4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Ways Thieves are Looking to Scam Shoppers

Tip of the Week: 5 Ways Thieves are Looking to Scam Shoppers

It’s seems unbelievable just how much thought and effort hackers can put into their attacks. Scammers are all over the place, and you can never truly be safe. Here are five scams that you should always be on the lookout for.

1. Be Careful Where You Donate
Donations are great ways to show your support for certain causes, and they’re also tax-deductible. However, hackers have been known to take advantage of the people’s generosity. Many will set up fake charity websites that will scam people with good intentions. This money, which was meant to be used to help others, is now funding a hacker’s agenda.

To guarantee that you’re donating to a reputable charity, AARP recommends the following: “Before donating to a charity, make sure it is registered with the Secretary of State and ask how much of the money goes to the charitable fundraiser and how much goes to the charitable purpose.”

2. Look Out for Fake Gift Cards
Gift cards are often purchased as last-ditch present ideas for birthdays or holidays, but they are also one of the primary ways that scammers will use to make a quick buck off of unwary people. If you see deals on online auction sites for discounted gift cards, you should stay away from them, as they could easily be stolen, making them worthless. Make sure that you only purchase gift cards from trusted, licensed vendors. Plus, you want to make sure that the cashier can check the balance of the card before purchase, so that any cards placed on the shelves by a thief don’t play you for a fool.

3. Track Your Packages
If you’ve ever ordered something online, you’ll know that it can be tricky to arrange for packages to be delivered to your residence while you’re home. After all, what’s stopping a thief from walking to your front porch, picking up your package, and taking off down the road? It’s unlikely that the thief would know what’s in the box, but desperate times call for desperate measures, and perhaps all they want is a way to make a quick buck. To keep this from becoming a problem, ask that your package require a signature upon delivery, or have it shipped to your work address, just in case nobody is home.

4. Watch for Credit Card Skimmers
Some thieves will use credit card skimming devices to steal your data from ATMs or point-of-sale terminals. This means that you should probably be shopping with a credit card over a debit card, but more than anything else, cash trumps this card skimming tactic. It’s also helpful to take note of the device that you’re using to pay with a card to ensure that it hasn’t been tampered with.

5. Don’t Fall for Bogus Deals
Here’s one last tip that might be one of the most basic: an offer that’s too good to be true is probably just that. A purchase that seems like the deal of a lifetime might be nothing but a scammer who wants to make off with your goods or your cash. Remember that if there’s so much as a hint of skepticism concerning your purchase, you should approach the situation with a hefty dose of skepticism.

Stay Safe Online
The Internet is full of threats, so the best way to stay safe is to follow this brief list of security best practices:

  • Before submitting any sensitive information, look for the padlock icon in the address bar, along with HTTPS at the beginning of the URL.
  • Only shop on websites that have a good reputation.
  • Avoid using public Wi-Fi when shopping online.
  • Avoid using your debit card online. Instead, use credit cards and gift cards.
  • Be skeptical of unsolicited emails in your inbox, especially when it comes to fake invoices and bogus shipping orders.

Does your business have concerns about shopping online’ or protecting its digital assets? 4IT can help. To learn more, reach out to us at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 24 January 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Innovation Disaster Recovery Business Continuity Hardware VoIP Workplace Tips Mobile Devices User Tips Saving Money Computer Miscellaneous Virtualization Windows 10 Upgrade Network Security Mobile Device Management Data Server Mobile Computing Email communications Alert Save Money Microsoft Office Communication Network Social Media Quick Tips Smartphone Small Business Smartphones Information Technology BYOD Going Green Mobile Office Android Health Office Managed IT Services Outsourced IT Apps Operating System Application Ransomware Chrome Browser Gadgets Mobility Holiday Firewall The Internet of Things Avoiding Downtime Disaster Productivity Tablet Managed IT Cybersecurity WiFi Search Cybercrime Data Backup Passwords Telephone Systems Remote Computing Unified Threat Management IT Solutions Risk Management Spam Data Recovery History BDR Best Practice Data Management Apple VPN Employer-Employee Relationship Marketing Budget Vendor Management Facebook Automation Hard Drives Hacking Saving Time Remote Monitoring Password Collaboration Hosted Solution Computers Wireless Technology Money Recovery Phone System Big Data Content Filtering Office Tips iPhone Customer Relationship Management Proactive IT Law Enforcement User Error Phishing Office 365 Lithium-ion battery Telephony Bring Your Own Device Current Events Printer Humor Administration USB Encryption Wearable Technology Analytics Vulnerability Gmail Router Antivirus Maintenance PowerPoint Shortcut Government Virus Work/Life Balance Social Windows 8 Bandwidth Printer Server Social Engineering Laptop Politics Personal Information OneNote Data Security Private Cloud Trending Education Net Neutrality Wireless Unsupported Software Point of Sale IT COnsultant Cloud Computing Google Drive Tech Support Computer Repair Save Time SaaS Outlook Audit HaaS Data Protection Business Intelligence App Cost Management Users Intranet Artificial Intelligence Emergency Virtual Reality Meetings Applications Efficency hacker Instant Messaging Emails Transportation HIPAA Entertainment Computer Care Benefits Battery Network Congestion Robot DDoS Computer Accessories Display Automobile Help Desk Compliance Mouse End of Support Augmented Reality Two-factor Authentication IT Support Internet Exlporer Paperless Office Managing Stress Windows 10 Excel Internet of Things Fax Server Identity Theft Solid State Drive Workplace Flexibility Sports Streaming Media Travel Social Networking Uninterrupted Power Supply online currency Update Customer Service Samsung Redundancy Data Storage Biometrics Wi-Fi Retail Dark Web Busines Continuity 3D Printing Microsoft Excel Training Networking Screen Mirroring Near Field Communication Administrator Consultant Colocation The Blindside Of File Sharing Company Culture Human Resources Black Market Cast IT consulting Access ISP Touchscreen Running Cable Windows 10s Nanotechnology Wiring IT Security systems Cleaning Reliable Computing Information Programming Blogging Experience Tablets Hard Disk Drive Bloatware Avoid Downtime Root Cause Analysis Debate Keyboard hack Website HBO Music NFL best practices CrashOverride Hiring/Firing Cortana Branding IT Management Data storage OneDrive Amazon Distributed Denial of Service Books Word data breach Video Games Settings Co-managed IT Smart Technology Legislation Document Management WIndows Server 2008 WIndows 7 Nokia Inbound Marketing eWaste Data Breach Windows Ink Storage Advertising risk management Lifestyle Legal Regulations Ebay Mobile Device Patch Management Touchpad Value Computing Managed Security Google Maps Scam Commerce Cameras Regulation User Software as a Service Science Employer Employee Relationship Virtual Desktop Presentation Bluetooth Worker Commute Sync Best Available Operating Sysytem PDF iOS IT Technicians Data Loss Scalability Managed IT Service Files Hard Drive Twitter SharePoint Adobe Managed IT Services Text Messaging Computer Fan Safety Google Docs Surge Protector How To Uograde Chromecast Images Upgrades Television Teamwork Licensing Sales Credit Cards Managed Service Provder Spyware Mobile IT solutions Webinar FAQ Gift Giving Professional Services Charger Shadow IT Relocation Wireless Charging WannaCry Evernote Comparison Workers IT service Specifications Taxes Updates Domains Conferencing Supercomputer Microsoft Word Tutorial Electronic Medical Records Gifts IT Budget Device Security Microblogging Youtube Buisness Devices Reputation Webinar