facebook linkedin twitter

Computerware Blog

Holiday Shopping Looking Different this Year

Holiday Shopping Looking Different this Year

2020’s holiday season is going to be much like the rest of 2020: distanced. Most people are taking precautions and therefore have put the kibosh on much of their holiday shopping trips, choosing instead to do a majority of their shopping online. By avoiding one risk, people take on others. Today, we thought we’d outline some of the problems people may experience when shopping online and what to do to reduce your risk.

Protect Your Identity

You would just go into a store and start announcing where you live and how much money you have in your checking account to strangers who are shopping alongside you, right? Well, no matter where you do commerce, information is changing hands; and, unfortunately, by choosing to shop online you are at greater risk of encountering scams. 

The first thing you should consider, if you haven’t already, is what form of payment you are going to use. Security professionals suggest using a credit card, not a debit card, when purchasing goods and services online if you can help it. There are also payment services like PayPal and Venmo that you can use. Credit cards offer better protection from financial theft, and a lot less liability if something were to go wrong. Credit card companies will have better fraud protection and they will make good faster than your bank will.

You will also want to only shop on sites that you trust. They should offer secure file transfer so that your financial and personal information is protected. Check for “https” or a lock icon in the address bar to ensure that your transactions are being processed securely. Even so, you will also want to not give over unnecessary information. The main problem with shopping online is that you are coerced into giving over more information than you would otherwise. This is an ongoing issue that consumer rights groups are lobbying lawmakers to address. Until they do, it’s on you to keep your data private and protected.

Get the Timing Right

A lot of people have had a rough year. This means that many people are going to be finishing their Christmas shopping up later than usual. This causes several problems, especially this year. Some of the stores are having supply chain problems and will be slow to process purchases. You may not be able to get certain products and others will be on backorder. It’s just the way things go this year. 

Secondly, once the process starts it will likely take a little longer to ship than you would expect. Companies have had to make a lot of hard decisions in 2020, and some of them include not hiring the extra help they typically have around the holidays. Less people means slower movement. Everyone is doing their best, but a lot of the speed and convenience we’ve come to know won’t be available for 2020.

Lastly, shipping and mail companies are going to be slammed with online orders more this year than ever before. This means delivery times will be variable. If you want your gifts to arrive so you can put them under the tree, you will want to give companies more time than you typically would. 

Avoid All the Scams

The holidays are usually the busiest time of year for scammers, but with 10 months of altered existence, it has been open season for the majority of 2020. You will want to understand the best practices of doing business online to avoid any potential nightmare situations down the road. Here is a brief list:

Build Strong Passwords - You will want to have complex and well-considered passwords; and, you will want to use multi-factor authentication on as many accounts as you can. This won’t make you immune to hackers, but it will go a long way toward securing the juncture points where these tech-savvy scammers will infiltrate and corrupt. Also, don’t use the same password on multiple sites and accounts.

Understanding Phishing - You will need to be vigilant when going through your emails and other messages. A message that seems benign could be a major problem if clicked on. You will also want to avoid downloading attachments from messages unless you are certain who the sender is. A good rule is to verify before clicking on anything from anyone, especially right now. This time of year people are inundated with forms and questions and they’ll give over information that they typically wouldn’t, just out of fatigue. You need to be deliberate about online transactions.

Don’t use “Free” Wi-Fi - A lot of people like to use outside Wi-Fi to save money on their wireless bill. This seems reasonable before you consider that hackers prey on these wireless accounts and can siphon information and even money off your mobile device if you don’t have the security in place to protect yourself.

The holidays may look the same, but it will certainly feel different as people distance themselves from one another rather than coming together. Do you plan on doing your shopping online this year? Do you have any other tips that would help people not be victims of identity theft and data loss this holiday season? Leave them in the comments and return to our blog regularly for more great tips and tricks.

