facebook linkedin twitter

Tip of the Week: Ward Off Holiday Scammers

Tip of the Week: Ward Off Holiday Scammers

It’s the most wonderful time of the year… for scammers, that is. These kinds of criminals love to take advantage of the gift-giving season. With the right tools for the job, hackers can have a field day stealing sensitive information, like credit card numbers, due to the sheer amount of stuff being purchased by consumers. It’s up to you to stay vigilant and make sure you’re not being scammed, but we have a couple of tricks you can use to stay as safe as possible.

Keep in mind that these are only preventative measures; we can’t guarantee that whoever you’re shopping through is protecting your data adequately, so if the retailer is known for suffering from big data breaches (think Target), perhaps your patronage will be best served elsewhere.

Do Your Research
Going off of the previous point, you’ll want to investigate a little bit to see how well the retailer handles their security. By this, we mean simply going online and seeing if they have been the victim of a massive data breach in previous years. If they have, see what they did about it and whether or not they learned from their mistakes. After all, it would be unfair to judge them on something that happened years ago if they have had a clean record ever since. If you’re unsure or unsettled by any data breaches, there are always other options to shop at, so don’t be too worried.

Check the Physical Vicinity of ATMs
Sometimes you might need some cash in your pocket for a purchase, and while you might think thieving is your biggest problem, ATM scamming is a serious contender. This happens when an ATM has been tampered with to send your banking credentials to a third party--in this case, a hacker. You should always check to see if the ATM has been fitted with devices on the card reader slot, as well as any kind of device attached to the back of it. For example, if the ATM has panels on the back missing, it’s a good sign that perhaps you shouldn’t use that particular machine. Furthermore, make sure that you only use ATMs in well-traveled areas with security cameras, as the chances of the ATM being tampered with are significantly lower.

Be Careful of Wireless Connections
Wireless communications are a significant weak point this holiday season, as public Wi-Fi is notorious for being much more dangerous than any protected network. This is largely in part due to the fact that these networks don’t require a sign-in, and any device can just access it unimpeded. You should keep your devices from accessing these networks automatically, as the data flowing to and from them could be under watch by scammers.

Keep an Eye On Your Devices
As always, the threat of device theft is omnipresent in locations where a lot of people gather. Pickpockets and thieves know full well how much valuable data can be found on these devices, and they might even try to use them for their own purposes. Alternatively, they could sell the devices to make a quick buck or sell the data on the black market to fund further thieving initiatives.

This holiday season be prepared for anything. For more great tips and tricks about how to stay secure with your purchases and online interactions, subscribe to Computerware’s blog.

