{"id":27215,"date":"2025-08-13T22:33:36","date_gmt":"2025-08-13T22:33:36","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=27215"},"modified":"2026-01-24T22:46:54","modified_gmt":"2026-01-24T22:46:54","slug":"execs-oversharing-why-social-media-makes-phishing-so-easy","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy","title":{"rendered":"Execs Oversharing? Why Social Media Makes Phishing So Easy"},"content":{"rendered":"\n<p>Your recent LinkedIn post mentioned three department heads by name. Last week&#8217;s Instagram story shows you&#8217;re working late because the new software rollout hit snags. Yesterday&#8217;s Tweet was about how your IT department is overwhelmed with support tickets.<\/p>\n\n\n\n<p>An attacker just spent five minutes building a detailed picture of your company&#8217;s current challenges, key personnel, and operational stress points. Now they&#8217;re crafting an email that will feel completely legitimate when it lands in your inbox.<\/p>\n\n\n\n<p>These phishing attacks work because they\u2019re personal. When someone emails you about a project you actually mentioned online, using the name of a coworker you recently tagged, your guard drops. The email doesn&#8217;t look like spam anymore, but like legitimate work communication.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Attackers Research Their Targets<\/h2>\n\n\n\n<p>Cybercriminals approach social media like private investigators building a case. They collect information systematically, looking for specific details they can weaponize.<\/p>\n\n\n\n<p>LinkedIn profiles reveal professional hierarchies. Attackers learn who you work with, what projects you&#8217;re involved in, and how your company operates. They see that you&#8217;re in accounting, that your manager reports to the CFO, and that you&#8217;ve been complaining about the new expense software rollout.<\/p>\n\n\n\n<p>Facebook and Instagram show your personal side. Family photos reveal relationships. Check-ins show where you travel. Posts about your dog&#8217;s surgery or your daughter&#8217;s graduation give attackers emotional triggers they can exploit.<\/p>\n\n\n\n<p>Twitter captures your personality and opinions. How you write, what annoys you, what excites you. Attackers use this to match your communication style when impersonating you or to know exactly which buttons to push.<\/p>\n\n\n\n<p>The real damage happens when attackers cross-reference multiple platforms. Professional information from LinkedIn combined with personal details from Facebook creates a complete picture of who you are and how to manipulate you.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-1-3-1024x574.png\" alt=\"\" class=\"wp-image-27239\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-1-3-1024x574.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-1-3-300x168.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-1-3-768x431.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-1-3.png 1312w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">\u0112xamples of Social Media Phishing Techniques<\/h2>\n\n\n\n<p>So what does this look like in practice? Here are a few ways that attackers might weaponize that information:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Boss Impersonation Using Travel Posts<\/h3>\n\n\n\n<p>An attacker sees that the CEO posted about attending a conference in Singapore. They also notice from a manager&#8217;s Facebook that she&#8217;s dealing with a family emergency. The attacker emails the finance team: &#8220;I&#8217;m in back-to-back meetings in Singapore and our CFO is unavailable. I need you to process this urgent vendor payment. I&#8217;ll explain more when I&#8217;m back, but the deadline is today.&#8221;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Vendor Spoofing Based on Company Updates<\/h3>\n\n\n\n<p>Multiple employees post about training sessions for new project management software. An attacker registers a domain similar to the software company&#8217;s website and sends emails about &#8220;immediate security patches&#8221; requiring login verification. The attack works because employees know the company really does use this software.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Personal Crisis Exploitation<\/h3>\n\n\n\n<p>An HR manager frequently posts about fundraising for her child&#8217;s medical treatment. An attacker creates a fake email from a &#8220;medical billing company&#8221; requesting updated insurance information to continue treatment authorization. The emotional urgency overrides normal security caution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Protecting Your Digital Footprint<\/h2>\n\n\n\n<p>Here are practical steps to reduce your attack surface:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/www.staysafeonline.org\/articles\/manage-your-privacy-settings\" target=\"_blank\" rel=\"noopener\" title=\"\">Review your privacy settings<\/a><\/strong> across all platforms. Most social media sites default to sharing more than you probably want. Limit who can see your posts, photos, and personal information.<\/li>\n\n\n\n<li><strong>Think about what you&#8217;re revealing<\/strong> before posting. That innocent photo from the company retreat shows attackers your workplace relationships. Location check-ins reveal travel patterns.<\/li>\n\n\n\n<li><strong>Keep work and personal separate<\/strong> when possible. Use different platforms for different purposes. Don&#8217;t discuss work projects on personal accounts or share personal details on professional profiles.<\/li>\n\n\n\n<li><strong>Be suspicious when urgent requests<\/strong> reference information from your social media. If someone emails about something they shouldn&#8217;t know based on your relationship with them, verify through alternative channels before responding.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-2-3-1024x574.png\" alt=\"\" class=\"wp-image-27240\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-2-3-1024x574.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-2-3-300x168.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-2-3-768x431.