Gig Workers Hit Hard by the Pandemic
Two Lessons Businesses Can Learn from the Spotify ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, January 23, 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Workplace Tips Hardware Network Security Microsoft Productivity Backup Business Hosted Solutions Email Managed Service Provider Productivity IT Services Saving Money Efficiency Malware Innovation Google Small Business Computer User Tips Collaboration IT Support VoIP Quick Tips Data Backup Smartphones IT Support Network Data Recovery Mobile Devices communications Android Microsoft Office Business Continuity Disaster Recovery Gadgets Cybersecurity Smartphone Communication Phishing Social Media Upgrade Mobile Office Server Virtualization Mobile Device Miscellaneous Ransomware Users Mobile Device Management Managed IT Services Windows Passwords Holiday Operating System BDR Vendor Management Apps Windows 10 Outsourced IT Internet of Things Tech Term Automation Facebook Remote Monitoring Unified Threat Management BYOD Managed IT services Remote Computing Mobile Computing Apple Covid-19 WiFi Data Management Analytics Windows 10 Training History Artificial Intelligence Marketing Browser Save Money Cloud Computing Spam The Internet of Things Help Desk Managed Service Firewall Business Technology Encryption Alert App Big data Health Bandwidth Two-factor Authentication Office Information Technology IT Consultant Office 365 Budget Antivirus Access Control Gmail Government Networking Windows 7 Cybercrime Maintenance Information Printer Blockchain Content Filtering Going Green Hard Drives Wi-Fi Bring Your Own Device Managed IT VPN Search Outlook Windows 8 Recovery Employer-Employee Relationship Retail Tech Support Virus Remote Work Best Practice Lithium-ion Battery Cost Management Healthcare Document Management Hiring/Firing Saving Time Computers Wireless Technology Travel Customer Service Conferencing Education Storage Update Data Security Risk Management It Management Avoiding Downtime Humor iPhone Patch Management Data Loss Vendor Money Computing Hacking IBM Phone System Project Management Augmented Reality Twitter Flexibility Administration Intranet Wireless Laptop Website File Sharing Hard Drive Legal Regulations Mobility Save Time Value Router Downtime Password SaaS Data Breach End of Support Hacker Meetings Customer Relationship Management Law Enforcement Computer Repair Running Cable Proactive IT Current Events Remote Applications PowerPoint Compliance Solid State Drive Voice over Internet Protocol Data storage Black Market Social Software as a Service Cryptocurrency Fax Server DDoS Business Growth Monitoring Employee/Employer Relationship Google Maps Net Neutrality Cooperation Word Business Intelligence Management Chrome Digital Payment Social Engineering Paperless Office Sports Cortana Scam Vulnerabilities Disaster Excel Comparison Tablet Hosted Solution Private Cloud Robot Company Culture Securty Digital Employees Social Networking Websites Telephony Machine Learning User Virtual Desktop Telephone Systems Uninterrupted Power Supply Public Cloud Licensing Video Conferencing Cost Managed Services Provider Documents Teamwork Google Docs Heating/Cooling Lifestyle Streaming Media Display Entertainment Memory Vulnerability Experience How To Identity Theft Bitcoin Data Protection Inbound Marketing Monitors Notifications Managed Services Cleaning Office Tips Managed IT Service Downloads Multi-factor Authentication Virtual Reality Politics Automobile YouTube Time Management Telephone Emails Pain Points eWaste Chromebook Processor Unified Communications Settings Computing Infrastructure Hack Redundancy Computer Accessories How To Trending Solutions Evernote Download Processors Professional Services eCommerce USB IT service Virtual Assistant Mouse Presentation Gaming Console Start Menu Tech Terms Statistics Integration User Error Microchip Distribution Taxes Programming Co-managed IT Text Messaging Holidays Smart Devices Mobile Technology Distributed Denial of Service Webcam Network Congestion Specifications Bluetooth Safety Modem Strategy Reviews Computer Care Mobile Security G Suite External Harddrive Proxy Server Azure Procurement Microsoft Excel Telephone System Employer Employee Relationship Organization Software License Trends Electronic Medical Records Transportation Digital Signature Deep Learning Google Drive Windows Server 2008 Multi-Factor Security Hacks Physical Security Term Work/Life Balance Recycling 3D Ebay Recording Optimization Communitications Spyware Mobile Payment Devices Banking Botnet Thin CLient Analytic Directions Visible Light Communication PCI DSS Fraud Tactics Relocation Tablets SSID Shopping Electricity Printing UTM Content Sync Smart Phones Product Reviews Dark Web Free Resource IT consulting Supply Chain Management AI IT Plan Enterprise Resource Planning Health IT Best Practives Internet Service Provider Legislation Error CCTV Read Processing PDF Adminstration Pirating Information Logistics CIO Virtual Machines Best Available Keyboard IT Assessment cache Television Accountants Business Metrics A.I. Computer Malfunction Leadership Wasting Time Advertising Flash Regulations Compliance email scam Addiction Reliable Computing Staffing Cyber security Google Wallet Microserver Gig Economy WannaCry In Internet of Things Bookmark Windows XP Domains Remote Working Device Management Supply Chains Corporate Profile Migration Connected Devices Business Managemenet Employer/Employee Relationships Displays Public Speaking Freedom of Information Wireless Headphones Content Management Google Play Telephone Service Society Network Management Scalability Microsoft 365 Micrsooft Shortcut Get More Done Electronic Health Records Assessment SharePoint Equifax Fleet Tracking Motion Sickness Managing Costs Financial Data Medical IT Trend Micro Drones Entrepreneur Turn Key Memes Smartwatch Google Calendar Device security MSP Browsers Troubleshooting Printer Server Tip of the week Messenger Tracking online Currency Environment 2FA VoIP Desktop Finance User Tip Proactive Maintenance HIPAA Trojan Managing IT Services Touchscreen News Nanotechnology Rental Service Social Network Upselling Security Cameras Threats Knowledge Business Cards Service Level Agreement Cabling LinkedIn Video Surveillance Competition Surveillance Consultation Startup Asset Tracking Web Server Navigation Virtual Machine Permissions Electronic Payment Language Organize Telework IT Technology Tips Username Administrator Saving ZTime Data Analysis Business Owner Remote Workers Unified Threat Management Backup and Disaster Recovery Books Workers Managing Risk Music Audit Gamification Skype Printers SQL Server switches Writing IP Address Virtual Private Network Fake News Screen Reader Customer Resource management Supercomputer Archive GDPR Piracy Upload Worker Debate Upgrades Application Development Data Warehousing Smart Tech Harddrive Tech Hypervisor Human Resources FinTech Access HTML Point of Contact Fileless Malware Hybrid Cloud LiFi Webinar Data Storage Emergency Fiber-Optic Hard Drive Disposal Database Reading Samsung GPS Productuvuty Managing Stress Regulation 3D Printing Personal Information CrashOverride Financial CES Capital