As part of our ongoing efforts to strengthen cybersecurity awareness, we want to highlight key security risks associated with the Periscope platform and provide guidance on how to stay protected.
Cybercriminals increasingly target messaging and collaboration platforms to distribute phishing attacks, compromise accounts, and exploit vulnerabilities. To safeguard both personal and company security, it is essential to stay vigilant.
Recognising Phishing and Security Risks on Periscope
Be aware of common tactics used by attackers on Periscope, including:
Impersonation Attacks – Fraudsters may pose as a colleague, client, or company representative, attempting to gain your trust and extract sensitive information. Always verify unexpected messages through a trusted channel.
Suspicious Links and Attachments – Be cautious when clicking links or opening files sent via Periscope. Even if they appear to come from a known contact, verify their authenticity before engaging.
Requests for Credentials or Sensitive Information – Attackers may ask for login details, financial data, or other confidential information under false pretences. Your IT and security teams will never request passwords or security codes via Periscope.
Urgent or Unusual Requests – Messages insisting on immediate action, such as approving payments or changing security settings, should be double-checked with the requester through official channels.
Account Takeovers – If you receive messages from a trusted contact that seem out of character, their account may have been compromised. Report suspicious activity immediately.
How to Stay Secure on Periscope
To mitigate risks and enhance your security posture, follow these best practices:
1. Enable Two-Factor Authentication (2FA)
Activate 2FA on your Periscope account to add an extra layer of security and prevent unauthorised access.
2. Be Wary of Unknown Contacts and Invitations
Only accept messages and collaboration requests from verified sources. Avoid engaging with unsolicited contacts.
3. Do Not Share Sensitive Data via Periscope
Never transmit confidential company data, passwords, or financial details over Periscope. Use approved, secure channels for sensitive communications.
4. Keep Your App Updated
Ensure you are always running the latest version of Periscope to benefit from security patches and bug fixes.
5. Report Suspicious Activity Immediately
If you encounter anything unusual, such as phishing messages, suspicious links, or unauthorised login attempts, report it to soc@cyber-defence.io immediately.
Final Reminder
Staying informed and vigilant is key to protecting yourself and the organisation. If you have any concerns or need assistance, reach out to soc@cyber-defence.io.
Thank you for your cooperation in keeping your systems and communications secure.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article