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-2-3.png 1312w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">When Phishing Prevention Fails<\/h2>\n\n\n\n<p>You can reduce the risk by training staff to <a href=\"\/en\/blogs\/dont-get-hooked-10-social-engineering-indicators\" target=\"_blank\" rel=\"noopener\" title=\"\">recognize social engineering indicators<\/a> and reduce how much information they share online. However, you can&#8217;t eliminate it entirely. Criminals are always developing new research techniques and attack methods.<\/p>\n\n\n\n<p>Security professionals get fooled by these attacks. Executives fall for them. IT administrators click malicious links. The problem isn&#8217;t that people are stupid or careless. The problem is that these attacks exploit fundamental human psychology.<\/p>\n\n\n\n<p>Smart security strategies assume that some attacks will eventually succeed. Instead of trying to create perfect humans who never make mistakes, focus on limiting damage when mistakes happen.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A More Effective Solution<\/h2>\n\n\n\n<p>Admin By Request&#8217;s <a href=\"\/en\/endpoint-privilege-management\" target=\"_blank\" rel=\"noopener\" title=\"\">Endpoint Privilege Management<\/a> product works from this principle by removing permanent admin privileges from user accounts. Users get admin rights only when needed for specific tasks, then lose them automatically.<\/p>\n\n\n\n<p>When someone falls for a well-crafted spear phishing email, attackers can\u2019t immediately install malware or access sensitive systems. They hit a wall instead of gaining full system control.<\/p>\n\n\n\n<p>Phishing attacks will keep getting more sophisticated and even security-aware employees can be manipulated. Some will eventually fall for attacks that use their own information against them. &nbsp;But that doesn\u2019t have to translate into a data breach.<\/p>\n\n\n\n<p>Interested in seeing our solutions in action? <a href=\"\/en\/book-a-live-demo\" target=\"_blank\" rel=\"noopener\" title=\"\">Book a demo<\/a> today or download our <a href=\"\/en\/freeplandownload\" target=\"_blank\" rel=\"noopener\" title=\"\">Lifetime Free Plan<\/a> to deploy them on up to 25 endpoints.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing isn\u2019t always sloppy or random. With your own social content, attackers craft emails that mirror real conversations and current business stress.<\/p>\n","protected":false},"author":16,"featured_media":27241,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[148,67,371,68,434,502],"ppma_author":[428],"class_list":["post-27215","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-cybersecurity","tag-pam","tag-phishing","tag-privileged-access-management","tag-social-engineering","tag-social-media","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Phishing isn\u2019t always sloppy or random. With your own social content, attackers craft emails that mirror real conversations and current business stress.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"Pocholo Legaspi\"\/>\n\t<meta name=\"keywords\" content=\"cybersecurity,pam,phishing,privileged access management,social engineering,social media\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Execs Oversharing? Why Social Media Makes Phishing So Easy\" \/>\n\t\t<meta property=\"og:description\" content=\"Phishing isn\u2019t always sloppy or random. With your own social content, attackers craft emails that mirror real conversations and current business stress.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2025-08-13T22:33:36+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-24T22:46:54+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Execs Oversharing? Why Social Media Makes Phishing So Easy\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Phishing isn\u2019t always sloppy or random. With your own social content, attackers craft emails that mirror real conversations and current business stress.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/execs-oversharing-why-social-media-makes-phishing-so-easy#blogposting\",\"name\":\"Execs Oversharing? Why Social Media Makes Phishing So Easy\",\"headline\":\"Execs Oversharing? Why Social Media Makes Phishing So Easy\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/main-4.png\",\"width\":1312,\"height\":736,\"caption\":\"Admin By Request blog post on how attackers use social media for phishing\"},\"datePublished\":\"2025-08-13T22:33:36+00:00\",\"dateModified\":\"2026-01-24T22:46:54+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/execs-oversharing-why-social-media-makes-phishing-so-easy#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/execs-oversharing-why-social-media-makes-phishing-so-easy#webpage\"},\"articleSection\":\"Blogs, Cybersecurity, PAM, Phishing, Privileged Access Management, Social Engineering, Social Media, Pocholo Legaspi\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/execs-oversharing-why-social-media-makes-phishing-so-easy#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/execs-oversharing-why-social-media-makes-phishing-so-easy#listItem\",\"name\":\"Execs Oversharing? Why Social Media Makes Phishing So Easy\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/execs-oversharing-why-social-media-makes-phishing-so-easy#listItem\",\"position\":3,\"name\":\"Execs Oversharing? Why Social Media Makes Phishing So Easy\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/execs-oversharing-why-social-media-makes-phishing-so-easy\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/execs-oversharing-why-social-media-makes-phishing-so-easy\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor\",\"name\":\"Pocholo Legaspi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/execs-oversharing-why-social-media-makes-phishing-so-easy#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/execs-oversharing-why-social-media-makes-phishing-so-easy\",\"name\":\"Execs Oversharing? Why Social Media Makes Phishing So Easy\",\"description\":\"Phishing isn\\u2019t always sloppy or random. With your own social content, attackers craft emails that mirror real conversations and current business stress.