Emerald City Solutions

Stay up-to-date with the latest technology news.

Tip of the Week: 5 Ways Thieves are Looking to Scam Shoppers

Tip of the Week: 5 Ways Thieves are Looking to Scam Shoppers

It’s seems unbelievable just how much thought and effort hackers can put into their attacks. Scammers are all over the place, and you can never truly be safe. Here are six scams that you should always be on the lookout for.

Be Careful Where You Donate
Donations are great ways to show your support for certain causes, and they’re also tax-deductible. However, hackers have been known to take advantage of the people’s generosity. Many will set up fake charity websites that will scam people with good intentions. This money, which was meant to be used to help others, is now funding a hacker’s agenda.

To guarantee that you’re donating to a reputable charity, AARP recommends the following: “Before donating to a charity, make sure it is registered with the Secretary of State and ask how much of the money goes to the charitable fundraiser and how much goes to the charitable purpose.”

Look Out for Fake Gift Cards
Gift cards are often purchased as last-ditch present ideas for birthdays or holidays, but they are also one of the primary ways that scammers will use to make a quick buck off of unwary people. If you see deals on online auction sites for discounted gift cards, you should stay away from them, as they could easily be stolen, making them worthless. Make sure that you only purchase gift cards from trusted, licensed vendors. Plus, you want to make sure that the cashier can check the balance of the card before purchase, so that any cards placed on the shelves by a thief don’t play you for a fool.

Track Your Packages
If you’ve ever ordered something online, you’ll know that it can be tricky to arrange for packages to be delivered to your residence while you’re home. After all, what’s stopping a thief from walking to your front porch, picking up your package, and taking off down the road? It’s unlikely that the thief would know what’s in the box, but desperate times call for desperate measures, and perhaps all they want is a way to make a quick buck. To keep this from becoming a problem, ask that your package require a signature upon delivery, or have it shipped to your work address, just in case nobody is home.

Watch for Credit Card Skimmers
Some thieves will use credit card skimming devices to steal your data from ATMs or point-of-sale terminals. This means that you should probably be shopping with a credit card over a debit card, but more than anything else, cash trumps this card skimming tactic. It’s also helpful to take note of the device that you’re using to pay with a card to ensure that it hasn’t been tampered with.

Don’t Fall for Bogus Deals
Here’s one last tip that might be one of the most basic: an offer that’s too good to be true is probably just that. A purchase that seems like the deal of a lifetime might be nothing but a scammer who wants to make off with your goods or your cash. Remember that if there’s so much as a hint of skepticism concerning your purchase, you should approach the situation with a hefty dose of skepticism.

Stay Safe Online
The Internet is full of threats, so the best way to stay safe is to follow this brief list of security best practices:

  • Before submitting any sensitive information, look for the padlock icon in the address bar, along with HTTPS at the beginning of the URL.
  • Only shop on websites that have a good reputation.
  • Avoid using public Wi-Fi when shopping online.
  • Avoid using your debit card online. Instead, use credit cards and gift cards.
  • Be skeptical of unsolicited emails in your inbox, especially when it comes to fake invoices and bogus shipping orders.

Does your business have concerns about shopping online’ or protecting its digital assets? Emerald City Solutions can help. To learn more, reach out to us at (206) 340-1616.

Would You Be “Happy” to Lose 24 Hours’ Worth of Da...
You Can’t Afford to Let Your Network Go Unmanaged

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 17 August 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Tag Cloud

Tip of the Week security email technology Best Practices Privacy IT Support malware Business Computing User Tips Business Management Software Backup hackers Cloud Hosted Solutions Internet Google phishing business Managed IT Services Ransomware Small Business Social Media Unsupported Software Passwords Microsoft Efficiency Marketing Facebook Cloud Computing Browser Productivity threats Hardware Outsourced IT Windows Android Disaster Recovery Managed IT business owner App devices Alert Gadgets Smartphone emails Screen Mirroring IT Services WIndows Server 2008 Upgrades data leak access Office 365 Windows 10 BYOD Patch Management Innovation Law Enforcement company ’s network today ’s business world Vulnerability Social Engineering Mobile Device Management Outlook Nanotechnology WiFi solutions Meetings Smartphones Employer-Employee Relationship business computer system Data Security Shortcut Wireless mobile business Network Webinar Communications snail mail HBO Excel Root Cause Analysis consumer goods cyber threats IT solutions Money iOS Telephone Systems spam cost Google Drive Microsoft Office Application BDR technology research organization Commerce Operating System Touchscreen Business Continuity Consultant Data Protection Computers Augmented Reality locks users Data Recovery Windows 10s Managed Service Provider Audit Unified Threat Management time Risk Management Virtualization Chrome Apps email protection blocks admittance Hosted Solution Solid State Drive Cybersecurity Cybercrime employees IT Management Spam today ’s Internet text messages Data Storage Hard Disk Drive Computer Care Best Practice Business ’ Security Businesses IT Solutions CrashOverride SaaS Facebook pop-ups Information Technology Computer Fan network security Proactive IT Emerald City Solutions OneNote Save Money search engines Cast Computer

Recent Comments

No comments yet.