facebook linkedin twitter

Computerware Blog

How to Shop Securely This Holiday Season

How to Shop Securely This Holiday Season

While the major holiday shopping days have passed us by, many people are still looking for that perfect gift often using the Internet to find it. While online shopping is certainly more convenient, it can also be dangerous. To help keep you safe this season and beyond, we’re reviewing a few practices to protect your identity while shopping online.

Stick to What You Know

There are a few reasons why it makes sense to stick to using well-known websites like Amazon while you conduct your holiday shopping. First of all, you likely already have an Amazon account, which means you can shop without creating another online account that could potentially be breached. In addition, a well-known site is more motivated to make things right if something does happen, as their higher status means that bad publicity could have a wider-reaching impact for them.

It’s hard to put a concrete value on trust, but even if a site is a little more pricey to shop on, the peace of mind that familiarity can bring is a powerful motivator.

Check the URL

Not all websites are as secure as others, so it pays to check that the website you’re browsing has a secure connection. An easy way to tell is to check the address bar in your browser. Most of today’s browsers will show a padlock there if your connection is secure.

This lock signifies that the website you are visiting is using an SSL certificate, which essentially means that your connection to it is encrypted. Now, this doesn’t necessarily mean that the website is completely safe, but at least your connection to it is.

Use PayPal, Amazon Pay, or Apple Pay

Many websites offer you multiple options to submit a payment, including the traditional credit card route, or by using a third-party payment system (like PayPal, or other services that have popped up in recent years). These payment systems can help protect you from plugging your financial data into a website that you might not necessarily trust. Instead, when you use one of these services, the transaction goes through the service, while you are directed back to the store you were shopping on.

Avoid Scams and Phishing

Among all the holiday cheer, there can be a lot of stress as well, to the point that some people may sacrifice their cyber awareness, for the sake of just getting everything done. Cybercriminals use this to their advantage. If you receive an email that seems to offer something that’s just too good, it probably is - and don’t take any emails claiming there’s an issue with one of your accounts at face value. Instead, check the store’s website to confirm it. Most stores use email as a message board, broadcasting news to their customers so the customer can navigate to their website to interact further.

Holiday shopping can be much easier, thanks to the Internet, but that doesn’t mean that you can just assume that it’s safe. However, while you’re focused on getting the perfect gift for everyone on your list, we can help protect you and your business from holiday humbugs like cyberthreats. To learn more, give Computerware a call at (703) 821-8200.

What You Should Know About Bandwidth
A Recent Data Theft Shows Us What to Watch Out For


