LinkedIn takes action to tackle fake accounts • Blisstech Solutions

LinkedIn is introducing new verification features over the coming months to help tackle fake accounts.

The business-focused social platform is a fantastic place to connect with like-minded businesspeople and to find new employees, jobs and opportunities.

But thanks to this popularity, we’re seeing an increase in fake profiles, created by scammers for more sinister purposes.

Bot-like accounts have been cropping up all over the platform. They’ve been spamming people, tricking genuine profiles into downloading malware, and scamming them into giving away personal data.

LinkedIn holds a huge amount of information on each of its members, including their job history, contact details, professional interests and places of work – all valuable data that a determined criminal could put to use.

These fake accounts can be hard to spot. They look like real people (sometimes they’re AI-generated deepfake images), they seem to work for legitimate businesses, and the profiles have been carefully curated to look like the real deal.

LinkedIn is making changes over the coming months to help tackle these fake accounts, by way of an improved account authentication process.

Microsoft, which owns LinkedIn, is partnering with secure identity platform Clear to help verify accounts using work email addresses, government-issued ID, and a phone number.

It’s initially only being tested in the US, but if it’s a success, we expect we’ll see a wider rollout over the coming months.

Once the relevant information has been provided, accounts will receive a verification mark, like the ones introduced by Twitter. However, unlike Twitter, LinkedIn will be offering verification free of charge.

We’ll keep you updated when we know more, but in the meantime, if you need help keeping all your accounts secure, get in touch.

More Content

Time to move your business to the cloud?

Still relying on office computers? It’s time to move your business to the cloud. A few years ago, running your business using data and apps stored on office computers—or a dusty server in the cupboard—might have worked. But times have changed. With remote teams and...

Tech Tip: Capture Your Screen Like a Pro – Essential Screenshot Techniques for Windows

Welcome to a new Tuesday tech tip video where I will show you how to take screenshots in Windows. Screenshots are an indispensable tool for anyone who uses a computer. They allow us to capture specific areas of our screen, share instructions, document errors, or...
Cyber attacks: Stronger, faster and more sophisticated

Cyber attacks: Stronger, faster and more sophisticated

A new cyber security report has brought some bad news: Cyber attacks are getting stronger, faster, and more sophisticated. We have all the details.

Tech Tip: How to create a voting poll using Outlook

Welcome to a new Tuesday tech tip video where we will be exploring how to create a voting poll using Outlook and Microsoft Forms. Sometimes, when we need to get people's opinions on something, it can be a bit like herding cats! Maybe we need to get a consensus of...

What to do when disaster strikes: Creating an Incident Response Plan

Your business has firewalls, the latest security software, multi-factor authentication, and, of course, uncrackable passwords. You may even have Cyber Essentials—high five. But… It’s still not enough to protect you from 100% of cyber attacks. Completely watertight...
How concerned should you be about cyber attacks?

How concerned should you be about cyber attacks?

You’ve probably heard a lot of talk about cyber attacks but how worried should you really be? Well, very, because cyber criminals are getting smarter. We have good news to share about how you can protect your business

Tech Tip: How to use Pivot Tables in Excel

Welcome to Tuesday's Two Minute Tech Tip where Matt shows you how you can explore your Excel data using the power of Pivot Tables. Pivot Tables are a powerful feature of Excel that allows you to manipulate your flat Excel data to perform calculations and create charts...

Tech Tip: How to managed Focused and Junk email in Outlook

Welcome to a new Tuesday Two Minute Tech Tip that will help you to manage what you see in your Inbox. Are you wondering where your emails have gone? Is something you expect to see in your Inbox not arriving anymore? This video will show you how to:    👉...
You’ve heard of Copilot… but what is it?

You’ve heard of Copilot… but what is it?

You might have heard about Microsoft Copilot, but what is it? And will it really make a difference to your workday or business? We explain it all here.

BEC attacks illustrated. Image of a hacker standing behind a computer looking menacing

Business Email Compromise (BEC) attacks are rising

Business Email Compromise (BEC) has emerged as a significant threat to businesses worldwide in recent years. As of March 2025, there has been a staggering 30% increase in BEC attacks. In late February 2025, Microsoft Defender identified nearly 2 million phishing...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05