SMART Blog

Scams to Watch For This Holiday Season

Scams to Watch For This Holiday Season

Hackers put a lot of thought and effort into coming up with new ways to fool the unsuspecting consumer, especially during the holiday season. Here are some recent scams you should watch for.


Fake Charity Websites
Increasingly, hackers are setting up fake charity websites to scam people with good intentions. To guarantee that you’re donating to a reputable charity, make sure the charity you're considering doating to is registered with the Secretary of State and find out how much of your contribution will go to the charitable fundraiser and how much will go to the needy.

Fake Gift Cards
Gift cards are often purchased as last-ditch present ideas for birthdays or holidays, but they are also one of the primary ways scammers use to make a quick buck. If you see deals on online auction sites for discounted gift cards, beware -- the cards could easily be stolen, making them worthless. Make sure that you purchase gift cards from trusted, licensed vendors.

Track Your Packages
It's sometimes to coordinate package delivery to your home while you’re there. That's why it is has become all too common for theives to follow delivery trucks around during the holiday season, then grab packages off porches moments after they have been delivered. To keep this from becoming a problem, ask that your package require a signature upon delivery, or have it shipped to your work address.

Credit Card Skimmers
Though this one has been around for several years, it's still widespread. Some thieves use credit card skimming devices to steal your data from ATMs or point-of-sale terminals. Always take note of the device that you’re using to pay with a card to ensure that it hasn’t been tampered with.

Stay Safe Online
To stay safe this holiday season follow this brief list of security best practices:

  • Before submitting any sensitive information, look for the padlock icon in the address bar, along with HTTPS at the beginning of the URL.
  • Only shop on websites that have a good reputation.
  • Avoid using public Wi-Fi when shopping online.
  • Be skeptical of unsolicited emails in your inbox, especially when it comes to fake invoices and bogus shipping orders.
Business Intelligence Making Strides With Small Bu...
Why BDR is the Ideal Backup Solution for SMBs
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Tuesday, March 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Human Resources Shortcut In the News Data Security Security Cameras MySalesResults Hosted Solution Gmail Two-factor Authentication video Running Cable Point of Sale Laptop Extreme Technology Makeover Mouse holidays Websites Flexibility Computers Payroll Windows Settings Microsoft Compliance Office 365 Apps Shadow IT Password Memory Bring Your Own Device Microsoft Office 2010 Samsung IT Support Employee-Employer Relationship Virtual Assistant Health Tech Tip Phishing Mobile Devices Computer Accessories Hard Disk Drive Antivirus Proactive Bluetooth Back Up SharePoint communications Current Events Office Tips iPhone Video Games Chromecast Spyware Network Excel Emails ISP HBO Computer Forensics Lifestyle Analytics Vendor Unsupported Software Printing Twitter Payment Cards Mobile Security Google Cloud Automobile Hiring/Firing Word User Error MSP Communication Cleaning Redundancy Customer Service Hosted Solutions Information USB Touchscreen SMART Services Avoid Downtime Computing Cybercrime Help Desk Computer Black Market Hacking Tablets Root Cause Analysis NFL SaaS Trending Saving Time Proactive IT Regulations SMB Computer Care The Internet of Things Cloud Computing Employee Emergency Music SMARTweb Defense Augmented Reality OneDrive Microsoft Outlook Company Culture User Tips Access WPA3 Operating Sysytem Screen Mirroring IT consulting Lithium-ion battery WIndows Server 2008 Disaster iOS Internet of Things Data Breach Google Maps IT solutions Cost Management Security Virtual Private Network Data eWaste Best Practices Meetings Wireless Technology Smartphones Remote Workers Gamification Prodcutivity Downtime Operating System Workers Students Users Telephone Battery Social Networking IT Support Gift Giving Hardware Tutorial Mobile Device Management Blogging Gadgets Content Filter HaaS Transportation Comparison Managed Service Touchpad Printer Server Admin Windows 8 Passwords Risk Management Hetrick and Associates data backups Uninterrupted Power Supply Bryant Caudill Going Green IT Services Google Docs Jerry Fetty Tech Term Keyboard Specifications Tablet Identity Theft Media Consumption VPN Buisness IT Budget Streaming Media File Storage Data Theft IT Technicians Data Loss Data Recovery Chromebook Internet Computer Fan lunch and learn IT Solutions FAQ Chrome Business Intelligence Administrator Mobile Office End of Support PDF Managed Service Provider Virtual Desktop Quick Tips Private Cloud Solid State Drive Cast Wireless Business Continuity Surge Protector IT Management Saving Money Outsourced IT Net Neutrality Remote Computing Identities Peripheral 3D Printing Holiday Evernote Document Management Value Instant Messaging Images Devices Managing Stress BDR Work/Life Balance Books email encryption Mobile PowerPoint Unified Threat Management Programming Microblogging Workplace Tips Biometrics Virtualization Wasting Time Fun Technology iPad Web Design Worker Commute File Sharing Text Messaging Patch Management CrashOverride Software Nokia Wayne Joubert Tip of the Week Microsoft Windows 7 Entertainment Humor Ransomware Display Software as a Service E-Commerce Fax Server Camera Updates GLAD BYOD Congratulations Wiring Bloatware Take Your Agency to the Next Level Upgrade Politics spam Privacy Sports Projects website HIPAA Encryption Education Edge Network Security Near Field Communication Smart Technology Collaboration Bandwidth Scott White Analysis Innovation Medical IT malware App store Cameras Mobile Device Internet Exlporer Monitoring Social Engineering Regulation Co-managed IT Science Business Computing VoIP Microsoft Outlook 2007 Backup automation Distributed Denial of Service Browser Disaster Recovery Webinar Phone System Firewall Save Time Professional Services Identity Reputation Office Travel Hybrid Cloud Online Currency Personal Information Reliable Computing Social Experience Scalability Access Control hacker Retail Blockchain Project Management Amazon Kleinschmidt Insurance Wireless Internet Virtual Reality DDoS OneNote Mobility Doug Vanni Alert Outlook Colocation Device Security Money Managed IT Server WIndows 7 Machine Learning Fraud Data Backup WannaCry IT Consultant History Productivity webinar Credit Cards Employer-Employee Relationship Application Teamwork Apple Productivity Jessica Stevenson Unified Communications Windows 10 Backkup Wasting Money Data Protection Best Available Recovery Phishing Scam Hard Drive Best Practice robot Search Applications Business Technology Microsoft Excel Adobe Maintenance Scam Google Drive Router Data Management Windows 7 Google Assistant Sales Upgrades Big Data DocStar press release IT Service Ciminal Gifts Information Technology Commerce Small Business Intranet Android Wireless Charging Financial Television Remote Monitoring Domains Business Customer Relationship Management Audit Vendor Management Debate Miscellaneous Taxes Administration social media Mobile Computing Advertising App Chevy HHR Virus Cortana Marketing Safety Government Law Enforcement User Legal HITECH Act Networking Artificial Intelligence Break/Fix How To Files Legislation Inbound Marketing IIAI Facebook Sync Mircrosoft Keyboard Shortcuts agency automation Hard Drives WiFi ebay IoT Financial Technology Managed IT Service Content Filtering Training Update Electronic Medical Records Microsoft Office Branding hackers Vulnerability Backup and Disaster Recovery Work Station Paperless Office Hyperlink Network Congestion Dark Web Ubuntu Windows 10s Efficiency Video Surveillance Testing Storage Business Management Alexa for Business Presentation Data Storage Benefits Smart Tech Co-Managed Services Telephone Systems Connectivity Employer Employee Relationship MAIA Charger Telephony Management Supercomputer Steve Anderson Tech Support Windows 10 Wi-Fi Microsoft Word Licensing Thank You Data Privacy Applied TAM Wearable Technology Windows Ink Smartphone Computer repair Conferencing Accessory Email Printer Budget Managed IT Services Cybersecurity insurance Youtube Printers Save Money Avoiding Downtime Consultant Language Utility Computing Nanotechnology Managed IT Services

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *