Christian Computers Blog

Tip of the Week: Watch Out for Scammers During the Holidays

Tip of the Week: Watch Out for Scammers During the Holidays

Scammers find the holidays to be a wonderful time for stealing from unsuspecting victims. They know that the gift-giving season inspires others to spend a lot of money, which means that sensitive information, like credit card numbers, is up for grabs in bulk. As a consumer yourself, you’ll have to keep an eye out for these scams to make sure that you’re staying as safe as possible this holiday season.

Please keep in mind that what we recommend can only be seen as preventative measures. We can’t guarantee that your data will be protected adequately on the side of the business you’re purchasing from. If the retailer is known for suffering from data breaches (like Target), you might try to find other places to purchase gifts from, as you don’t want to risk your data becoming the target of hackers.

Do Some Research
Before you commit to a purchase, you should first see if the retailer has control over their security. Just go online and see if there have been any considerable data breaches for the retailer in the past few years. While it might seem a little unfair to judge a retailer based on what happened years ago, you need to look at what they have done since to improve security. If you suspect that the retailer hasn’t put in the work to keep their consumers safe, then just take your business elsewhere.

Check the Physical Area Around ATMs
While you might be hesitant to keep too much cash on you while you go shopping, sometimes it’s unavoidable. You might find yourself using an ATM, and hackers understand this need all too well. ATM scamming is nothing new, but it can be devastating under the right circumstances. ATMs can be tampered with to send credentials to a third party. ATMs can be fitted with devices on the card reader slot, or even have devices attached to the back. If the ATM has back panels missing, or devices attached to it, you should never use it. Make sure to double check for suspicious devices being fit to either the card reader or the backs of the machines, and only use ATMs that are in well-traveled areas that have security cameras in place.

Be Careful of Wireless Connections
Wireless communications are important while shopping this holiday season, but you should never use public Wi-Fi if you can help it. You’re better off using your mobile data plan, as unsecured networks that don’t require a sign-in are well-known dangers. You should set your devices so that they don’t automatically connect to these networks, as the data going into and out of your device could be watched by scammers.

Keep an Eye on Your Devices
Device theft is even more common during the holiday season, as more people are out. Pickpockets and thieves are more common, and they know how valuable your data and devices are. They could sell the information on the black market or sell the devices entirely.

