{"id":8134,"date":"2020-06-04T08:36:14","date_gmt":"2020-06-04T08:36:14","guid":{"rendered":"https:\/\/www.experfy.com\/blog\/?p=8134"},"modified":"2023-12-08T10:45:46","modified_gmt":"2023-12-08T10:45:46","slug":"4-examples-of-social-media-scams-and-8-tips-to-stay-safe","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/future-of-work\/4-examples-of-social-media-scams-and-8-tips-to-stay-safe\/","title":{"rendered":"4 Examples of Social Media Scams and 8 Tips to Stay Safe"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8134\" class=\"elementor elementor-8134\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-ce65ca1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ce65ca1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-38e6c53\" data-id=\"38e6c53\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61a37f7 elementor-widget elementor-widget-heading\" data-id=\"61a37f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\n<h2 class=\"wp-block-heading\"><em><strong>We\u2019ll share four examples of common social media scams \u2014 what they are, how they work, and what you can do (and look out for) to stay safe on social media<\/strong><\/em><\/h2>\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57f95f8 elementor-widget elementor-widget-text-editor\" data-id=\"57f95f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p><em>Congratulations! You\u2019re the latest winner of the Florida Lottery\u2026<\/em><\/p>\n\n\n\n<p><em>Are you lonely? So am I. I\u2019m a lonely and hot high school cheerleader, and I think we should get to know each other\u2026<\/em><\/p>\n\n\n\n<p><em>Hello. I\u2019m a tourist that\u2019s been traveling in Italy and I\u2019ve been detained due to the Coronavirus. I need your help! Please send money ASAP\u2026<\/em><\/p>\n\n\n\n<p>What do all of these types of messages have in common? They\u2019re all examples of social media scams. Cybercriminals use messages like these to trick victims into clicking on links, sending personal information, and sending money.<\/p>\n\n\n\n<p>But what do social media scams really entail and how do you recognize them for what they are? We\u2019ll explore these questions and will share several tips for how to stay safe on your favorite social platforms.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f65aab elementor-widget elementor-widget-heading\" data-id=\"6f65aab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\n<h2 class=\"wp-block-heading\">What Are Social Media Scams?<\/h2>\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-562142d elementor-widget elementor-widget-text-editor\" data-id=\"562142d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>According to the FBI\u2019s <a href=\"https:\/\/pdf.ic3.gov\/2019_IC3Report.pdf\" class=\"broken_link\" rel=\"noopener\">Internet Crime Complaint Center<\/a> (IC<sup>3<\/sup>), a social media threat is a threat in which the use of social networking and social media platforms are used as a fraud vector. It specifies that social media, by their definition, doesn\u2019t include dating sites, although some sites lump those into their definitions.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>But what makes these types of scams so effective? Although, in many cases, cybercriminals are recycling old scams, they\u2019re finding new ways to make them effective again by changing up tactics and approaches. Instead of relying on the old and obvious Nigerian Prince scam, they might instead pretend to be your bank or an <a href=\"https:\/\/www.newsweek.com\/military-members-photos-social-media-being-used-cybercriminals-romance-scams-1459952\" rel=\"noopener\">attractive military member<\/a> who\u2019s looking for a little companionship.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-04a2d07 elementor-widget elementor-widget-heading\" data-id=\"04a2d07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading {\"level\":3} -->\n<h3>What Makes These Scams So Darned Effective<\/h3>\n<!-- \/wp:heading -->\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e38a976 elementor-widget elementor-widget-text-editor\" data-id=\"e38a976\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<!-- wp:paragraph -->\n<p>According to <a href=\"https:\/\/www.consumersinternational.org\/media\/293343\/social-media-scams-final-245.pdf\" class=\"broken_link\" rel=\"noopener\">Consumers International<\/a>, social media gives criminals the ability to target you more effectively by providing:<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:quote -->\n<blockquote class=\"wp-block-quote\">\n<p>&#8220;<em>[\u2026] access to vast amounts of personal data, which can then be used to target specific demographic groups and personalise scams to make them more convincing. For example, using a person\u2019s real name, or making reference to their hometown, recent holiday, hobbies and friends.\u201d<\/em><\/p>\n<\/blockquote>\n<!-- \/wp:quote -->\n\n<!-- wp:paragraph -->\n<p>So, basically, they use the information you provide in your social media profiles to trick you into thinking they somehow know you or have a connection with you.