4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Ways Thieves are Looking to Scam Shoppers

Tip of the Week: 5 Ways Thieves are Looking to Scam Shoppers

It’s seems unbelievable just how much thought and effort hackers can put into their attacks. Scammers are all over the place, and you can never truly be safe. Here are five scams that you should always be on the lookout for.

1. Be Careful Where You Donate
Donations are great ways to show your support for certain causes, and they’re also tax-deductible. However, hackers have been known to take advantage of the people’s generosity. Many will set up fake charity websites that will scam people with good intentions. This money, which was meant to be used to help others, is now funding a hacker’s agenda.

To guarantee that you’re donating to a reputable charity, AARP recommends the following: “Before donating to a charity, make sure it is registered with the Secretary of State and ask how much of the money goes to the charitable fundraiser and how much goes to the charitable purpose.”

2. Look Out for Fake Gift Cards
Gift cards are often purchased as last-ditch present ideas for birthdays or holidays, but they are also one of the primary ways that scammers will use to make a quick buck off of unwary people. If you see deals on online auction sites for discounted gift cards, you should stay away from them, as they could easily be stolen, making them worthless. Make sure that you only purchase gift cards from trusted, licensed vendors. Plus, you want to make sure that the cashier can check the balance of the card before purchase, so that any cards placed on the shelves by a thief don’t play you for a fool.

3. Track Your Packages
If you’ve ever ordered something online, you’ll know that it can be tricky to arrange for packages to be delivered to your residence while you’re home. After all, what’s stopping a thief from walking to your front porch, picking up your package, and taking off down the road? It’s unlikely that the thief would know what’s in the box, but desperate times call for desperate measures, and perhaps all they want is a way to make a quick buck. To keep this from becoming a problem, ask that your package require a signature upon delivery, or have it shipped to your work address, just in case nobody is home.

4. Watch for Credit Card Skimmers
Some thieves will use credit card skimming devices to steal your data from ATMs or point-of-sale terminals. This means that you should probably be shopping with a credit card over a debit card, but more than anything else, cash trumps this card skimming tactic. It’s also helpful to take note of the device that you’re using to pay with a card to ensure that it hasn’t been tampered with.

5. Don’t Fall for Bogus Deals
Here’s one last tip that might be one of the most basic: an offer that’s too good to be true is probably just that. A purchase that seems like the deal of a lifetime might be nothing but a scammer who wants to make off with your goods or your cash. Remember that if there’s so much as a hint of skepticism concerning your purchase, you should approach the situation with a hefty dose of skepticism.

Stay Safe Online
The Internet is full of threats, so the best way to stay safe is to follow this brief list of security best practices:

  • Before submitting any sensitive information, look for the padlock icon in the address bar, along with HTTPS at the beginning of the URL.
  • Only shop on websites that have a good reputation.
  • Avoid using public Wi-Fi when shopping online.
  • Avoid using your debit card online. Instead, use credit cards and gift cards.
  • Be skeptical of unsolicited emails in your inbox, especially when it comes to fake invoices and bogus shipping orders.

Does your business have concerns about shopping online’ or protecting its digital assets? 4IT can help. To learn more, reach out to us at 305-278-7100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows Disaster Recovery IT Support Innovation Hardware Business Continuity Workplace Tips VoIP Saving Money Computer User Tips Upgrade Windows 10 Miscellaneous Virtualization Mobile Devices Mobile Device Management Data Server Network Security Mobile Computing Alert Email Communication Network Save Money Microsoft Office Smartphone Small Business communications Quick Tips Going Green Mobile Office Information Technology Social Media Smartphones BYOD Health Office Apps Android Ransomware Operating System Browser Chrome Managed IT Services Outsourced IT Gadgets Application Disaster Tablet Holiday Productivity Firewall WiFi Avoiding Downtime Managed IT Mobility Telephone Systems Search Risk Management The Internet of Things Remote Computing Unified Threat Management Cybersecurity IT Solutions Best Practice Data Management Spam Passwords BDR Cybercrime Employer-Employee Relationship Budget Automation VPN Remote Monitoring History Facebook Hacking Apple Hard Drives Saving Time Vendor Management Data Recovery User Error Money Collaboration Phone System Recovery iPhone Wireless Technology Customer Relationship Management Data Backup Office Tips Big Data Law Enforcement Content Filtering Phishing Password Proactive IT Marketing Hosted Solution Computers Telephony Lithium-ion battery Humor Administration Wearable Technology Current Events Maintenance PowerPoint Virus Printer Antivirus Work/Life Balance Shortcut USB Social Analytics Encryption Office 365 Bring Your Own Device Gmail Router Government Vulnerability Point of Sale IT COnsultant Intranet Bandwidth Private Cloud Printer Server Wireless Computer Repair Unsupported Software Laptop OneNote Cloud Computing Google Drive Save Time Education Trending Net Neutrality SaaS Data Security Data Protection Audit Users HaaS Windows 8 Tech Support Business Intelligence Outlook Social Engineering App Politics Personal Information Cost Management Emails Instant Messaging Computer Care Battery Robot HIPAA Entertainment Benefits DDoS Automobile Computer Accessories Data Storage End of Support Efficency Mouse Compliance Internet Exlporer Two-factor Authentication Social Networking Managing Stress Internet of Things Identity Theft Excel Solid State Drive Display Flexibility Sports Augmented Reality Travel Paperless Office Samsung Fax Server Update Wi-Fi Customer Service Emergency Artificial Intelligence Biometrics Workplace Retail Applications Virtual Reality IT Support Streaming Media Meetings Network Congestion Windows 10 hacker Uninterrupted Power Supply online currency Transportation Help Desk Surge Protector Experience Television Keyboard Sync Avoid Downtime Reliable Computing 3D Printing Data Loss Nokia iOS Managed IT Service Music Bloatware Hiring/Firing Adobe Managed IT Services Google Docs Computer Fan Data storage ISP Books Smart Technology Branding Licensing Video Games Distributed Denial of Service Microsoft Excel Document Management Dark Web Screen Mirroring Advertising Programming Blogging Data Breach Legal WIndows 7 Mobile Device eWaste File Sharing Storage Touchpad Inbound Marketing Cast Regulations Website Managed Security Scam Windows 10s Hard Drive Value systems Nanotechnology Cameras OneDrive Employer Employee Relationship Tablets Uograde User Hard Disk Drive Images Amazon Co-managed IT hack Worker Commute Science Root Cause Analysis Operating Sysytem Virtual Desktop HBO PDF Presentation Bluetooth NFL Scalability Best Available best practices Files IT Technicians Cortana Lifestyle CrashOverride IT Management Text Messaging Ebay Safety Computing SharePoint Word How To data breach Chromecast Upgrades Legislation Settings WIndows Server 2008 Wiring Training Teamwork Windows Ink Information risk management Administrator Colocation Busines Continuity Consultant The Blindside Of Networking Patch Management Debate Near Field Communication Company Culture Google Maps Black Market Access Touchscreen Commerce Twitter IT Security Human Resources Regulation IT consulting Cleaning Running Cable Software as a Service Relocation Gift Giving Webinar Mobile IT solutions IT service Professional Services Taxes Microblogging Youtube Domains Supercomputer Sales Electronic Medical Records Managed Service Provder IT Budget Webinar Reputation Buisness Comparison Tutorial Specifications Shadow IT