Cloud Computing Can Be Very Beneficial
How Service Offerings Can Save Your Precious Capit...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Hackers Business Computing Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Business Network Security Saving Money Email Malware IT Services Hosted Solutions Efficiency IT Support Google Small Business Computer Quick Tips User Tips Mobile Devices Smartphones Gadgets Business Continuity Innovation Disaster Recovery Microsoft Office Social Media Android Mobile Office Virtualization Network VoIP Data Backup Mobile Device Management Collaboration Communication Smartphone Server Productivity Miscellaneous Data Recovery Ransomware Upgrade Windows 10 Tech Term Unified Threat Management Windows IT Support communications Remote Monitoring Passwords Facebook Holiday Operating System Mobile Computing Vendor Management Apps Managed IT services Cybersecurity BYOD Remote Computing Phishing BDR Users WiFi Automation The Internet of Things Mobile Device Marketing Analytics Outsourced IT Apple Firewall History Internet of Things Browser Save Money Alert Managed IT Services Artificial Intelligence Data Management IT Consultant Big data Encryption App Content Filtering Bandwidth Going Green Spam Gmail Bring Your Own Device Maintenance Antivirus Printer Office Health Business Technology Office 365 Lithium-ion Battery Budget Best Practice Information Technology Two-factor Authentication Managed IT Windows 10 Windows 8 Outlook Hiring/Firing Hard Drives Help Desk Wireless Technology Cybercrime Saving Time Search Tech Support Virus Cost Management Cloud Computing Phone System Blockchain IBM Money Document Management Training Recovery Employer-Employee Relationship Computers VPN Access Control Travel Hacking Update Risk Management Law Enforcement Save Time Customer Service Compliance Information Data storage Website Government Running Cable Healthcare Proactive IT Networking Administration Humor Legal Hard Drive Applications Regulations Twitter Intranet Mobility Education Managed Service SaaS It Management End of Support Hosted Solution iPhone Patch Management Robot User Data Loss Current Events Business Intelligence Securty Scam Digital Payment Excel Solid State Drive Router Downtime Social Customer Relationship Management Machine Learning Data Breach Wireless Flexibility Comparison Tablet DDoS Augmented Reality Telephone Systems Black Market Digital Cryptocurrency Fax Server Company Culture PowerPoint Project Management Computer Repair Websites Laptop Social Networking Business Growth Word File Sharing Google Maps Password Cortana Value Paperless Office Hacker Avoiding Downtime Social Engineering Sports Data Security Computing Disaster Computing Infrastructure Hack USB Net Neutrality Presentation Pain Points How To Private Cloud IT service Download Monitoring Chrome Co-managed IT Specifications Safety User Error Virtual Desktop Telephony Redundancy Bluetooth Documents Microchip Taxes Management Computer Accessories Entertainment Distributed Denial of Service Evernote Heating/Cooling Vulnerabilities Trending Storage Gaming Console Lifestyle Public Cloud Google Docs Mouse Webcam Start Menu Tech Terms Text Messaging Experience Monitors Statistics Retail Identity Theft Mobile Technology Cleaning Programming Network Congestion Vendor eWaste Software as a Service Office Tips Uninterrupted Power Supply Politics YouTube Virtual Reality Automobile Unified Communications Settings Streaming Media Inbound Marketing Emails Bitcoin Data Protection Processors Chromebook Conferencing Messenger Tracking Software License Organize Trends Business Owner cache Television Multi-Factor Security Cost Read Data Analysis GDPR IP Address WannaCry Downloads Permissions Devices Language Rental Service Meetings Fraud Tactics Application Corporate Profile Cabling UTM Content Human Resources Time Management Web Server Freedom of Information Device Management Tech Books Workers switches IT Plan Writing Enterprise Resource Planning Business Managemenet Wi-Fi Assessment Administrator SharePoint Music Legislation Error Content Management Fileless Malware Webinar Addiction Modem Upselling Google Calendar Accountants A.I. Proxy Server Supercomputer Tip of the week email scam Upgrades Digital Signature VoIP Worker LiFi Multi-factor Authentication Electronic Medical Records Video Surveillance Touchscreen News online Currency Term Saving ZTime Reading Knowledge Samsung Migration Connected Devices Consultation Wireless Headphones Telephone Directions Teamwork Deep Learning Network Management LinkedIn SSID G Suite Technology Tips Equifax Work/Life Balance Fleet Tracking Dark Web Employer Employee Relationship Virtual Assistant Processing Harddrive Audit Licensing Visible Light Communication Device security Memory MSP Health IT PDF Debate Hacks Physical Security Fake News Relocation Tablets IT consulting Desktop Finance Skype GPS Banking Botnet Data Warehousing Best Practives Nanotechnology Social Network Archive Managed IT Service Best Available Keyboard Hard Drive Disposal Business Cards Service Level Agreement Domains Access Sync Startup Asset Tracking Bookmark External Harddrive Emergency Google Play Public Speaking Computer Care Advertising Flash Microserver Username Point of Contact Notifications CCTV Microsoft Excel CIO Unified Threat Management Backup and Disaster Recovery Shortcut Thin CLient Reliable Computing Windows XP Gamification 3D Ebay Business Metrics Google Drive Computer Malfunction Windows Server 2008 Staffing Google Wallet Screen Reader Customer Resource management Processor Vulnerability Piracy Displays Upload Troubleshooting Spyware In Internet of Things Mobile Payment Society Get More Done Smart Tech Distribution Browsers Entrepreneur Smart Phones Security Cameras HIPAA Electricity Printing HTML Turn Key Analytic User Tip Environment Fiber-Optic Micrsooft Printer Server Database Recycling Competition Leadership Scalability Mobile Security Product Reviews Electronic Payment Adminstration Pirating Information Motion Sickness Windows 7 Drones Trojan Telephone System Navigation Regulation Printers CrashOverride Capital 3D Printing Cooperation Productuvuty Medical IT Managing Stress

toner1