fbpx
Blog

JensenIT Blog

JensenIT has been serving the Illinois area since 1991, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

While Fun, Those Social Media Quizzes Can be Dangerous

While Fun, Those Social Media Quizzes Can be Dangerous

We’ve all seen our friends and family sharing quizzes on their social media profiles, prompting people to find out what their celebrity stage name or what Hogwarts house you would be in, or to share what their first concert experience was. These fun, lighthearted quizzes are a great way to get to know a little more about the people we’re connected with… and that’s the biggest problem.

Let’s go over how these quizzes can easily obtain the information needed to gain access to a person’s social media profile.

“Your New Last Name is the Name of the High School You Attended!”

The big problem with these quizzes is that, innocent as they may seem, a lot of the questions they ask line up with the security questions that numerous accounts—your bank and credit cards, for instance—will use to confirm your identity when you try to recover your password.

Or, when “you” try to recover your password.

These security systems can’t tell who it is typing in these answers, they can only tell whether or not the provided answer matches the one they have on file. Your bank doesn’t know that you figured out what your superhero name would be and revealed your first pet’s name in doing so. From the bank’s perspective, you just forgot your password, and need to use your recovery questions to reset it.

When you consider these online quizzes and the questions they frequently ask, they line up with the recovery questions that a lot of platforms request when resetting a password. Your first pet’s name, your mother’s maiden name, the model of your first car—all of these questions are commonly used as security measures. So, by sharing the answers to these questions in response to these quizzes, you are potentially giving someone easy access to your accounts.

These Questions are Effectively Phishing on Social Media

Phishing is nothing to take lightly in any of its forms—including that which appears on social media. It is important that you and your team always have an eye out for these attempts in the office and out. Keep an eye out for some of the hallmarks of a phishing attack—misspelled addresses, overly alarmist subject lines, and unprompted attachments—and impress these practices on your employees as well.

Unfortunately, cyberthreats are not confined to either the office or the home, so vigilance is always somewhat necessary. However, JensenIT is here to help keep an eye on your work processes. Give us a call at (847) 803-0044 to learn more.

Tip of the Week: Why Your Team is Resistant to IT ...
Consider These 4 Ideas for Improved Video Meetings
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Tuesday, November 12, 2024

Captcha Image

Customer Login


Latest Blog

There’s no getting around the fact that data backup and disaster recovery are paramount to the survival of any business. Thankfully, the 3-2-1 rule makes implementing effective data recovery practices easy. Let’s look at this process and how you can do so.

Contact Us

Learn more about what JensenIT can do for your business.

JensenIT
1689 Elk Blvd
Des Plaines, Illinois 60016

Sign up for our Newsletter!

Hey! Before you go, subscribe to our newsletter for IT tech tips and advice!