4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Ways Thieves are Looking to Scam Shoppers

Tip of the Week: 5 Ways Thieves are Looking to Scam Shoppers

It’s seems unbelievable just how much thought and effort hackers can put into their attacks. Scammers are all over the place, and you can never truly be safe. Here are five scams that you should always be on the lookout for.

1. Be Careful Where You Donate
Donations are great ways to show your support for certain causes, and they’re also tax-deductible. However, hackers have been known to take advantage of the people’s generosity. Many will set up fake charity websites that will scam people with good intentions. This money, which was meant to be used to help others, is now funding a hacker’s agenda.

To guarantee that you’re donating to a reputable charity, AARP recommends the following: “Before donating to a charity, make sure it is registered with the Secretary of State and ask how much of the money goes to the charitable fundraiser and how much goes to the charitable purpose.”

2. Look Out for Fake Gift Cards
Gift cards are often purchased as last-ditch present ideas for birthdays or holidays, but they are also one of the primary ways that scammers will use to make a quick buck off of unwary people. If you see deals on online auction sites for discounted gift cards, you should stay away from them, as they could easily be stolen, making them worthless. Make sure that you only purchase gift cards from trusted, licensed vendors. Plus, you want to make sure that the cashier can check the balance of the card before purchase, so that any cards placed on the shelves by a thief don’t play you for a fool.

3. Track Your Packages
If you’ve ever ordered something online, you’ll know that it can be tricky to arrange for packages to be delivered to your residence while you’re home. After all, what’s stopping a thief from walking to your front porch, picking up your package, and taking off down the road? It’s unlikely that the thief would know what’s in the box, but desperate times call for desperate measures, and perhaps all they want is a way to make a quick buck. To keep this from becoming a problem, ask that your package require a signature upon delivery, or have it shipped to your work address, just in case nobody is home.

4. Watch for Credit Card Skimmers
Some thieves will use credit card skimming devices to steal your data from ATMs or point-of-sale terminals. This means that you should probably be shopping with a credit card over a debit card, but more than anything else, cash trumps this card skimming tactic. It’s also helpful to take note of the device that you’re using to pay with a card to ensure that it hasn’t been tampered with.

5. Don’t Fall for Bogus Deals
Here’s one last tip that might be one of the most basic: an offer that’s too good to be true is probably just that. A purchase that seems like the deal of a lifetime might be nothing but a scammer who wants to make off with your goods or your cash. Remember that if there’s so much as a hint of skepticism concerning your purchase, you should approach the situation with a hefty dose of skepticism.

Stay Safe Online
The Internet is full of threats, so the best way to stay safe is to follow this brief list of security best practices:

  • Before submitting any sensitive information, look for the padlock icon in the address bar, along with HTTPS at the beginning of the URL.
  • Only shop on websites that have a good reputation.
  • Avoid using public Wi-Fi when shopping online.
  • Avoid using your debit card online. Instead, use credit cards and gift cards.
  • Be skeptical of unsolicited emails in your inbox, especially when it comes to fake invoices and bogus shipping orders.

Does your business have concerns about shopping online’ or protecting its digital assets? 4IT can help. To learn more, reach out to us at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Business Computing Internet software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware IT Services Business Google Efficiency Windows Disaster Recovery Innovation IT Support Hardware Workplace Tips Business Continuity Computer Saving Money VoIP Upgrade Windows 10 Miscellaneous Virtualization User Tips Mobile Devices Data Mobile Device Management Server Mobile Computing Email Network Security Alert Communication Network Save Money Microsoft Office communications Quick Tips Going Green Mobile Office Information Technology Social Media Smartphones BYOD Health Apps Android Small Business Office Smartphone Browser Operating System Application Chrome Gadgets Outsourced IT Ransomware Disaster Tablet Productivity Managed IT Services Firewall Avoiding Downtime Risk Management Search Cybercrime Holiday WiFi Managed IT Telephone Systems The Internet of Things Remote Computing Unified Threat Management IT Solutions Passwords Spam Mobility BDR Best Practice Data Management History Remote Monitoring Employer-Employee Relationship Budget Facebook Cybersecurity Automation Hard Drives Vendor Management Saving Time Hacking Phishing Password Collaboration Hosted Solution Customer Relationship Management Computers Wireless Technology VPN Recovery Phone System Law Enforcement Big Data Apple Office Tips Marketing Proactive IT Shortcut User Error Money Social Humor Administration Lithium-ion battery Wearable Technology iPhone Maintenance PowerPoint Telephony Current Events Virus Printer USB Content Filtering Office 365 Analytics Bring Your Own Device Gmail Router Antivirus Point of Sale Business Intelligence Cost Management IT COnsultant Data Backup Intranet Wireless Computer Repair Bandwidth Unsupported Software Printer Server Social Engineering Laptop Cloud Computing Google Drive OneNote Save Time Education Trending Private Cloud Net Neutrality Users Windows 8 Work/Life Balance Tech Support Data Recovery Outlook Encryption HaaS Government App Travel online currency Computer Care Battery Robot Update Customer Service Biometrics Retail Automobile End of Support Virtual Reality Meetings Efficency Internet Exlporer Instant Messaging Emails Social Networking Internet of Things HIPAA Identity Theft Data Protection Solid State Drive Entertainment Flexibility Benefits DDoS Computer Accessories Display IT Support Mouse Compliance Augmented Reality Paperless Office Samsung Vulnerability Wi-Fi Emergency Two-factor Authentication Managing Stress Fax Server SaaS Excel Applications Workplace Network Congestion Audit hacker Streaming Media Personal Information Data Storage Help Desk Uninterrupted Power Supply Transportation IT Technicians Dark Web Twitter Experience Keyboard Avoid Downtime Screen Mirroring Nokia Surge Protector SharePoint Television Music Hiring/Firing Cast 3D Printing Windows 10s Teamwork Data storage Busines Continuity Nanotechnology Books Smart Technology Video Games Networking Near Field Communication Data Security Tablets ISP Hard Disk Drive Document Management Data Breach Advertising Root Cause Analysis Legal Human Resources IT consulting HBO Touchpad NFL Programming best practices Blogging Mobile Device Running Cable Managed Security CrashOverride Hard Drive Scam Reliable Computing IT Management Word data breach Website Bloatware Settings Uograde Images Employer Employee Relationship Sports WIndows Server 2008 Operating Sysytem OneDrive risk management Worker Commute PDF Amazon Patch Management Co-managed IT Scalability Branding Files Distributed Denial of Service Windows 10 Safety Text Messaging Commerce WIndows 7 Regulation How To Chromecast eWaste Inbound Marketing Ebay Upgrades Wiring Artificial Intelligence Regulations Computing Sync Information Training Administrator Colocation Value iOS Consultant The Blindside Of Cameras Managed IT Service Debate User Adobe Managed IT Services Company Culture Black Market Access Science Computer Fan Touchscreen Politics IT Security Virtual Desktop Presentation Best Available Licensing Cleaning Bluetooth Relocation Mobile IT solutions Buisness Professional Services Gift Giving Taxes Youtube Microblogging Windows Ink Supercomputer Electronic Medical Records Sales IT Budget Managed Service Provder Webinar Lifestyle Reputation Storage IT service Domains Tutorial Webinar Shadow IT