Many people use some form of social media, such as Facebook, Instagram, or LinkedIn. When using social media platforms, it’s important to be careful about what you post. Cybercriminals can use this information in cyberattacks to try and trick you into clicking malicious links.

Be Careful What You Post

Any information that you post on social media could be used to catch your attention in a spear phishing attack. Spear phishing is when cybercriminals target you specifically. For example, if you post online about your rescue dogs, cybercriminals may send you phishing emails spoofing an animal shelter that’s asking for donations. The email could appear legitimate, but cybercriminals are actually trying to trick you into giving them your payment information.

Keep It Private

Cybercriminals may also try to phish you through a direct message. Some cybercriminals will even use online bot accounts to reply to your posts or message you automatically. Luckily, many social media platforms allow you to have a private account and restrict who can contact you. Be sure to use privacy features to protect your personal information from strangers and cybercriminals.

What Can I Do To Stay Safe?

Follow the tips below to stay safe when using social media:

  • Think before you post. Cybercriminals can use your personal information in spear phishing attacks to make the attacks appear legitimate.
  • Make your social media accounts private. This helps prevent cybercriminals from using your personal information against you.
  • Be cautious before replying to someone you don’t know online. They could be a cybercriminal in disguise.

Meet the Cyber Monsters!

TRUE NORTH FEDERAL CREDIT UNION CYBERSECURITY MONSTERS

Count Hackula
Whether by brute force or the charm of social engineering, Count Hackula is desperate to drain your networks of vital personal identifiable information (PII). Ensure your systems are safe from this monster with secure passwords and employees who know enough to see past Count Hackula’s mesmerizing gaze.

TRUE NORTH FEDERAL CREDIT UNION CYBERSECURITY MONSTERS

Spoofy Steve
Wrapped in ancient layers of digital cloth, Spoofy Steve hides his scammy intentions from all but the most insightful of employees. Use well-honed social-engineering-spotting skills to avoid his tricks as he pretends to be a coworker or supervisor asking for sensitive information.

TRUE NORTH FEDERAL CREDIT UNION CYBERSECURITY MONSTERS

Breachatrix le Phish
This sister of the night has her evil eye set on the most valuable of targets; C-suite and finance managers beware! Breachatrix le Phish will swoop in to cast her spear phishing spells to steal secrets and treasure but can be warded off with a resilient security culture in your organization.

TRUE NORTH FEDERAL CREDIT UNION CYBERSECURITY MONSTERS

Ransomwolf
Lurking in that innocent-looking file attachment you just downloaded, Ransomwolf is ready to gobble up all your important files, bounding from folder to folder through the forest of your network. Unlike other werewolves, Ransomwolf is invulnerable to “silver bullets.” Organizations need both regular backups and a well-trained employee base to keep this monster at bay. Don’t wait until this monster turns into something worse!

TRUE NORTH FEDERAL CREDIT UNION CYBERSECURITY MONSTERS

Frankenphisher
Frankenphisher is stitched together from all the most dangerous pieces of phishing emails; compromised links, malicious attachments, you name it! Before he gets a chance to bust down the door of your network, make sure your people know what makes a phishy email phishy.