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7cf2833 elementor-widget elementor-widget-text-editor\" data-id=\"7cf2833\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Cybercriminals are able to operate anonymously in a way that they couldn\u2019t in a face-to-face conversation. And people are more likely to let their guard down online than in person. After all, if a random stranger walked up to you and started asking for your personal information, it would set off alarms in your head. But if someone who appears to be a friend or a trusted authority reaches out online, you\u2019re more likely to cooperate.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>So, what are five of the most common social media scams? Let\u2019s explore a few examples:<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b196b42 elementor-widget elementor-widget-heading\" data-id=\"b196b42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading {\"level\":3} -->\n<h3>Social Media Scam #1: Romance Fraud and Relationship Scams<\/h3>\n<!-- \/wp:heading --><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a62c079 elementor-widget elementor-widget-text-editor\" data-id=\"a62c079\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>They\u2019re attractive, eager, and interested in you \u2014 and they\u2019re ready to slide into your DMs.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Romance scams, or relationship fraud, are a type of fraud that involves cybercriminals pretending to be romantically interested in you. These predators pretend to be interested in their targets and woo them to get them to lower their guard. These types of scams often target people who are lonely \u2014 senior citizens, people who are widowed, etc.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>However, romance fraud scams are a type of relationship scam \u2014 a category that also includes people pretending to be family members and friends who are in trouble.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Online dating apps and social media play a big role in how these cybercriminals choose and target victims.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa85477 elementor-widget elementor-widget-heading\" data-id=\"aa85477\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading {\"level\":3} -->\n<h3>How Relationship Social Media Scams Work<\/h3>\n<!-- \/wp:heading --><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-229e0a5 elementor-widget elementor-widget-text-editor\" data-id=\"229e0a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>In these types of scams, which could take place over a few days or even months, con artists will create phony profiles using photos of real people. They\u2019re use these profiles to strike up conversations and relationships with their targets to help build trust \u2014 which they can then take advantage of.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Ultimately, the goal is to get the victims to send them money, buy things, or to serve as product or money mules. In fact, <a href=\"https:\/\/sectigostore.com\/blog\/social-media-scams-29-disturbing-statistics\/\" rel=\"noopener\">up to 30% of romance scam victims were used as money mules<\/a> in 2018, according to the <a href=\"https:\/\/www.bbb.org\/central-georgia\/news-events\/news-releases\/2019\/02\/better-business-bureau-follow-up-study-shows-how-romance-scams-often-lead-to-further-fraud-for-victims\/\" class=\"broken_link\" rel=\"noopener\">Better Business Bureau (BBB)<\/a>.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Here\u2019s an example of a of a romance or relationship fraud scam that\u2019s been shared by ScamWatch Australia:<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e556c6 elementor-widget elementor-widget-text-editor\" data-id=\"3e556c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>As you can see from the breakdown of this dating platform message, there are specific types of tactics that these con artists use to try to hook their targets:<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul>\n<li>They make it clear that they have interest in the target and want to connect with them.<\/li>\n<li>They write the messages so that they sound personable (even if they\u2019re not particularly well written) by sharing a little bit of their story, though it\u2019s likely fake.<\/li>\n<li>They contactor makes it clear that distance is not an obstacle.<\/li>\n<\/ul>\n<!-- \/wp:list -->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f42cd02 elementor-widget elementor-widget-text-editor\" data-id=\"f42cd02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<!