The #1 Way to Breach the Network, According to CISCO

save
Share and earn Cybytes
Facebook Twitter LinkedIn Email

CISCO Report

Research published in Cisco’s 2015 Midyear Security Report reveals that social media exploitation — Facebook scams in particular — has officially taken the crown for the most commonly used method into an organization’s network.

The research found Facebook scams are the #1 web-based attack for cyber criminals seeking to compromise an organization’s systems. Cisco reported roughly 10,000 instances of Facebook scams, 25% more than the next highest attack, JavaScript exploits, and 10x more than traditional email phishing.

Screen Shot 2015-07-29 at 10.01.13 AM

 

Facebook’s 1.49 billion monthly active users make it the world’s largest nation-state, used by 70% of American each day. It is, for better or worse, a nation without borders. Adversaries exploit the social media giant for its sheer size and trusted nature, making it the medium of choice for both inexperienced and sophisticated network hackers alike. For the adversary, the barriers to entry have never been lower, and the targets have never been more trusting and click-happy.

According to Norton, some nearly 40% of people accept unsolicited friend requests, and 4 in 10 users report falling victim to cybercrime on social media. Another report published by McAfee reveals that more employees have experienced cybercrime on social media than on any other business application, including file sharing and email.

Cisco stressed the importance of holistic network security, as many organizations still rely upon proverbial Band-Aids to treat complex, widespread security threats. Cyber criminals are evolving to better manipulate the digital landscape, redefining cybercrime in the process. As the prevalence of Facebook scams continues to grow, security teams must drastically reconsider how social media factors into the security equation.

Facebook isn’t alone in the cybercrime department: Cisco’s publication was closely followed by a report from FireEye, which describes how Twitter was used as the main attack tool to breach government networks. Late last year,Instagram announced a purge of fraudulent accounts, taking a first crack at a growing problem of fake profiles. Other networks including LinkedIn, Pinterest, Google+ and YouTube have begun grappling with fake accounts, phishing campaigns and information theft.

Social media cyber threats are here to stay. The questions is how to handle them.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
Follow
1592 Followers
About ZeroFOX
ZeroFOX, the innovator of social media security, protects modern organizations from the dynamic risks of social media and digital channels. Each day, ZeroFOX’s cloud-based, SaaS platform processes millions of posts and accounts across the social landscape, spanning Facebook, LinkedIn, Twitter, Instagram, Google+, YouTube and more. Using targeted data collection, intelligent analysis and automated remediation, ZeroFOX protects businesses and government agencies around the world against phishing attacks, information loss, account compromise, fraud, compliance violations, and financial loss. Led by a team of information security and high-growth start-up veterans, ZeroFOX has raised over $40M in funding from NEA, Highland Capital and others, and has collected top industry awards such as the SINET16 Champion, DarkReading’s Top Security Startups to Watch, Tech Council of Maryland’s Technology Company of the Year, and the Security Tech Trailblazer of the Year.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel