4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Holiday Season, the Greatest Gift of All Could Be Your Personal Information

This Holiday Season, the Greatest Gift of All Could Be Your Personal Information

Hackers always love the holiday season. Lots of people are spending lots of money (both online and in-store) for the perfect gifts for their loved ones. When there are so many people making purchases all over the world, there are countless opportunities to steal information. Data such as credit card numbers and personally identifiable information can be taken and used to make people’s lives pretty miserable, during what is supposed to be the most wonderful time of the year.

Holidays are the perfect chance for hackers to take advantage of unsuspecting consumers, which means that you need to take extra precaution when doing your holiday shopping.

Just a few short years ago, Target suffered a massive data breach around the holiday season that exposed countless users’ personal and financial information, putting the exposed people in peril and ruining many a holiday season.

We’ll walk you through some tips about how to be careful both in-store and online.

Look for Encryption Protocol
Before you shop for anything online, look for encryption protocol set up on any retail websites or payment portals. By this, we mean that the site has been equipped with HTTPS security protocol, which hides your payment credentials behind a layer of encryption designed to obfuscate your information in the event of a breach. Furthermore, you should only shop via trusted online retailers and not sketchy unheard-of stores for hard-to-find items.

Make Purchases with Cash
One of the best ways to keep your credit card information safe during the holiday season is to just make purchases with cash. This is a simple preventative method, but it can be somewhat risky to carry a lot of cash in case of theft or loss. It’s all about risk management, so only carry what you need.

Use Online Wallets
Services like Apple Pay and Android Pay can act as a go-between for the retailer and your bank account, and as long as you only add cash as part of a one-time addition (so that the app doesn’t store your information), you can effectively limit the risk associated with using these services to make payments. Due to the increase in popularity of smartphones over the past several years, most retailers accept some form of payment via smartphone app. Just do a little bit of research beforehand so that you’re not caught off-guard when a retailer doesn’t allow it.

With these tips from 4IT, you’ll be sure to stay safe during this holiday season.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 15 December 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows Innovation IT Support Disaster Recovery Business Continuity Hardware Workplace Tips VoIP User Tips Saving Money Computer Miscellaneous Virtualization Windows 10 Upgrade Mobile Devices Mobile Device Management Data Network Security Server Mobile Computing Email Alert Save Money Microsoft Office Communication Network communications Quick Tips Smartphone Small Business Information Technology Social Media Smartphones BYOD Going Green Mobile Office Health Android Office Apps Gadgets Operating System Chrome Application Ransomware Managed IT Services Outsourced IT Browser WiFi Holiday Mobility Firewall Avoiding Downtime Disaster Productivity Managed IT Tablet Best Practice Data Management Cybercrime The Internet of Things Passwords Remote Computing Telephone Systems Unified Threat Management IT Solutions Spam BDR Risk Management Cybersecurity Search VPN Apple Facebook Employer-Employee Relationship Budget Vendor Management Hard Drives Automation Saving Time Hacking Remote Monitoring History Collaboration Phishing Wireless Technology Password Data Recovery Hosted Solution Computers Money Big Data Marketing Phone System Content Filtering Recovery Data Backup Proactive IT Office Tips User Error iPhone Law Enforcement Customer Relationship Management PowerPoint Shortcut Virus Social Office 365 Current Events Vulnerability Telephony Bring Your Own Device Printer USB Analytics Encryption Gmail Router Humor Government Administration Wearable Technology Work/Life Balance Lithium-ion battery Antivirus Maintenance Printer Server Business Intelligence Laptop OneNote Users Windows 8 Politics Trending Personal Information Education Social Engineering Net Neutrality Wireless Tech Support Unsupported Software Private Cloud Cloud Computing Google Drive Outlook Point of Sale IT COnsultant Save Time Data Security Computer Repair Data Protection App SaaS Cost Management Audit HaaS Intranet Bandwidth Travel Social Networking Samsung Wi-Fi Emergency IT Support Artificial Intelligence Efficency Update Customer Service Biometrics Applications Windows 10 Retail Virtual Reality hacker Meetings Transportation Display Emails Computer Care Battery Instant Messaging Robot Augmented Reality Data Storage HIPAA Entertainment Automobile Benefits End of Support Network Congestion Paperless Office DDoS Computer Accessories Fax Server Help Desk Mouse Internet Exlporer Compliance Workplace Streaming Media Internet of Things Two-factor Authentication Identity Theft Solid State Drive Managing Stress Uninterrupted Power Supply Flexibility Excel Sports online currency WIndows Server 2008 IT Technicians How To Chromecast Upgrades Windows Ink Hard Drive risk management SharePoint ISP Training Patch Management Administrator Colocation Uograde Consultant Google Maps Images The Blindside Of Commerce Teamwork Programming Blogging Busines Continuity Company Culture Regulation Black Market Access Networking Near Field Communication Touchscreen Software as a Service IT Security Website Cleaning Sync Human Resources IT consulting Data Loss Experience iOS Keyboard Managed IT Service Running Cable Avoid Downtime OneDrive Amazon Adobe Wiring Managed IT Services Reliable Computing Information Co-managed IT Google Docs Music Computer Fan Hiring/Firing Debate Licensing Bloatware Data storage Dark Web Microsoft Excel Lifestyle Books Smart Technology Screen Mirroring Video Games Ebay Computing Document Management Data Breach Branding Advertising File Sharing Cast Distributed Denial of Service Legal Touchpad Mobile Device Windows 10s Managed Security Nanotechnology WIndows 7 Nokia systems Inbound Marketing Scam eWaste Storage Regulations Tablets Hard Disk Drive Root Cause Analysis hack Value Twitter Employer Employee Relationship HBO Operating Sysytem Cameras NFL Worker Commute best practices CrashOverride PDF User Cortana Surge Protector Television IT Management Scalability Science Files Virtual Desktop 3D Printing Presentation Word data breach Safety Settings Bluetooth Text Messaging Best Available Legislation Reputation Comparison Gift Giving Microblogging Youtube Buisness Specifications Sales Managed Service Provder Conferencing Webinar Shadow IT Relocation Gifts Redundancy Webinar Credit Cards Mobile IT solutions FAQ Professional Services Tutorial Taxes IT service Supercomputer Electronic Medical Records Domains IT Budget