-- wp:paragraph -->\n<p>Often times, scammers will pretend to be members of the military, missionaries, or medical providers who are overseas working with international organizations. Of course, there are countless other scenarios they could use as well\u2026\u00a0<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Regardless of which scenario or tactic they use, these scams wind up being costly issues for their targets. The FBI Internet Crime Complaint Center (IC<sup>3<\/sup>)\u2019s <a href=\"https:\/\/pdf.ic3.gov\/2019_IC3Report.pdf\" class=\"broken_link\" rel=\"noopener\">2019 Internet Crime Report<\/a> indicates that in 2019 alone, there were 19,473 reported victims of confidence fraud and romance scams with reported losses of $475,014,032 in reported losses. Just to provide a little perspective, that\u2019s an average loss of $24,393.47 per person!<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dd663a elementor-widget elementor-widget-heading\" data-id=\"1dd663a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading {\"level\":3} -->\n<h3>Social Media Scam #2: Free Money Scams<\/h3>\n<!-- \/wp:heading --><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e330a95 elementor-widget elementor-widget-text-editor\" data-id=\"e330a95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Everyone wants free money, but at what cost?<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The truth is that no one gives away money for free \u2014 there\u2019s always a catch. Cybercriminals prey on users with fake promises of money \u2014 free tuition, grants, lotto winnings, sweepstakes, and loans that don\u2019t have to be repaid, etc. The goal is to get victims to provide information or to send money themselves with the promise of a larger payout in the end.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>For example, a cybercriminal could say that you\u2019ve won $25,000 dollars, but for them to transfer the funds to your account, you first need to send them $1,000 from your account to prove that your account is valid or to cover transfer-related fees. If you send them the money, as soon as the funds hit their account, it\u2019s gone, and you\u2019ll likely never hear from them again. Or, if you do, it\u2019s only to get you to send additional money (with excuses for why they haven\u2019t yet sent you money and why you need to send them more). \u00a0<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2aa7ac4 elementor-widget elementor-widget-heading\" data-id=\"2aa7ac4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading {\"level\":3} -->\n<h3>How Free Money Social Media Scams Work<\/h3>\n<!-- \/wp:heading --><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79135f6 elementor-widget elementor-widget-text-editor\" data-id=\"79135f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<!-- wp:paragraph -->\n<p>Let\u2019s take a look at one of these financial social media scams in action. Here is a series of three screenshots of a scam attempt that one of my colleagues experienced via Facebook Messenger:<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf8d09d elementor-widget elementor-widget-text-editor\" data-id=\"bf8d09d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>As you can see, this scam starts out with the cybercriminal reaching out to their intended victim via social media. They\u2019re friendly, helpful, and show that they \u201ccare\u201d about my colleague by being concerned about his financial wellbeing. Then, they try to drive him to engage with them through other means (in this case, a phone call) before their social account gets reported or shut down by Facebook. (<strong>Note:<\/strong> The profile shows no photo because it was shut down; originally, it used the name and photo of one of my colleague\u2019s actual friends.)<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>It\u2019s a very simple tactic and, unfortunately, one that works well enough on some people that they continue doing it to try to scam many potential victims.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41edcf0 elementor-widget elementor-widget-heading\" data-id=\"41edcf0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3>Social Media Scam #3: Phishing Scams<\/h3>\n<!-- \/wp:heading --><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7c5545 elementor-widget elementor-widget-text-editor\" data-id=\"d7c5545\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<!-- wp:paragraph -->\n<p>Ah, yes. No list of social media scams would be complete without talking about phishing. Phishing occurs when someone tries to use <a href=\"https:\/\/www.thesslstore.com\/blog\/social-engineering-attacks-a-look-at-social-engineering-examples-in-action\/\" rel=\"noopener\">social engineering tactics and techniques<\/a> to get a target to provide personal or financial information, or to get them to do something they shouldn\u2019t. Although <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-phishing-email-5-examples-of-phishing-emails-and-how-to-avoid-them\/\" rel=\"noopener\">phishing typically occurs via email<\/a>, there are other ways criminals go about carrying out their attacks (such as by using phone calls [<a href=\"https:\/\/www.thesslstore.com\/blog\/what-is-vishing-how-to-recognize-voice-phishing-phone-calls\/\" rel=\"noopener\">vishing<\/a>] or SMS text messages [smishing]).