• Products
    • LevelBlue (Formerly AT & T)
    • Abnormal Security
    • Airlock Digital
    • Check Point
    • Cisco Systems
    • Forcepoint
    • Imperva
    • Kemp Technologies
    • Malwarebytes
    • Mimecast
    • Pentera
    • Proofpoint
    • Palo Alto Networks
    • SentinelOne
    • Sophos
    • Thales Safenet
    • Delinea
    • Webroot
    • KnowBe4
    • ZScaler
  • Solutions
    • Application Whitelisting
    • Automated Pen Testing
    • Archiving
    • Cloud Access Security CASB
    • Data Loss Prevention
    • DNS Security
    • Email Security
    • Encryption
    • Endpoint Protection
    • Essential 8
    • Load Balancing
    • Mobile / EDR
    • Multi-Factor Authentication
    • Next Generation Firewalls
    • Patch Management
    • Privileged Access Management
    • SD WAN
    • Security Awareness Training
    • Security Incident Event Management SIEM
    • Security Orchestration SOAR
    • Web Application Firewall
    • Web Security Gateway
  • News
  • Resources
  • About Us
  • Products
    • LevelBlue (Formerly AT & T)
    • Abnormal Security
    • Airlock Digital
    • Check Point
    • Cisco Systems
    • Forcepoint
    • Imperva
    • Kemp Technologies
    • Malwarebytes
    • Mimecast
    • Pentera
    • Proofpoint
    • Palo Alto Networks
    • SentinelOne
    • Sophos
    • Thales Safenet
    • Delinea
    • Webroot
    • KnowBe4
    • ZScaler
  • Solutions
    • Application Whitelisting
    • Automated Pen Testing
    • Archiving
    • Cloud Access Security CASB
    • Data Loss Prevention
    • DNS Security
    • Email Security
    • Encryption
    • Endpoint Protection
    • Essential 8
    • Load Balancing
    • Mobile / EDR
    • Multi-Factor Authentication
    • Next Generation Firewalls
    • Patch Management
    • Privileged Access Management
    • SD WAN
    • Security Awareness Training
    • Security Incident Event Management SIEM
    • Security Orchestration SOAR
    • Web Application Firewall
    • Web Security Gateway
  • News
  • Resources
  • About Us
  • Products
    • Akamai
    • Level Blue (Formerly AT & T)
    • Abnormal Security
    • Airlock Digital
    • Check Point
    • Cisco Systems
    • Akamai
    • Level Blue (Formerly AT & T)
    • Abnormal Security
    • Airlock Digital
    • Check Point
    • Cisco Systems
    • Forcepoint
    • Imperva
    • Kemp Technologies
    • Malwarebytes
    • Mimecast
    • Veeam
    • Forcepoint
    • Imperva
    • Kemp Technologies
    • Malwarebytes
    • Mimecast
    • Veeam
    • Pentera (Formerly PCYSYS)
    • Proofpoint
    • Palo Alto Networks
    • SentinelOne
    • Sophos
    • Pentera (Formerly PCYSYS)
    • Proofpoint
    • Palo Alto Networks
    • SentinelOne
    • Sophos
    • Thales Safenet
    • Delinea (Formerly Thycotic)
    • Webroot
    • KnowBe4
    • ZScaler
    • Thales Safenet
    • Delinea (Formerly Thycotic)
    • Webroot
    • KnowBe4
    • ZScaler
  • Solutions and Services

