To LinkedIn, or not to LinkedIn… That is the Question 

It’s not uncommon to receive seemingly random (and harmless) Linkedin connection requests from people you don’t know. Maybe it’s from someone in the same industry or with a similar personal interest. Or even someone completely unrelated but with an irresistible smile, just wanting to “network.”

So how do you know that person is real and if you should make that connection?

Unfortunately, there are a growing number of fake Linkedin members out there trying to hook unsuspecting users into unsuspecting relationships. The malicious requests are coming from sophisticated attackers with bad intentions. Here are a few of the key reasons why:

  • They know profiles are often loaded with great information. It’s hard to resist! We all want our profile to look great to other professionals and maybe even future employers. So we add lots of detailed information… Where did you work, when, and in what role? What schools did you go to, for what degrees, and when? This info really helps bad actors craft personalized attacks.
  • They want to understand your connections. Phishing emails are becoming more sophisticated with attackers taking time to understand the connections between vendors, customers, and employees so that they can personalize and target their attacks. LinkedIn connections tell attackers quite a story about who you work with (e.g. your customers, vendors, and interest group).
  • InMail can be a direct attack method. Your team may be trained to deeply review emails before clicking links and attachments, but they now need to think about Linkedin messaging too. Knowbe4 reported incidents of InMail being used to send malicious links. That connection you just made may follow up with a maliciously crafted LinkedIn message.

In a day and age of connections and connectivity, it’s important everyone—executives, managers, and employees alike—recognize there are growing risks associated with social media like LinkedIn. A few tips to help keep you and your organization safe:

  • Research before connecting: Prior to accepting a new request, confirm it’s is a real one. Fake LinkedIn members use profile images of other people directly from the Internet. One spot check is to use Google image search where you can search the image and see if it’s the same person.
  • Change “Who can see your connections”: LinkedIn’s privacy settings allow you to control if others can view your connections and limit that to the point where you’re the only one. Make sure your privacy settings are up-to-date, you may have set them up a long time ago.
  • Conduct regular awareness training: New attack methods such as malicious Linkedin messages are constantly surfacing. Ongoing education for everyone in your organization is extremely important. A cybersecurity program should involve planned and scheduled cybersecurity awareness training that will keep your organization CyberSmart.

It’s always good to be diligent about who you’re connecting with and why. Please remember, all it takes is one bad click.

Stay Safe,

Your Friends @ Defendify

Resources & insights

Why You Could Be Denied Cyberattack Insurance Coverage
Blog
Why You Could Be Denied Cyberattack Insurance Coverage
As you’re working toward achieving robust cybersecurity, the subject of cyber attack insurance coverage and cybersecurity insurance requirements is sure to enter the discussion.
Cost of a Cyberattack vs. Cybersecurity Investment
Blog
Cost of a Cyberattack vs. Cybersecurity Investment 
Detailing the cost of a cyberattack versus the ROI of a cybersecurity investment enables leadership to see cybersecurity solutions are worth it.
Defendify Listed as a High Performer in Six G2 Grid Categories
Blog
Defendify Listed as a High Performer in Six G2 Grid Categories
The Defendify Cybersecurity Platform has been listed as a High Performer in six Summer 2022 Data Security Software Category Reports on the technology review site G2.

Protect and defend with multiple layers of cybersecurity

Defend your business with All-In-One Cybersecurity®.

Explore layered
security

Learn more about Defendify’s three key layers and All-In-One Cybersecurity®.

How can we help?

Schedule time to talk to a cybersecurity expert to discuss your needs.

See how it works

See how Defendify’s platform, modules, and expertise work to improve security posture.

Take the first step toward comprehensive cybersecurity with a free Defendify Essentials package

Gain access to 3 award-winning cybersecurity modules. Nothing to install. Nothing to pay for.