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/execs-oversharing-why-social-media-makes-phishing-so-easy#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/main-4.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/execs-oversharing-why-social-media-makes-phishing-so-easy\\\/#mainImage\",\"width\":1312,\"height\":736,\"caption\":\"Admin By Request blog post on how attackers use social media for phishing\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/execs-oversharing-why-social-media-makes-phishing-so-easy#mainImage\"},\"datePublished\":\"2025-08-13T22:33:36+00:00\",\"dateModified\":\"2026-01-24T22:46:54+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Execs Oversharing? Why Social Media Makes Phishing So Easy<\/title>\n\n","aioseo_head_json":{"title":"Execs Oversharing? Why Social Media Makes Phishing So Easy","description":"Phishing isn\u2019t always sloppy or random. With your own social content, attackers craft emails that mirror real conversations and current business stress.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"cybersecurity,pam,phishing,privileged access management,social engineering,social media","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy#blogposting","name":"Execs Oversharing? Why Social Media Makes Phishing So Easy","headline":"Execs Oversharing? Why Social Media Makes Phishing So Easy","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/main-4.png","width":1312,"height":736,"caption":"Admin By Request blog post on how attackers use social media for phishing"},"datePublished":"2025-08-13T22:33:36+00:00","dateModified":"2026-01-24T22:46:54+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy#webpage"},"articleSection":"Blogs, Cybersecurity, PAM, Phishing, Privileged Access Management, Social Engineering, Social Media, Pocholo Legaspi"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy#listItem","name":"Execs Oversharing? Why Social Media Makes Phishing So Easy"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy#listItem","position":3,"name":"Execs Oversharing? Why Social Media Makes Phishing So Easy","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor","name":"Pocholo Legaspi"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy","name":"Execs Oversharing? Why Social Media Makes Phishing So Easy","description":"Phishing isn\u2019t always sloppy or random. With your own social content, attackers craft emails that mirror real conversations and current business stress.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/main-4.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy\/#mainImage","width":1312,"height":736,"caption":"Admin By Request blog post on how attackers use social media for phishing"},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy#mainImage"},"datePublished":"2025-08-13T22:33:36+00:00","dateModified":"2026-01-24T22:46:54+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Execs Oversharing? Why Social Media Makes Phishing So Easy","og:description":"Phishing isn\u2019t always sloppy or random. With your own social content, attackers craft emails that mirror real conversations and current business stress.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2025-08-13T22:33:36+00:00","article:modified_time":"2026-01-24T22:46:54+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Execs Oversharing? Why Social Media Makes Phishing So Easy","twitter:description":"Phishing isn\u2019t always sloppy or random. With your own social content, attackers craft emails that mirror real conversations and current business stress.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"27215","title":"#post_title","description":"#post_excerpt","keywords":null,"keyphrases":{"focus":{"keyphrase":"Phishing","score":74,"analysis":{"keyphraseInTitle":{"score":9,"maxScore":9,"error":0},"keyphraseInDescription":{"score":9,"maxScore":9,"error":0},"keyphraseLength":{"score":9,"maxScore":9,"error":0,"length":1},"keyphraseInURL":{"score":5,"maxScore":5,"error":0},"keyphraseInIntroduction":{"score":3,"maxScore":9,"error":1},"keyphraseInSubHeadings":{"score":3,"maxScore":9,"error":1},"keyphraseInImageAlt":{"score":3,"maxScore":9,"error":1},"keywordDensity":{"type":"best","score":9,"maxScore":9,"error":0}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-24 23:09:02","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":{"faqs":[],"keyPoints":[],"titles":[],"descriptions":[],"socialPosts":{"email":[],"linkedin":[],"twitter":[],"facebook":[],"instagram":[]}},"created":"2025-08-12 22:57:29","updated":"2026-01-24 23:09:02"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tExecs Oversharing? Why Social Media Makes Phishing So Easy\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Execs Oversharing? Why Social Media Makes Phishing So Easy","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/execs-oversharing-why-social-media-makes-phishing-so-easy"}],"authors":[{"term_id":428,"user_id":16,"is_guest":0,"slug":"pocholo-editor","display_name":"Pocholo Legaspi","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/04\/Pocholo-Headshot.jpg","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/04\/Pocholo-Headshot.jpg"},"author_category":"1","user_url":"","last_name":"Legaspi","first_name":"Pocholo","job_title":"","description":"Pocholo Legaspi is a seasoned content marketer and SEO specialist with over nine years of experience crafting digital content that drives engagement and growth. With a background in tech and a Master\u2019s in Business Informatics, he brings a data-driven approach to content strategy and storytelling."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/27215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=27215"}],"version-history":[{"count":3,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/27215\/revisions"}],"predecessor-version":[{"id":27244,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/27215\/revisions\/27244"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/27241"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=27215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=27215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=27215"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=27215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}