    Solutions and Services

    Network Security

    Endpoint Security

    Cloud Security

    Email & Data Security

    Identity & Access Management

    Security Operations

    Security Awareness

    Essential 8

    Auditing

    Consultation

    • Endpoint Security
      • Endpoint Protection
      • Mobile / EDR (Endpoint Detection and Response)
      • Application Whitelisting
      • Patch Management
    • Cloud Security
      • CASB (Cloud Access Security Broker)
      • SASE (also fits here)
    • Email & Data Security
      • Email Security
      • Encryption
      • Data Loss Prevention (DLP)
      • Archiving
    • Identity & Access Management
      • Multi-Factor Authentication (MFA)
      • Privileged Access Management (PAM)
    • Security Operations
      • Security Information and Event Management (SIEM)
      • Security Orchestration, Automation, and Response (SOAR)
      • Automated Penetration Testing
    • Security Awareness & Best Practices
      • Security Awareness Training
      • Essential 8 (Australian Cyber Security Centre’s framework – covers multiple categories like patching, MFA, etc.)
    • DNS Security
    • Next Generation Firewalls
    • SD-WAN
    • Secure Web Gateway
    • Load Balancing
    • Web Application Firewall (WAF)
    • SASE (Secure Access Service Edge)
    • Endpoint Security
      • Endpoint Protection
      • Mobile / EDR (Endpoint Detection and Response)
      • Application Whitelisting
      • Patch Management
    • Cloud Security
      • CASB (Cloud Access Security Broker)
      • SASE (also fits here)
    • Email & Data Security
      • Email Security
      • Encryption
      • Data Loss Prevention (DLP)
      • Archiving
    • Identity & Access Management
      • Multi-Factor Authentication (MFA)
      • Privileged Access Management (PAM)
    • Security Operations
      • Security Information and Event Management (SIEM)
      • Security Orchestration, Automation, and Response (SOAR)
      • Automated Penetration Testing
    • Security Awareness & Best Practices
      • Security Awareness Training
      • Essential 8 (Australian Cyber Security Centre’s framework – covers multiple categories like patching, MFA, etc.)
    • DNS Security
    • Next Generation Firewalls
    • SD-WAN
    • Secure Web Gateway
    • Load Balancing
    • Web Application Firewall (WAF)
    • SASE (Secure Access Service Edge)

    Business Challenges

    • Next Generation Firewalls
    • Web Application Firewall (WAF)
    • Attack Surface Management
    • Microsegmentation
    • DDOS Protection
    • Load Balancer
    • Application Analytics
    • ZTNA
    • Next Generation Firewalls
    • Web Application Firewall (WAF)
    • Attack Surface Management
    • Microsegmentation
    • DDOS Protection
    • Load Balancer
    • Application Analytics
    • ZTNA
    • Endpoint Protection
    • EDR (Endpoint Detection and Response)
    • XDR
    • Patch Management
    • Application Whitelisting
    • Endpoint Protection
    • EDR (Endpoint Detection and Response)
    • XDR
    • Patch Management
    • Application Whitelisting
    • SASE
    • Cloud Security Posture Management
    • SASE
    • Cloud Security Posture Management
    • Email Security
    • Data Loss Prevention (DLP)
    • Data Security Posture Management (DSPM)
    • Dynamic Data Protection
    • DMARC
    • Hardware Security Module
    • Back-Up
    • Email Security
    • Data Loss Prevention (DLP)
    • Data Security Posture Management (DSPM)
    • Dynamic Data Protection
    • DMARC
    • Hardware Security Module
    • Back-Up
    • Identity Management
    • Identity Management
    • Security Information and Event Management (SIEM)
    • Automated Penetration Testing
    • Security Orchestration, Automation, and Response (SOAR)
    • Security Information and Event Management (SIEM)
    • Automated Penetration Testing
    • Security Orchestration, Automation, and Response (SOAR)
    • Awareness Training
    • Awareness Training
    • Maturity Level One
    • Maturity Level Two
    • Maturity Level Three
    • Maturity Level One
    • Maturity Level Two
    • Maturity Level Three

    Digital Transformation

    Digital Transformation

    Digital Transformation

    Digital Transformation

    Industry Focus

  • Company

    The Sécurité difference for best in class cyber security

    • About Us
    • Why Us
    • About Us
    • Why Us

    Platform Partnership

    • AWS
    • Google Cloud
    • Microsoft
    • Salesforce
  • News
  • Resources
Contact Us
Oct 08

Did you know phishing is still the #1 threat action and is used in social media related attacks?

