Call Today

+1 440-322-ILER(4537)

}
Hours

Mon – Fri, 9am to 5pm

Tech Blog

your go-to resource for all things tech! Stay updated on the latest trends, industry insights, and expert tips to navigate the ever-evolving world of technology.

Dangers Of LinkedIn: 4 Security Features To Use TODAY

by | Jul 29, 2024

A recent report from Check Point Research revealed a shocking statistic – the Microsoft-owned business platform LinkedIn is impersonated in nearly half of all phishing attacks globally.

One of the ways scammers leverage LinkedIn to deploy their phishing attack is when they zero in on anyone seeking a new job or career change. While e-mails like “You have 1 new invitation” or “Your profile has been viewed by 63 people” can be authentic, it’s critical to verify the e-mail address it’s sent from to ensure that it’s genuinely from LinkedIn. These impersonators will send e-mails that look identical to the real ones, with links to fake LinkedIn pages that will rip off your information as soon as you enter it.

Another way cybercriminals leverage LinkedIn is by creating fake profiles and messaging people about job opportunities. Once you’re on the hook, they’ll either ask for a small payment upfront to process your application (that you’ll never see again) or send you a link to a form you must fill out that’s actually a phishing link in disguise.

LinkedIn is aware of the problem and is working on developing advanced security features to protect its users. Here are three of the current security features it has already deployed:

  1. Suspicious Message Warnings – LinkedIn’s technology can detect messages from people who are attempting to take you off the platform or are saying something potentially inappropriate, and will send you a warning notification.
  2. Profile Verification – This feature allows you to verify your page’s authenticity. By submitting an additional form of ID, you can get a verification badge on your profile, so anyone who looks at it knows you are who you say you are. This is a valuable feature since scammers are always looking for fresh targets and have pages that get shut down quickly, so they don’t often bother keeping information up-to-date.
  3. Profile Information – This feature allows you to see the details of a person’s profile to help you determine whether or not to respond to a message, accept a connection request, trust an offer, etc. Under your profile, if you click “More” and select “About this profile” from the drop-down menu, you’ll see information like:
  • When the profile was created.
  • When the profile was last updated.
  • Whether the member has verified a phone number.
  • Whether the member has a work e-mail associated with their account.

 

  1. AI-Generated Profile Picture Detection – Scammers will use AI to generate realistic profile pictures of fake people to create fake profiles used to scam users. Scarily, LinkedIn’s research showed that users were generally unable to visually distinguish real faces from these synthetically generated ones. As a result, LinkedIn partnered with Academia to develop and deploy advanced detection features that allow LinkedIn to detect AI-generated profile pictures and shut down their profiles before they cause problems.

Do you use LinkedIn to find jobs, employees or clients? It’s a great resource for business, but it’s important to stay secure. However, LinkedIn’s features are just the first line of defense. If someone in your organization were to fall for a scam and click a bad link, would your internal security solutions be enough to protect your network?

We can help you find out. We’ll do a FREE Security Risk Assessment to help you determine if your network is vulnerable to any type of attack. To book yours, call us at 440-322-4537 or click here to book now.

Was Your Information Compromised From The National Public Data Breach?

In September 2024, National Public Data confirmed that a massive cyberattack had compromised the personal information of millions of people. The exposed data includes names, email addresses, mailing addresses, phone numbers, and Social Security numbers—impacting up to...

5 Signs It’s Time To Update Your Software (And How To Do It Safely)

Software updates might seem like a hassle, especially when you're juggling compliance, cybersecurity, and keeping your operations running smoothly. But skipping those updates? It’s like leaving the front door to your business wide open for hackers. Cybercriminals...

The S.E.C.U.R.E. Method To Stop Phishing E-mails

Phishing attacks remain the most common form of cybercrime for one simple reason: they work. Every day, more than 3.4 billion spam emails flood inboxes, with phishing scams being one of the most dangerous types. These emails have been the top cyber threat for years...

The End Is Almost Here! Windows 10 Will No Longer Be Supported As Of October 2025

As of October 14, 2025, Microsoft will no longer support Windows 10. While your PCs may still function after this date, Microsoft will stop providing the critical services that keep your devices running securely and efficiently. These services include: Security...

Microsoft Copilot Techniques To Boost Business Productivity

Even if you're tired of hearing about AI, the truth is that those who embrace it and find the right tools will outpace those who resist it. But sorting through the overwhelming number of AI-powered programs can be frustrating, especially for a busy professional like...