<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>So, this means that social media phishing is the same as regular <a href=\"https:\/\/sectigostore.com\/blog\/common-types-of-phishing-attacks-how-to-recognize-avoid-them\/\" rel=\"noopener\">phishing attacks<\/a> \u2014 it\u2019s just that they use social media platforms and messenger programs to do it. In some cases, the threat actor will try to get you to connect with them so they can learn more about you by having greater access to your profile information that may otherwise be private.<\/p>\n<!-- \/wp:paragraph -->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-024ccab elementor-widget elementor-widget-text-editor\" data-id=\"024ccab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>It\u2019s important to note that even big organizations fall for these types of scams. Here\u2019s a horrifying example of what happens when a <a href=\"https:\/\/www.washingtonpost.com\/news\/worldviews\/wp\/2013\/04\/23\/syrian-hackers-claim-ap-hack-that-tipped-stock-market-by-136-billion-is-it-terrorism\/?arc404=true\" class=\"broken_link\" rel=\"noopener\">cybercriminal successfully took over the Associated Press\u2019s Twitter account<\/a> via phishing:<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c20a89 elementor-widget elementor-widget-heading\" data-id=\"1c20a89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading {\"level\":3} -->\n<h3>How Social Media Phishing Scams Work<\/h3>\n<!-- \/wp:heading --><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ee795d elementor-widget elementor-widget-text-editor\" data-id=\"1ee795d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>One example of a common type of phishing scam is the \u201cIs This You?!\u201d method. Imagine that you\u2019re scrolling through your feed on Facebook when, suddenly, you receive a Facebook messenger message. It\u2019s from someone whose thumbnail picture you don\u2019t recognize, and they\u2019re saying that they\u2019ve found a cute\/sexy\/inappropriate photo of you. The message contains a link to an unknown website that\u2019s concealed by a URL shortener. What should you do?<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>As tempting as it may be, don\u2019t click on the link. It\u2019s a common tactic for cybercriminals to try to get users to visit phishing or malicious websites.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Cybercriminals use social media phishing to spur you to share information or fill out forms that will provide them with information they can use to gain access to your:<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02ff020 elementor-widget elementor-widget-text-editor\" data-id=\"02ff020\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:list -->\n<ul>\n<li>Personal and\/or professional email account(s)<\/li>\n<li>Work account-related credentials<\/li>\n<li>Banking or financial institution(s)<\/li>\n<li>Other types of personal or business-related accounts<\/li>\n<\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p>The way that they get people to provide this type of information is by playing on their emotions or by creating a sense of intrigue or curiosity that drives users to engage with them. They might reach out to you with a message that they think will be of interest to get you to engage \u2013 such as messaging you about a cause that you think is important.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Here\u2019s an example of a user who tried to connect with me on LinkedIn before their profile was quickly removed by the platform:<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f76bc6 elementor-widget elementor-widget-text-editor\" data-id=\"2f76bc6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Ultimately, they want you to click on malicious websites that have credential-stealing forms or auto-install malware. And by engaging with these social media scams, you lose.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce073d3 elementor-widget elementor-widget-heading\" data-id=\"ce073d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading {\"level\":3} -->\n<h3>Social Media Scam #4: Impersonation Scams and Identity Theft<\/h3>\n<!-- \/wp:heading --><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b51c07b elementor-widget elementor-widget-text-editor\" data-id=\"b51c07b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Identity theft is a growing issue in general. As of 2016, the latest year of reporting for the <a href=\"https:\/\/www.bjs.gov\/index.cfm?ty=pbdetail&amp;iid=6467\" rel=\"noopener\">National Crime Victimization Survey (NCVS)<\/a>, 10% of individuals age 16 or older indicated that they were the victims of identity theft within the 12 months prior.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>According to the <a href=\"https:\/\/www.bjs.gov\/index.cfm?ty=tp&amp;tid=42\" rel=\"noopener\">U.S. Bureau of Justice Statistics<\/a>, the NCVS defines identity theft as an incident that includes three categories of incidents:<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul>\n<li>\u201cUnauthorized use or attempted use of an existing account<\/li>\n<li>Unauthorized use or attempted use of personal information to open a new account.