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, January 27, 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Microsoft Hardware Workplace Tips Backup Network Security Managed Service Provider Productivity Business Hosted Solutions Email Malware IT Services Saving Money Efficiency Productivity Computer Google User Tips IT Support Smartphones Innovation Small Business Mobile Devices Data Backup Quick Tips VoIP Collaboration IT Support Network Gadgets communications Microsoft Office Business Continuity Upgrade Android Social Media Data Recovery Disaster Recovery Server Cybersecurity Mobile Office Communication Virtualization Smartphone Mobile Device Management Miscellaneous Phishing Holiday Ransomware Windows 10 Operating System Windows Tech Term Passwords Unified Threat Management Remote Monitoring Vendor Management Outsourced IT Apps Managed IT Services Facebook Internet of Things BDR Automation Mobile Device Users BYOD Remote Computing Apple Mobile Computing Analytics Managed IT services Data Management WiFi History Windows 10 Artificial Intelligence The Internet of Things Marketing Save Money Firewall Browser Alert App Big data Help Desk Cloud Computing Encryption Office 365 Training IT Consultant Two-factor Authentication Spam Bandwidth Business Technology Antivirus Maintenance Printer Office Health Content Filtering Information Technology Going Green Gmail Hard Drives Managed IT Government Bring Your Own Device Cybercrime Computers Retail Saving Time Search VPN Cost Management Tech Support Virus Information Best Practice Budget Access Control Lithium-ion Battery Windows 7 Hiring/Firing Managed Service Outlook Windows 8 Employer-Employee Relationship Wireless Technology Humor Travel Networking Education Hacking Project Management Update iPhone Healthcare Phone System IBM Customer Service Money It Management Document Management Blockchain Recovery Data Loss Administration Data Breach Twitter Value Intranet Password Legal Avoiding Downtime Hacker Regulations Risk Management SaaS Computing Current Events Save Time Downtime File Sharing Applications Hard Drive Customer Relationship Management Law Enforcement Augmented Reality Compliance Mobility Website Patch Management PowerPoint Solid State Drive Data storage Running Cable Conferencing Proactive IT Voice over Internet Protocol Cryptocurrency Word Laptop Monitoring Private Cloud Cortana Business Growth Digital Telephony Websites Management Machine Learning Paperless Office Vulnerabilities Telephone Systems Sports Cooperation Business Intelligence User Vendor Disaster Virtual Desktop End of Support Excel Hosted Solution Digital Payment Robot Router Social Wireless Data Security Securty Tablet Google Maps DDoS Comparison Company Culture Storage Computer Repair Social Engineering Fax Server Social Networking Flexibility Scam Black Market Programming Redundancy Statistics Computing Infrastructure Hack Google Docs Network Congestion Meetings Memory How To eWaste Download Managed Services Provider Evernote Experience Monitors Virtual Assistant Cleaning Wi-Fi Office Tips Multi-factor Authentication Streaming Media Inbound Marketing Microchip Taxes Telephone Processors Start Menu Tech Terms USB Managed IT Service Mobile Technology YouTube Distributed Denial of Service Pain Points Presentation Software as a Service Unified Communications Settings Net Neutrality Chrome Public Cloud Licensing Uninterrupted Power Supply Processor Specifications Safety Vulnerability User Error Bitcoin Identity Theft Co-managed IT IT service Computer Accessories Documents Data Protection Teamwork Heating/Cooling Distribution Entertainment Downloads Gaming Console Politics Professional Services Trending Virtual Reality Emails Lifestyle Bluetooth Mouse Automobile Chromebook Text Messaging Webcam Fileless Malware Hybrid Cloud Google Calendar Deep Learning Devices Messenger Tracking Best Practives Domains Holidays External Harddrive Tip of the week Work/Life Balance Smart Devices Fraud Tactics UTM Point of Contact Content Rental Service Public Speaking Modem Strategy Touchscreen News Visible Light Communication Proxy Server Azure VoIP IT Plan Enterprise Resource Planning Web Server Shortcut Microserver Term Consultation 3D Ebay IT consulting Legislation Error Cabling Electronic Medical Records Transportation Knowledge Thin CLient Entrepreneur Directions Display Technology Tips Accountants A.I. Books Workers Troubleshooting Recording Optimization Smart Phones Communitications email scam Addiction Administrator Audit CIO Analytic Supercomputer HIPAA Get More Done SSID How To Fake News Advertising Flash Recycling Environment Dark Web Free Resource Migration Connected Devices Product Reviews Competition Turn Key Processing Managed Services Data Warehousing Adminstration Pirating Information Windows XP Wireless Headphones Worker Electronic Payment Printer Server Health IT Employee/Employer Relationship Leadership Staffing Google Wallet Wasting Time Access Displays Equifax Fleet Tracking Read Reading Samsung Business Owner Trojan Logistics Virtual Machines Emergency Hard Drive Disposal Society IT Assessment Network Management Computer Care Micrsooft Device security MSP Employer Employee Relationship IP Address Cyber security Microsoft Excel G Suite Organize Bookmark Desktop Finance Hacks Physical Security Application Google Play Telephone Service Google Drive Windows Server 2008 Device Management Nanotechnology Social Network Human Resources Employer/Employee Relationships Drones Botnet Managing Costs Spyware Mobile Payment Startup Content Management Asset Tracking Relocation Tablets Microsoft 365 Business Cards Service Level Agreement Business Managemenet Banking Electricity Printing Upselling Username Medical IT Trend Micro Permissions Language Memes Unified Threat Management Backup and Disaster Recovery Sync Browsers Gamification Notifications CCTV Digital Signature Security Cameras Threats Video Surveillance Screen Reader online Currency Customer Resource management Webinar User Tip Proactive Maintenance Business Metrics Computer Malfunction Navigation Virtual Machine cache Television switches Writing Smart Tech Reliable Computing Solutions Saving ZTime Music Piracy Upload Data Analysis Employees WannaCry Upgrades HTML eCommerce IT Fiber-Optic Database LinkedIn In Internet of Things Mobile Security GDPR Managing Risk Time Management Freedom of Information Debate LiFi Telephone System PDF SQL Server Corporate Profile Harddrive Trends Skype Motion Sickness Best Available Keyboard Tech Hypervisor Assessment SharePoint GPS Multi-Factor Security Archive Cost Scalability Integration Software License CrashOverride Regulation 3D Printing Capital Productuvuty Personal Information Financial Managing Stress Printers