Jackson Thornton Technologies News + Updates

Jackson Thornton Technologies has been serving the Southeast since 1999, providing IT consulting and managed services, technical helpdesk support, cybersecurity assessments, and business continuity and disaster recovery to small and medium-sized businesses.

While Fun, Those Social Media Quizzes Can be Dangerous

While Fun, Those Social Media Quizzes Can be Dangerous

We’ve all seen our friends and family sharing quizzes on their social media profiles, prompting people to find out what their celebrity stage name or what Hogwarts house you would be in, or to share what their first concert experience was. These fun, lighthearted quizzes are a great way to get to know a little more about the people we’re connected with… and that’s the biggest problem.

Let’s go over how these quizzes can easily obtain the information needed to gain access to a person’s social media profile.

“Your New Last Name is the Name of the High School You Attended!”

The big problem with these quizzes is that, innocent as they may seem, a lot of the questions they ask line up with the security questions that numerous accounts—your bank and credit cards, for instance—will use to confirm your identity when you try to recover your password.

Or, when “you” try to recover your password.

These security systems can’t tell who it is typing in these answers, they can only tell whether or not the provided answer matches the one they have on file. Your bank doesn’t know that you figured out what your superhero name would be and revealed your first pet’s name in doing so. From the bank’s perspective, you just forgot your password, and need to use your recovery questions to reset it.

When you consider these online quizzes and the questions they frequently ask, they line up with the recovery questions that a lot of platforms request when resetting a password. Your first pet’s name, your mother’s maiden name, the model of your first car—all of these questions are commonly used as security measures. So, by sharing the answers to these questions in response to these quizzes, you are potentially giving someone easy access to your accounts.

These Questions are Effectively Phishing on Social Media

Phishing is nothing to take lightly in any of its forms—including that which appears on social media. It is important that you and your team always have an eye out for these attempts in the office and out. Keep an eye out for some of the hallmarks of a phishing attack—misspelled addresses, overly alarmist subject lines, and unprompted attachments—and impress these practices on your employees as well.

Unfortunately, cyberthreats are not confined to either the office or the home, so vigilance is always somewhat necessary. However, Jackson Thornton Technologies is here to help keep an eye on your work processes. Give us a call at (877) 226-9091 to learn more.

Tip of the Week: Why Your Team is Resistant to IT ...
Consider These 4 Ideas for Improved Video Meetings
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Tuesday, 03 December 2024

Captcha Image

Request a Consultation

Jackson Thornton Technologies strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges.

Contact Us
Contact Us

Learn more about what Jackson Thornton Technologies can do for your business.

200 Commerce Street ,
Montgomery, Alabama 36104

Call us: (877) 226-9091

News & Updates
Jackson Thornton Technologies (JTT) is pleased to announce its expansion to a third office located in Auburn, Alabama. This new office will allow JTT to provide additional services in the East Alabama market including cybersecurity reviews, training ...