<\/li>\n<li>Misuse of personal information for a fraudulent purpose.\u201d<\/li>\n<\/ul>\n<!-- \/wp:list -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db82f93 elementor-widget elementor-widget-text-editor\" data-id=\"db82f93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>On social media, impersonations and duplicate accounts are a serious issue. In its <a href=\"https:\/\/investor.fb.com\/financials\/default.aspx\" class=\"broken_link\" rel=\"noopener\">annual report to the SEC<\/a>, Facebook reported having 275 million duplicate accounts in 2019. Even considering that the company reports having roughly 2.5 billion monthly active users (MAUs), that\u2019s still an exceedingly larger number \u2014 roughly 11% of their monthly active users!<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff23fef elementor-widget elementor-widget-heading\" data-id=\"ff23fef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3>How Social Media Impersonation Scams Work<\/h3>\n<!-- \/wp:heading --><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-1f42087 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1f42087\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b4c0001\" data-id=\"b4c0001\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0797427 elementor-widget elementor-widget-text-editor\" data-id=\"0797427\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Impersonation social media scams often involve a cybercriminal creating a duplicate account that appears to be coming from a friend or family member. The goal is to gain your trust and get you to add them to your friends list. Sometimes, they\u2019ll even create fake social media accounts using real photos of other people they\u2019ve found online to target random people.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>So, how do you know what a valid account looks like for companies?<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Here\u2019s what an authenticated or validated Twitter account looks like (note the checkmark next to the name):<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f160e58 elementor-widget elementor-widget-heading\" data-id=\"f160e58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading {\"level\":3} -->\n<h3>How to Identify Social Media Scams and Fake Profiles<\/h3>\n<!-- \/wp:heading --><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14cc51c elementor-widget elementor-widget-text-editor\" data-id=\"14cc51c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Wondering what steps you can take to stay safe while using Facebook, Twitter, Instagram and all of your other favorite social media platforms? Ask yourself several critical questions to ascertain the legitimacy of a profile:<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul>\n<li><strong>How old is the account in question?<\/strong> Social media scammers frequently create new or duplicate accounts to try to target potential victims. Most social media platforms show when accounts were initially created, which helps you to more easily identify whether it\u2019s a new or an established account.<\/li>\n<li><strong>How many accounts is the account in question following?<\/strong> For example, Twitter has specific limits when it comes to the number of followers any given account can have or add within a specific period: \u00a0<\/li>\n<\/ul>\n<!-- \/wp:list -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9dde8ef elementor-widget elementor-widget-text-editor\" data-id=\"9dde8ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>If it\u2019s a new account that\u2019s following hundreds or even thousands of people right away, chances are that it\u2019s not legitimate.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul>\n<li><strong>If the person appears to be a friend or family member, is it a new or duplicate account?<\/strong> One of the most annoying things I continually see is fake and duplicate accounts being created of people I know. On Facebook, for example, I\u2019ve received multiple friend requests from people who appear to be friends or family members and want me to add them to my list of connected friends. The issue? I\u2019m already friends with them on FB. So, when my \u201ccousin\u201d has a newly created account that\u2019s trying to connect with me, I know can look over the profile and easily determine whether it\u2019s legitimate or fake.<\/li>\n<li><strong>How frequently is the individual posting or tweeting, and are they posting anything of substance?<\/strong> This is a good indicator of whether a site is legitimate. A real person may post or share a few posts a day. But if they\u2019re posting dozens \u2014 and if those posts often don\u2019t make sense \u2014 then it should raise a red flag that either it\u2019s a scammer or a bot.