Get Started Today!  321-259-5500

croom new

Tip of the Week: Watch Out for Scammers During the Holidays

Tip of the Week: Watch Out for Scammers During the Holidays

Scammers find the holidays to be a wonderful time for stealing from unsuspecting victims. They know that the gift-giving season inspires others to spend a lot of money, which means that sensitive information, like credit card numbers, is up for grabs in bulk. As a consumer yourself, you’ll have to keep an eye out for these scams to make sure that you’re staying as safe as possible this holiday season.

Please keep in mind that what we recommend can only be seen as preventative measures. We can’t guarantee that your data will be protected adequately on the side of the business you’re purchasing from. If the retailer is known for suffering from data breaches (like Target), you might try to find other places to purchase gifts from, as you don’t want to risk your data becoming the target of hackers.

Do Some Research
Before you commit to a purchase, you should first see if the retailer has control over their security. Just go online and see if there have been any considerable data breaches for the retailer in the past few years. While it might seem a little unfair to judge a retailer based on what happened years ago, you need to look at what they have done since to improve security. If you suspect that the retailer hasn’t put in the work to keep their consumers safe, then just take your business elsewhere.

Check the Physical Area Around ATMs
While you might be hesitant to keep too much cash on you while you go shopping, sometimes it’s unavoidable. You might find yourself using an ATM, and hackers understand this need all too well. ATM scamming is nothing new, but it can be devastating under the right circumstances. ATMs can be tampered with to send credentials to a third party. ATMs can be fitted with devices on the card reader slot, or even have devices attached to the back. If the ATM has back panels missing, or devices attached to it, you should never use it. Make sure to double check for suspicious devices being fit to either the card reader or the backs of the machines, and only use ATMs that are in well-traveled areas that have security cameras in place.

Be Careful of Wireless Connections
Wireless communications are important while shopping this holiday season, but you should never use public Wi-Fi if you can help it. You’re better off using your mobile data plan, as unsecured networks that don’t require a sign-in are well-known dangers. You should set your devices so that they don’t automatically connect to these networks, as the data going into and out of your device could be watched by scammers.

Keep an Eye on Your Devices
Device theft is even more common during the holiday season, as more people are out. Pickpockets and thieves are more common, and they know how valuable your data and devices are. They could sell the information on the black market or sell the devices entirely.

For more great tips and tricks on how to stay safe and secure during the holiday season, subscribe to TotalCareIT™’s blog.

How IT Benefits a Small Business’ Growth Potential
Why You Shouldn't Say “Humbug” to Your Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, February 23 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!

 

Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Malware Business Computing Business Email Hosted Solutions Internet Productivity IT Services Computer Data Backup Network Security Mobile Devices Productivity Software Hardware Microsoft Managed Service Provider Google Ransomware Windows 10 Efficiency Tech Term User Tips Workplace Tips Smartphone Innovation Android Business Continuity Cloud Computing Disaster Recovery Small Business Social Media Data Management IT Support Business Management Server Smartphones Encryption IT Support Network Browser Communication Data Backup App Managed IT Services BYOD Office 365 Facebook Data Recovery Artificial Intelligence Outsourced IT Upgrade Office Windows Gmail Big Data Internet of Things Passwords Phishing Apps Employer-Employee Relationship Paperless Office Vendor Management Mobile Device Management WiFi Save Money Remote Monitoring Holiday Windows 10 Managed IT Services Government Hosted Solution Robot Firewall Wireless Technology Risk Management VoIP Miscellaneous Recovery Wireless Collaboration Wi-Fi Vulnerability Office Tips Two-factor Authentication Spam Microsoft Office Alert IT solutions Word Content Filtering Automation Virtualization Budget Bandwidth Avoiding Downtime Saving Money Cybersecurity Social Scam Document Management Website How To Money IT Management Hacker Customer Service Chrome Quick Tips Infrastructure VPN Tip of the week Work/Life Balance Antivirus Password The Internet of Things Machine Learning Blockchain Unified Threat Management Data storage Virtual Reality IT service Going Green Apple Tablet Analytics Customer Relationship Management Education Bring Your Own Device Politics SaaS Twitter BDR Mobile Device Settings Cybercrime Applications Computing Information Hard Drives Managed Service Business Technology Maintenance Legal Storage Healthcare Downtime communications Tech Support Remote Computing Hacking Presentation Compliance Safety YouTube Business Owner How To Unified Communications Competition Samsung Automobile Users Server Management IBM User Augmented Reality Network Management Solid State Drive Regulations Cost Management LiFi eWaste Virtual Desktop User Error Running Cable Management End of Support Sports Private Cloud Data loss Outlook Computer Care Patch Management Access Control HIPAA Printing Health Administration Business Intelligence Identity Theft Upgrades Websites Mouse Training Computers Router File Sharing Best Practice Operating System Electronic Medical Records Search Data Security Physical Security G Suite Mobile Security Botnet Point of Sale Chromebook Virtual Private Network Heating/Cooling Google Drive Taxes Cortana Monitors Telephone Systems Lithium-ion battery Emoji ROI IT Budget Servers Lenovo Hotspot Halloween Typing Unsupported Software IoT Favorites Web Server Corporate Profile Black Friday Dark Data GPS Time Management Mail Merge Microsoft Excel Identities Law Enforcement Cookies Electronic Health Records Motion Sickness Uninterrupted Power Supply Multi-Factor Security Mirgation Google Wallet Google Docs Help Desk Vulnerabilities RMM IT Consultant Dark Web Entrepreneur Consulting Unified Threat Management Staff CIO Current Events Backups Personal Information Recycling Remote Monitoring and Management OneNote Notes Digital Payment Superfish Language Scary Stories Cryptocurrency Mobile Data Relocation Star Wars Instant Messaging Cameras WannaCry Cyber Monday Development Tech Terms Tracking Address Mobile Computing Gadget Nanotechnology Files Hard Disk Drive Google Calendar Chatbots Drones Cleaning Firefox Shortcut Net Neutrality Knowledge Writing Notifications Managed Services Provider Administrator Printer Wearable Technology Computer Repair Zero-Day Threat Black Market Employee-Employer Relationship PowerPoint Computing Infrastructure Bitcoin Assessment Finance CCTV Application Fun Smart Technology Cables Theft Touchscreen Permissions Screen Reader Read Only Meetings Legislation Identity FCC Experience Retail Environment Crowdsourcing Motherboard E-Commerce Cabling Company Culture Human Error Network Congestion Remote Workers Professional Services Networking Alerts Windows 8 Internet Exlporer Authentication Digital Statistics Distributed Denial of Service Wires Financial Fraud Business Growth Smart Tech Printers Webcam Law Comparison Humor Update Undo Title II Deep Learning Social Engineering Features IP Address SharePoint Analyitcs Managing Stress Permission Managed IT Service Hiring/Firing Display Processors Wasting Time Google Maps Licensing Buisness Hacks iPhone Hard Drive Authorization Spyware Bluetooth Security Cameras Supercomputer Public Speaking Laptop Alt Codes 3D Printing Connectivity Bookmarks 5G Specifications Social Networking Co-managed IT Save Time Staffing VoIP Online Troubleshooting Modem Travel Disaster Mobile Office Downloads IT Technicians Information Technology Marketing Managed IT Enterprise Content Management Test Refrigeration Break Fix Monitoring Error Techology Cooperation Trending Gadgets Cache Employees Regulation USB Flexibility Database Voice over Internet Protocol Domains Emergency CrashOverride

      Latest Blog Entry

      When encryption is discussed, one of its high points that business professionals try to hammer home is that it’s more secure. But what does encryption really mean for businesses? Does it adequately protect data and devices? We’ll walk you through a brief rundown of how encry...

      Account Login