies In One Place And Effortlessly Manage Policy Lifecycles

Privacy Management

Control, Monitor, and Manage Compliance with Ease

Incident Management

Take Control Of Internal Incidents And Remediate What Matters

Back
Industry

Industries

Explore the versatility of our solutions across diverse industries. From the dynamic tech sector to healthcare, delve into how our solutions are making waves across multiple sectors. 


Financial Services

Creating A First Line Of Defence For Financial Service Organisations

Governments

A Go-To Security Awareness Solution For Governments

Enterprises

A Security Awareness Training Solution For Large Enterprises

Remote Workers

Embed A Culture Of Security Awareness - Even At Home

Education Sector

Engaging Security Awareness Training For The Education Sector

Healthcare Workers

See Our Tailored Security Awareness For Healthcare Workers

Tech Industry

Transforming Security Awareness Training In The Tech Industry

NIS2 Compliance

Support Your Nis2 Compliance Requirements With Cyber Security Awareness Initiatives

Back
Resources

Resources

From posters and policies to ultimate guides and case studies, our free awareness assets can be used to help improve cyber security awareness within your organisation.

Cyber Security Awareness For Dummies

An Indispensable Resource For Creating A Culture Of Cyber Awareness

Dummies Guide To Cyber Security Elearning

The Ultimate Guide To Implementing Effective Cyber Security Elearning

Ultimate Guide To Phishing

Educate Employees About How To Detect And Prevent Phishing Attacks

Free Awareness Posters

Download These Complimentary Posters To Enhance Employee Vigilance

Anti Phishing Policy

Create A Security-Conscious Culture And Promote Awareness Of Cyber Security Threats

Case Studies

Hear How We’re Helping Our Customers Drive Positive Behaviour In Their Organisations

A-Z Cyber Security Terminology

A Glossary Of Must-Know Cyber Security Terms

Cyber Security Behavioural Maturity Model

Audit Your Awareness Training And Benchmark Your Organisation Against Best Practice

Free Stuff

Download Our Free Awareness Assets To Improve Cyber Security Awareness In Your Organisation

Back
MetaCompliance | Cyber Security Training & Software for Employees

About

With 18+ years of experience in the Cyber Security and Compliance market, MetaCompliance provides an innovative solution for staff information security awareness and incident management automation. The MetaCompliance platform was created to meet customer needs for a single, comprehensive solution to manage the people risks surrounding Cyber Security, Data Protection and Compliance.

Why Choose Us

Learn Why Metacompliance Is The Trusted Partner For Security Awareness Training

Employee Engagement Specialists

We Make It Easier To Engage Employees And Create a Culture of Cyber Awareness

Security Awareness Automation

Easily Automate Security Awareness Training, Phishing And Policies In Minutes

MetaBlog

Stay informed about cyber awareness training topics and mitigate risk in your organisation.

Enhancing Employee Awareness: Top 5 Social Media Scams and Avoidance Tactics

Top 5 Social Media Scams and How Employees Can Dodge Them

about the author

Share this post

The proliferation of social media scams has reshaped our lives and interconnected the world in unprecedented ways. With over 3.725 billion active social media users globally, the continuous emergence of new platforms caters to our relentless desire to connect and share. Understanding how to avoid social media scams is now paramount in navigating these expansive digital landscapes.

Despite all the benefits that this interconnectivity brings, the massive growth in social media has led to a huge upsurge in social media scams. Cybercriminals are constantly finding new ways to exploit these platforms to defraud and scam as many people as they can.

Social media-enabled crimes are generating revenues of at least $3.25bn for the global cybercrime economy annually, and according to a recent report from Bromium, 1 in 8 organisations have experienced a security breach as a result of a social media-directed cyber attack.

Social media scammers are evolving their techniques all the time to trick victims into divulging their sensitive information. The consequences of social media scams can include financial loss, identity theft, reputation damage, and compromised personal and sensitive information. To increase awareness of these types of attacks, check out these top 5 social media scams to be aware of.

Top 5 Social Media Scams

Catfishing Social Media Scam

Catfishing Social Media Scam

Finding love in the digital age has never been easier with the multitude of social media sites and online dating apps. Fraudsters have been quick to take advantage of this online quest for love by launching a range of different scams to con people out of money.

‘Catfishing’ is the act of creating a false identity online in the hope of luring someone into a romantic relationship. Typically, the catfish will create a fake profile using someone else’s photo and personal details. Once they have established their victim’s trust, they’ll start to talk about financial hardships and the inevitable requests for money will begin. Red flags that you’re dealing with a fraudster include getting personal too fast, avoiding detailed questions, a generic profile, fake photos, a request for money or refusing to meet in person.

Social Media Quiz Scams

Facebook and Twitter are awash with quizzes like ‘Who’s your celebrity soulmate?’, ‘What does your star sign say about you?’ or ‘What city are you meant to live in?’. They may seem like a bit of harmless fun, but fraudsters will often use these catchy titles as a way of stealing your data or infecting your device with malware. The answers you provide to seemingly innocent questions such as ‘What city were you born in?’ or ‘What’s your pet’s name?’, are often answers to common security questions used to secure accounts. Once hackers have access to this valuable information, they can attempt to compromise your online identity.