<\/li>\n<li><strong>Are they asking you to do something right away? <\/strong>Here\u2019s another major red flag.Okay, let\u2019s say that you\u2019ve engaged in a conversation with a suspect individual. If they\u2019re asking you to do something for them right away, or they\u2019re trying to drive you to engage with them via phone or email, you can pretty much assume that it\u2019s the start of one of the social media scams we\u2019ve been talking about.<\/li>\n<\/ul>\n<!-- \/wp:list -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-767d29f elementor-widget elementor-widget-heading\" data-id=\"767d29f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>8 Tips for How to Stay Safe &amp; Avoid Social Media Scams<\/h2>\n<!-- \/wp:heading --><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-231b28f elementor-widget elementor-widget-text-editor\" data-id=\"231b28f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This brings us to our final point: What are some of the things you can do to avoid falling for social media scams?<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85ae5e0 elementor-widget elementor-widget-heading\" data-id=\"85ae5e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading {\"level\":3} -->\n<h3>1. Set Your Profiles and Accounts to Private<\/h3>\n<!-- \/wp:heading --><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40206c9 elementor-widget elementor-widget-text-editor\" data-id=\"40206c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>One of the best ways to avoid being targeted by social media scams is to keep as much of your information private as possible. Don\u2019t give other apps permission to access your profile information or contacts list. Avoid oversharing on your page \u2014 just because there\u2019s a field requesting info doesn\u2019t mean you have to fill it out.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Essentially, don\u2019t provide scammers with information about you that they could use as fodder to convince you that they know or are interested in you.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebe5cc3 elementor-widget elementor-widget-heading\" data-id=\"ebe5cc3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading {\"level\":3} -->\n<h3>2. Reject Unsolicited Friend Requests<\/h3>\n<!-- \/wp:heading --><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbce34c elementor-widget elementor-widget-text-editor\" data-id=\"cbce34c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>For starters, don\u2019t accept any friend requests from people you don\u2019t know. This is kind of like parents teaching their kids to not talk to strangers. If you receive a request from someone that you\u2019ve never heard of, why would you want to connect with them (and, more importantly, what is motivating them to want to connect with you)?<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>While it\u2019s likely true that you\u2019re a pretty amazing person, don\u2019t allow your ego to make you vulnerable. Question their motives. The security of your account \u2014 and the people you\u2019re connected with on your account \u2014 could be affected by you making the wrong decision.<\/p>\n<!-- \/wp:paragraph -->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e32405 elementor-widget elementor-widget-heading\" data-id=\"1e32405\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading {\"level\":3} -->\n<h3>3. Be Suspicious of Friend Requests from Existing Contacts<\/h3>\n<!-- \/wp:heading --><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-677f685 elementor-widget elementor-widget-text-editor\" data-id=\"677f685\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Just like it\u2019s important to be wary of friend requests from unknown people, you should also be equally as suspicious of friend requests from people you\u2019re already connected with on the platform. If someone you know already has an active profile and, suddenly, you get a request from \u201cthem\u201d to add you to another account, you can just about bet money that the new request is from a fake\/scam profile.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc5bd78 elementor-widget elementor-widget-heading\" data-id=\"bc5bd78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3>4. Avoid Engaging with Games, Quizzes, and Survey Scams via Social Media<\/h3>\n<!-- \/wp:heading -->\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c95c5f elementor-widget elementor-widget-text-editor\" data-id=\"0c95c5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>A lot of the time, online quizzes, polls, and games link to phishing and other malicious websites. It\u2019s best to not engage with these types of posts and links as a general rule. Simply keep scrolling past those kinds of posts in your social feed without engaging in them or close out of the browser window.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b93bdb elementor-widget elementor-widget-heading\" data-id=\"8b93bdb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading {\"level\":3} -->\n<h3>5. Don\u2019t Send Money or Information<\/h3>\n<!