Important Security Notice – Staying Safe on Periscope

Created by Peter Bassill, Modified on Thu, 20 Mar at 6:05 PM by Peter Bassill

As part of our ongoing efforts to strengthen cybersecurity awareness, we want to highlight key security risks associated with the Periscope platform and provide guidance on how to stay protected.

Cybercriminals increasingly target messaging and collaboration platforms to distribute phishing attacks, compromise accounts, and exploit vulnerabilities. To safeguard both personal and company security, it is essential to stay vigilant.

Recognising Phishing and Security Risks on Periscope

Be aware of common tactics used by attackers on Periscope, including:

  1. Impersonation Attacks – Fraudsters may pose as a colleague, client, or company representative, attempting to gain your trust and extract sensitive information. Always verify unexpected messages through a trusted channel.

  2. Suspicious Links and Attachments – Be cautious when clicking links or opening files sent via Periscope. Even if they appear to come from a known contact, verify their authenticity before engaging.

  3. Requests for Credentials or Sensitive Information – Attackers may ask for login details, financial data, or other confidential information under false pretences. Your IT and security teams will never request passwords or security codes via Periscope.

  4. Urgent or Unusual Requests – Messages insisting on immediate action, such as approving payments or changing security settings, should be double-checked with the requester through official channels.

  5. Account Takeovers – If you receive messages from a trusted contact that seem out of character, their account may have been compromised. Report suspicious activity immediately.

How to Stay Secure on Periscope

To mitigate risks and enhance your security posture, follow these best practices:

1. Enable Two-Factor Authentication (2FA)

Activate 2FA on your Periscope account to add an extra layer of security and prevent unauthorised access.

2. Be Wary of Unknown Contacts and Invitations

Only accept messages and collaboration requests from verified sources. Avoid engaging with unsolicited contacts.

3. Do Not Share Sensitive Data via Periscope

Never transmit confidential company data, passwords, or financial details over Periscope. Use approved, secure channels for sensitive communications.

4. Keep Your App Updated

Ensure you are always running the latest version of Periscope to benefit from security patches and bug fixes.

5. Report Suspicious Activity Immediately

If you encounter anything unusual, such as phishing messages, suspicious links, or unauthorised login attempts, report it to soc@cyber-defence.io immediately.

Final Reminder

Staying informed and vigilant is key to protecting yourself and the organisation. If you have any concerns or need assistance, reach out to soc@cyber-defence.io.

Thank you for your cooperation in keeping your systems and communications secure.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article