For more great tips and tricks on how to stay safe and secure during the holiday season, subscribe to Christian Computers’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, February 18 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Security Technology Tip of the Week Best Practices Privacy Business Management Cloud Business Computing Managed Service Provider Internet Microsoft Software Saving Money Workplace Tips Malware Hosted Solutions Hackers Backup IT Services Productivity Data Email Mobile Devices IT Support Small Business Hardware Business Business Continuity Computer Network Innovation Network Security Google Outsourced IT Smartphones Managed IT Services Server VoIP Productivity Efficiency Upgrade Ransomware Data Backup Communication Social Media User Tips Disaster Recovery Windows Vendor Management Tech Term Remote Monitoring Gadgets Microsoft Office Mobile Office Smartphone Virtualization Cloud Computing Mobile Device Management Quick Tips Data Recovery Android Windows 10 Save Money Internet of Things Passwords Miscellaneous Unified Threat Management BYOD Holiday Alert Paperless Office Artificial Intelligence Collaboration Bring Your Own Device Users Encryption Best Practice Data Management Trending IT Support Going Green Apps Apple Phishing Firewall Browser Facebook Current Events Mobile Computing Office 365 Managed IT Maintenance Antivirus App Wireless Technology Mobile Device Remote Computing Document Management The Internet of Things IT Solutions Customer Relationship Management Windows 10 Health Managed IT Services Operating System Cybersecurity IT Consultant History Router Wi-Fi Recovery Printer Vulnerability Excel Automation Password Gmail BDR Information Technology Content Filtering Hosted Solution Risk Management Office Robot Digital Payment communications WiFi Money Windows 8 Tablet Employer-Employee Relationship Spam Big Data Scam Tech Support Analytics Applications Training VPN Hard Drives File Sharing Compliance Hacker Infrastructure Bandwidth Help Desk Telephone Systems Social Proactive IT Point of Sale Computer Repair How To Humor IT Management Government Wireless Fax Server SaaS Information Work/Life Balance Data storage Downtime Budget Healthcare Data Security Website Chrome Administration Net Neutrality Storage PowerPoint Mouse Private Cloud Printing Lithium-ion Battery Outlook Marketing Saving Time Regulations Touchscreen Computing Samsung Politics Blockchain Twitter Avoiding Downtime IT Service Statistics Virtual Reality Customer Service Education Virus Social Networking Managed Service Word Inbound Marketing Two-factor Authentication Unified Communications Licensing Machine Learning Computers Project Management Company Culture Save Time Taxes Phone System Search Internet Exlporer Business Growth Software as a Service Alerts Botnet Legal Chromebook Virtual Private Network Wearable Technology Electronic Medical Records Smart Technology Assessment Monitors Bluetooth Business Technology Mobile Security Cost Management Conferencing Meetings Hiring/Firing Identity Theft Display IoT Webcam Office Tips Sports Application Flexibility User Error Heating/Cooling Remote Monitoring and Management Google Drive HIPAA Uninterrupted Power Supply Video Surveillance Computer Care Physical Security IBM Remote Workers End of Support Management Mobility Server Management Upgrades G Suite Files Recycling Automobile Piracy Patch Management Employees How To iPhone USB Co-Managed IT Solid State Drive Travel Data loss Network Management Websites Settings Augmented Reality Access Control LiFi High-Speed Internet Zero-Day Threat Cooperation Relocation Cabling Hacks Personal Information ebay LinkedIn Monitoring Cyber Monday Connectivity Firefox Network Congestion Law Enforcement Mobile Instant Messaging Emergency IT Budget Shortcut Unsupported Software Refrigeration Value Java Asset Tracking Remote Worker Modem Motion Sickness VoIP Notifications Data Warehousing Tracking Cybercrime Online Currency MSP Tech Terms SharePoint Migration Sync Deep Learning Memory Hard Drive Cyberattacks Development Backup and Disaster Recovery Disaster Resistance Staff Best Available Consulting Gadget Debate Managing Stress Finance Google Maps Alt Codes Mobile Data CIO OneNote ROI Technology Tips Cookies Digital Dark Data PC Care Remote Support Cache Read Only Mail Merge Microsoft Excel Tip of the week Virtual Desktop Proactive Theft Downloads Chatbots Mobile Device Managment Emoji IP Address People Webinar Macro Cables Human Error Data Breach Operations Error Disaster 3D Text Messaging Managed Services Provider Distributed Denial of Service Cleaning Consultation Writing Programming Enterprise Content Management Authentication lenevo Hotspot Typing Streaming Media Employee-Employer Relationship Notes Comparison Nanotechnology Web Server Spyware Leadership Crowdsourcing Work Station eWaste Address Servers Financial Two-factorAuthentication Identity Corporate Profile Safety Identities Telephony Wires Permission Data Loss Public Cloud Google Wallet Star Wars E-Commerce Managed IT Service Avoiding Downtown Retail Vulnerabilities Authorization Superfish Language Software Tips Cryptocurrency Business Intelligence Professional Services Specifications Screen Reader Cameras Bookmarks Redundancy Permissions WPA3 Procurement Multi-Factor Security WannaCry Google Docs Black Market Phone Systems Print Server Time Management Social Engineering User Intranet Test Technology Laws IT Technicians Virtual Assistant Drones Crowdfunding Utility Computing Features Break Fix Staffing Geography Networking Computing Infrastructure Bitcoin Gaming Console YouTube Skype Black Friday Smart Tech CCTV Cortana Enterprise Resource Planning Favorites Fraud Supercomputer 3D Printing Hacking Trojan Scheduling Fleet Tracking Security Cameras Motherboard Processors Law Firm IT GPS Windows 8.1 Update RMM Mirgation Administrator Hard Disk Drive Backups Update Computer Accessories Running Cable Electronic Health Records Dark Web Knowledge Buisness 5G Domains Experience Laptop Public Speaking Undo Fun Printers Halloween Competition CrashOverride Scary Stories Presentation Regulation Wasting Time