4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Ways Thieves are Looking to Scam Shoppers

Tip of the Week: 5 Ways Thieves are Looking to Scam Shoppers

It’s seems unbelievable just how much thought and effort hackers can put into their attacks. Scammers are all over the place, and you can never truly be safe. Here are five scams that you should always be on the lookout for.

1. Be Careful Where You Donate
Donations are great ways to show your support for certain causes, and they’re also tax-deductible. However, hackers have been known to take advantage of the people’s generosity. Many will set up fake charity websites that will scam people with good intentions. This money, which was meant to be used to help others, is now funding a hacker’s agenda.

To guarantee that you’re donating to a reputable charity, AARP recommends the following: “Before donating to a charity, make sure it is registered with the Secretary of State and ask how much of the money goes to the charitable fundraiser and how much goes to the charitable purpose.”

2. Look Out for Fake Gift Cards
Gift cards are often purchased as last-ditch present ideas for birthdays or holidays, but they are also one of the primary ways that scammers will use to make a quick buck off of unwary people. If you see deals on online auction sites for discounted gift cards, you should stay away from them, as they could easily be stolen, making them worthless. Make sure that you only purchase gift cards from trusted, licensed vendors. Plus, you want to make sure that the cashier can check the balance of the card before purchase, so that any cards placed on the shelves by a thief don’t play you for a fool.

3. Track Your Packages
If you’ve ever ordered something online, you’ll know that it can be tricky to arrange for packages to be delivered to your residence while you’re home. After all, what’s stopping a thief from walking to your front porch, picking up your package, and taking off down the road? It’s unlikely that the thief would know what’s in the box, but desperate times call for desperate measures, and perhaps all they want is a way to make a quick buck. To keep this from becoming a problem, ask that your package require a signature upon delivery, or have it shipped to your work address, just in case nobody is home.

4. Watch for Credit Card Skimmers
Some thieves will use credit card skimming devices to steal your data from ATMs or point-of-sale terminals. This means that you should probably be shopping with a credit card over a debit card, but more than anything else, cash trumps this card skimming tactic. It’s also helpful to take note of the device that you’re using to pay with a card to ensure that it hasn’t been tampered with.

5. Don’t Fall for Bogus Deals
Here’s one last tip that might be one of the most basic: an offer that’s too good to be true is probably just that. A purchase that seems like the deal of a lifetime might be nothing but a scammer who wants to make off with your goods or your cash. Remember that if there’s so much as a hint of skepticism concerning your purchase, you should approach the situation with a hefty dose of skepticism.

Stay Safe Online
The Internet is full of threats, so the best way to stay safe is to follow this brief list of security best practices:

  • Before submitting any sensitive information, look for the padlock icon in the address bar, along with HTTPS at the beginning of the URL.
  • Only shop on websites that have a good reputation.
  • Avoid using public Wi-Fi when shopping online.
  • Avoid using your debit card online. Instead, use credit cards and gift cards.
  • Be skeptical of unsolicited emails in your inbox, especially when it comes to fake invoices and bogus shipping orders.

Does your business have concerns about shopping online’ or protecting its digital assets? 4IT can help. To learn more, reach out to us at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 26 July 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet Business Computing software Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Malware Business Efficiency Google IT Services Windows Innovation IT Support Disaster Recovery Hardware Workplace Tips Saving Money Miscellaneous VoIP Business Continuity Upgrade Windows 10 Computer Virtualization Mobile Devices Data Server Mobile Device Management User Tips Mobile Computing Network Security Save Money Communication Network Alert Quick Tips Smartphones Information Technology BYOD Going Green Mobile Office Email Social Media Smartphone Health Microsoft Office Apps communications Small Business Office Operating System Android Application Ransomware Gadgets Firewall Disaster Avoiding Downtime Managed IT Services Outsourced IT Tablet Browser Search Passwords Holiday Chrome The Internet of Things Productivity Remote Computing Risk Management Unified Threat Management IT Solutions WiFi BDR Mobility Automation Vendor Management Hacking Best Practice Data Management Facebook Managed IT Remote Monitoring Hard Drives History Spam Saving Time Telephone Systems Employer-Employee Relationship Budget Apple Office Tips Marketing VPN Wireless Technology Big Data Password Cybercrime Hosted Solution Customer Relationship Management Cybersecurity Recovery User Error Lithium-ion battery Collaboration Bring Your Own Device Money Current Events Antivirus Social Humor Administration Phishing Printer Wearable Technology USB iPhone Content Filtering Computers Maintenance Analytics PowerPoint Law Enforcement Telephony Virus Router Gmail Proactive IT Phone System Intranet Bandwidth Printer Server Laptop Wireless OneNote HaaS Cloud Computing Point of Sale Trending Google Drive Education IT COnsultant Net Neutrality Business Intelligence Save Time Computer Repair Tech Support Social Engineering Encryption Work/Life Balance Private Cloud Users App Office 365 Government Windows 8 Cost Management Mouse hacker Personal Information Transportation Two-factor Authentication Managing Stress Computer Care Battery Robot SaaS Efficency Network Congestion Audit Unsupported Software Automobile End of Support Help Desk Shortcut Internet Exlporer Customer Service Display Update IT Support Biometrics Retail Internet of Things Virtual Reality Identity Theft Augmented Reality Data Protection Solid State Drive Paperless Office Flexibility Meetings Fax Server Outlook Instant Messaging Social Networking Emails Workplace HIPAA Samsung Streaming Media Entertainment Benefits Uninterrupted Power Supply DDoS Computer Accessories online currency Compliance Black Market Surge Protector Access Distributed Denial of Service Company Culture Data Backup Touchscreen Politics Television Cast 3D Printing WIndows 7 IT Security Cleaning Inbound Marketing eWaste Windows 10s Nanotechnology Regulations Experience Wiring Avoid Downtime Data Security Information Keyboard Value Hard Disk Drive ISP Excel Root Cause Analysis Debate Cameras Music HBO User Hiring/Firing Blogging Data storage best practices Programming Science CrashOverride Virtual Desktop Presentation Books Video Games IT Management Bluetooth Best Available Smart Technology Website Travel Document Management IT Technicians data breach Settings Data Breach Advertising Legal SharePoint Nokia Mobile Device Touchpad risk management OneDrive Amazon Managed Security Teamwork Scam Co-managed IT Busines Continuity Windows 10 Commerce Networking Near Field Communication Sports Employer Employee Relationship Vulnerability Ebay Worker Commute Operating Sysytem Data Recovery Human Resources Computing IT consulting PDF Scalability Files Running Cable iOS Managed IT Service Reliable Computing Safety Hard Drive Text Messaging How To Chromecast Managed IT Services Computer Fan Bloatware Upgrades Wi-Fi Data Storage Uograde Emergency Images Artificial Intelligence Administrator Training Dark Web Consultant Applications Twitter Colocation Screen Mirroring Branding The Blindside Of Managed Service Provder IT solutions Webinar Shadow IT Storage Relocation IT service Gift Giving Domains WIndows Server 2008 Buisness Taxes Lifestyle Supercomputer Electronic Medical Records IT Budget Microblogging Youtube Tutorial Reputation Webinar Sales