Even if the quiz is legitimate, you will usually have to agree to the site’s terms and conditions which often grant third-party access to your social media profiles, contact lists and other information that can be used in targeted ads. You should avoid taking any of these short quizzes on social media and be highly sceptical if you’re asked to provide any personal information.

Hidden URL Social Media Scams

Hidden URL Social Media Scams

Shortened URLs are frequently used on sites like Twitter where you are limited in space. Cybercriminals will often use these shortened URLs as a way of disguising phishing links and malicious websites. By hiding the true URL, users are unable to check the validity of the link and could be directed to a site that infects their device with malware.

It’s proved a very effective way to scam people, but fortunately, there are a few ways you can check if a link is malicious without having to actually click on it. You can copy and paste a link on to sites like ExpandURL or Google Safe Browsing, where they will verify if the link is legitimate and free from malware. They will also provide you with information on the title, description and keywords on the webpage, and let you know if the site’s safe to visit.

Profile Hijacking Social Media Scam

Profile hijacking happens when a fraudster takes over a social media account to use it for their own devious means. There are a couple of variations of these types of scams. A near-identical account may be set up using an individual’s photo, personal details and location. The idea is to trick other users into thinking they are a trustworthy source, then attempt to befriend them and spread malicious links.

Alternatively, hackers may break into an existing profile and change the password to scam friends and contacts. Often, one of the first signs that your account has been hacked is when a friend notifies you that they’ve received a strange message from you with a dubious link. In the event of this happening, you should contact your social media platform to request a password reset and follow their advice on what steps to take next.

Risks of Third-Party Apps in Social Media Scams

You may think that you have all your social media accounts secured, but all it takes is for you to hook up to one dodgy app and your accounts could be compromised. Permissions are used by apps to access specific functions and data within your device. Before granting access to any app, you should check out its privacy policy to find out how it intends to use your data. Unless you pay close attention to these details, you could potentially grant a malicious app permission to integrate with your social media profiles, giving hackers direct access to your online accounts.

How to Avoid Social Media Scams

How to Avoid Social Media Scams
  • Don’t click on suspicious links – Be wary of any posts or messages that ask you to click on a link. Even if you know the person, pay close attention to the language and tone of the message. If something seems even the slightest bit off, ignore and delete the message.
  • Provide limited information – The amount of personal information you have to provide on social media profiles is optional, so avoid sharing sensitive information such as your home address and phone number.
  • Don’t accept friend requests from strangers – If you accept a friend request from someone you’re not familiar with, they can access all the personal details on your profile, your contact lists, and build a detailed picture of your online social activity.
  • Do your research – Check the person is genuine by looking up their name, profile picture or any other information they’ve provided you with. If you suspect the photo is fake, you can do a reverse image search using Tin Eye or Google’s Reverse image search. These search engines will show where the photo originated from and where it’s been used.
  • Use strong and unique passwords –Using the same password across multiple accounts greatly increases your chance of being hacked. You should use a unique password for each social media account and make it as strong and secure as possible. For extra security, you can use a password manager which will provide a centralised and encrypted location that will keep a record of all your passwords safe.
  • Use enhanced privacy settings – Regularly check and adjust your privacy settings to restrict what people can and can’t see on your profile. You should also restrict permissions for apps to access your personal information.
  • Enable Two-Factor Authentication – Most social media sites offer Two-Factor Authentication (2FA). This provides an extra layer of security to your online accounts and means that even if someone steals or guesses your password, they won’t be able to access your account without a second authenticating factor.
  • Install anti-virus software – The installation of anti-virus software will help detect threats on your computer and block unauthorised users from gaining access.
  • Keep operating systems up to date – It’s important to ensure that your software is regularly updated to prevent hackers from gaining access to your device through vulnerabilities in older and outdated systems.
  • Don’t use public Wi-Fi to log in to social media sites – These open networks often have unencrypted connections and are vulnerable to being hacked.

Safeguarding Your Employees Against Social Media Scams

Our MetaPhish phishing simulation software, , provides a powerful defence against phishing and ransomware attacks by training employees on how to identify and respond appropriately to these threats. Get in touch for further information on how we can help protect your business.

Security Awareness Training for Third-Party Vendor

Other Articles on Cyber Security Awareness Training You Might Find Interesting

duckduckgo vs google EN

DuckDuckGo vs Google – 5 reasons why you should give up using Google!

You were not aware that DuckDuckGo is a search engine? Well, now you know. Since its founding in 2008, DuckDuckGo has made it its mission to develop a search engine that does not store or share personal data, quite unlike Google. Google’s business model is based less on data protection and more on personalised advertising. Without the storage of personal data, Google would virtually lose the air it breathes. However, Google is still the most used search engine, and there are reasons for that. Google does have one weakness, however, and that is data protection.
Read More »
dataprotection vs informationsecurity EN

Information Security vs Data Protection

Is this an issue for our ISO or our DPO, or is it much the same in either case? Who exactly is responsible for this incident, and is there a need to report it at all? In order to discuss the similarities and differences between information security and data protection, the first step is to define the two areas.
Read More »