  • October 8, 2020
  • Jack Drewe
  • No Comments
  • Uncategorized


Many of your users are active on Facebook, LinkedIn, Instagram and Twitter. The bad guys use these platforms to scrape profile information of your users and organisation to create targeted spear phishing campaigns in an attempt to hijack accounts, damage your organization’s reputation, or gain access to your network and run ransomware.
Don’t get hacked by social media phishing attacks

Securite is offering a FREE Social Media Phishing Test (SPT) tool that helps you identify which users in your organisation are vulnerable to these types of phishing attacks that could put your users and organisation at risk.

SPT will give you quick insights into how many users will fall victim so you can take action to train your users and better protect your organization from these social media phishing attacks.

Note: SPT only tracks whether the user clicked on a link or attempted to enter data. SPT does not collect data and will never save any data entered on landing pages.

Contact Securite today for your FREE SPT tool.

  • Facebook
  • Twitter
  • Tumblr
  • Pinterest
  • Google+
  • LinkedIn
  • E-Mail

About The Author

Risk Advisor. CISO

Leave a reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020

Our Partners

  • Products
    • LevelBlue (Formerly AT & T)
    • Abnormal Security
    • Airlock Digital
    • Check Point
    • Cisco Systems
    • Forcepoint
    • Imperva
    • Kemp Technologies
    • Malwarebytes
    • Mimecast
    • Pentera
    • Proofpoint
    • Palo Alto Networks
    • SentinelOne
    • Sophos
    • Thales Safenet
    • Delinea
    • Webroot
    • KnowBe4
    • ZScaler
  • Solutions
    • Application Whitelisting
    • Automated Pen Testing
    • Archiving
    • Cloud Access Security CASB
    • Data Loss Prevention
    • DNS Security
    • Email Security
    • Encryption
    • Endpoint Protection
    • Essential 8
    • Load Balancing
    • Mobile / EDR
    • Multi-Factor Authentication
    • Next Generation Firewalls
    • Patch Management
    • Privileged Access Management
    • SD WAN
    • Security Awareness Training
    • Security Incident Event Management SIEM
    • Security Orchestration SOAR
    • Web Application Firewall
    • Web Security Gateway
  • News
  • Resources
  • About Us

Solutions

  • Akamai
  • Level Blue (Formerly AT & T)
  • Abnormal Security
  • Airlock Digital
  • Check Point
  • Cisco Systems
  • Akamai
  • Level Blue (Formerly AT & T)
  • Abnormal Security
  • Airlock Digital
  • Check Point
  • Cisco Systems
  • Forcepoint
  • Imperva
  • Kemp Technologies
  • Malwarebytes
  • Mimecast
  • Veeam
  • Forcepoint
  • Imperva
  • Kemp Technologies
  • Malwarebytes
  • Mimecast
  • Veeam
  • Akamai
  • Level Blue (Formerly AT & T)
  • Abnormal Security
  • Airlock Digital
  • Check Point
  • Cisco Systems
  • Akamai
  • Level Blue (Formerly AT & T)
  • Abnormal Security
  • Airlock Digital
  • Check Point
  • Cisco Systems
  • Thales Safenet
  • Delinea (Formerly Thycotic)
  • Webroot
  • KnowBe4
  • ZScaler
  • Thales Safenet
  • Delinea (Formerly Thycotic)
  • Webroot
  • KnowBe4
  • ZScaler

Company

  • About Us
  • Why Us
  • About Us
  • Why Us
Schedule Consultation

Seventh Ave, 20th Floor New York, NY 10018 

T: 1-800-356-8933
E: office@tecnologia.com

LinkedIn

Github

Twitter

Facebook

Youtube

© 2025 VamTam. All rights reserved.
  • SASE
  • Cloud Security Posture Management
  • SASE
  • Cloud Security Posture Management