-- \/wp:heading --><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2f710c elementor-widget elementor-widget-text-editor\" data-id=\"e2f710c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>No responsible or reputable person is going to ask you for money or gift cards \u2014 especially not your bank or the IRS. They also won\u2019t ask you for your login credentials or other related account information. So, if you receive such a request (or a demand), beware! And, when in doubt, reach out to the company, organization, or government institution directly using official contact information.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c25b40 elementor-widget elementor-widget-heading\" data-id=\"6c25b40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading {\"level\":3} -->\n<h3>6. Never Click on Unsolicited Links in Private Messages, Posts and Ads<\/h3>\n<!-- \/wp:heading --><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c89c63 elementor-widget elementor-widget-text-editor\" data-id=\"0c89c63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Cybercriminals are always looking for ways to drive users to click on malicious links. This can include creating teaser text in posts that seem scandalous, shocking, or intriguing. If you receive such unexpected private messages from people that contains a link to a shady or unknown website (particularly ones that are shortened using URL shorteners such as Bit.ly), run the other way.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce4380d elementor-widget elementor-widget-heading\" data-id=\"ce4380d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading {\"level\":3} -->\n<h3>7. Don\u2019t Respond to Online Ads for Earning Easy Money<\/h3>\n<!-- \/wp:heading --><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f9cbf7 elementor-widget elementor-widget-text-editor\" data-id=\"7f9cbf7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Like we said before, there\u2019s no such thing as free money. Well, the same can be said about earning a lot of money for doing very little. You can\u2019t realistically expect to earn four or five figures per month doing nothing. These \u201ceasy money\u201d scams promise you the world and offer nothing but headaches, frustration, and loss in return.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-266b0f2 elementor-widget elementor-widget-heading\" data-id=\"266b0f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading {\"level\":3} -->\n<h3>8. Do Your Research<\/h3>\n<!-- \/wp:heading -->\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-522ce41 elementor-widget elementor-widget-text-editor\" data-id=\"522ce41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>As the adage goes: If it sounds too good to be true, it probably is. So, before making a purchase via social ads or providing a company with any of your personal or financial information, be sure to carefully research the company. Learn more about them and their website to ensure they are legitimate. One of the ways to do this is to see if it\u2019s using an SSL\/TLS certificate. If so, you can check to see if the certificate lists any organizational information about the registered company or organization. \u00a0<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Here are four examples of common social media scams \u2014 what they are, how they work, and what you can do (and look out for) to stay safe on social media.<\/p>\n","protected":false},"author":602,"featured_media":8135,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[182],"tags":[706,257,256,707,258,259,705],"ppma_author":[3308],"class_list":["post-8134","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-future-of-work","tag-how-they-work","tag-scams","tag-social-media","tag-social-media-scams","tag-stay-safe","tag-tips","tag-well-share-four-examples-of-common-social-media-scams-what-they-are"],"authors":[{"term_id":3308,"user_id":602,"is_guest":0,"slug":"casey-crane","display_name":"Casey Crane","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_62b93d4d-9128-4c88-bf3a-1ca52c8ea99f-150x150.jpg","user_url":"https:\/\/www.thesslstore.com\/","last_name":"Crane","first_name":"Casey","job_title":"","description":"Casey Crane is Cybersecurity Journalist and SEO Content Manager at The SSL Store\u2122. She is a regular contributor to Hashed Out and Infosec Insights with experience in journalism and writing, including crime analysis and IT security."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/8134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/602"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=8134"}],"version-history":[{"count":11,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/8134\/revisions"}],"predecessor-version":[{"id":34762,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/8134\/revisions\/34762"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/8135"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=8134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=8134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=8134"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=8134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}