Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Welcome to our blog, full of IT tips and business technology best practices

Thieves Materialize Most Around the Holidays

Thieves Materialize Most Around the Holidays

In terms of identity theft, data loss and good ol’ fashioned pickpocketing, the holiday season is one of the riskiest times to travel. When it comes to protecting your personal information, thieves and cybercriminals are counting on you to be distracted and make careless mistakes. In 2016, the number of fraud attempts went up by 31% during the holiday season. In addition, credit cards, mobile devices, and open Wi-Fi are common targets throughout the holidays.

0 Comment
Continue reading

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Privacy Hosted Solutions Network Security IT Services Data Backup Email Malware Internet Hackers Software Efficiency IT Support Business Outsourced IT Innovation Microsoft Data Recovery Computer Hardware Mobile Devices Productivity Managed IT Services Google Upgrade Business Continuity IT Support Small Business Cybersecurity Backup Cloud Computing Ransomware Collaboration Tech Term User Tips Communication Phishing Managed Service Provider Disaster Recovery Managed IT Services Smartphone Workplace Tips Windows 10 Business Management VoIP Internet of Things Mobile Device Smartphones Android Social Media Paperless Office Quick Tips Data Management Remote Monitoring communications Facebook Browser Encryption Managed IT Managed Service Network Artificial Intelligence Office 365 Saving Money Windows 10 Save Money Windows Server BDR Miscellaneous Virtualization Business Technology Compliance Risk Management BYOD Holiday Passwords Help Desk Wi-Fi App Password Training Windows 7 Mobile Device Management Users Health Microsoft Office Healthcare Government Remote Work Automation Document Management Apps Vendor Management Robot Analytics Big Data Chrome Laptops Firewall Office Applications Bandwidth Recovery Unified Threat Management Bring Your Own Device Employer-Employee Relationship Going Green Gmail Avoiding Downtime Data Security Blockchain Information Processor Telephone Systems Mobility SaaS Regulations File Sharing IT Management Apple Redundancy Computers Storage Hosted Solution Tip of the week Covid-19 Scam Website Money Project Management Two-factor Authentication Antivirus Computing Data storage Content Filtering Infrastructure Information Technology Data loss Vulnerability Wireless OneDrive Virtual Reality IoT Gadgets Access Control Remote Computing Settings Machine Learning Company Culture Unified Communications IT Service RMM Tablet Meetings Files Downtime Social Proactive Software as a Service Router Employee-Employer Relationship VPN Politics Maintenance Work/Life Balance Flexibility Customer Relationship Management Budget Virtual Private Network Customer Service Printing Hard Drive Operating System Co-Managed IT Upgrades Assessment Mouse HIPAA Outlook Twitter How To Cooperation Server Management Electronic Health Records Mobile Security Data Storage Google Drive Professional Services Managed Services Consultation Employees Display Uninterrupted Power Supply Monitoring Business Growth End of Support Recycling Spam Consulting WiFi Remote Worker Monitors YouTube Word Mobile Computing Utility Computing Search Dark Web Alert Hacker Augmented Reality Electronic Medical Records Solid State Drive Current Events Managed Services Provider The Internet of Things Administration Wireless Technology Legal Private Cloud How To Samsung Education Tech Support LiFi Social Network Management Remote Monitoring and Management Smart Technology Patch Management Net Neutrality IT solutions Time Management Networking Digital Payment File Management Chromebook Mobile Office Websites Identity Theft Remote Workers Bitcoin Data Breach Licensing Payment Cards Internet Exlporer Sports Network Management Cookies Outsource IT Marketing Geography Authorization Botnet Windows Server Google Calendar Network Congestion Disaster Trending Travel Managed IT Service San Diego Mobile Mail Merge Favorites Video Conferencing Computer Repair Buisness Windows 8 Save Time Fleet Tracking Technology Laws Procurement Mobile Device Managment Software Tips Telephone VoIP Cache Sponsor Gadget Wireless Internet Business Telephone Physical Security Identities Touchscreen Techology Test Automobile Computer Care Specifications Retail Cortana Manufacturing Optimization Permissions Nanotechnology Laptop 3D Printing High-Speed Internet Lenovo Security Cameras User Management Legislation IT Technicians Star Wars Break Fix Social Networking Processors Google Wallet Address Conferencing GPS Biometric SharePoint Staff Statistics Asset Tracking Transportation Mobile VoIP Digital Obstacle Cyberattacks Employer/Employee Relationships IT Assessment Unified Threat Management Hotspot Office Tips Hard Drives Google Docs MSP Disaster Resistance Virtual Assistant Vendor Black Friday Roanoke — Central Technology Solutions Humor Crowdsourcing Hard Disk Drives Virtual Machines Fraud Screen Reader Remote Working Unsupported Software Virus Development Superfish Zero-Day Threat Supercomputer Batteries Mirgation Update Motherboard Drones Managing Stress Instant Messaging Tracking Projects Gamification Downloads Bluetooth Backups OneNote G Suite History Cyber security Social Engineering USB Deep Learning Spyware eWaste Course Read Only Taxes Proactive Maintenance Digitize User Error Language Proactive IT Tech Terms Google Maps Wasting Time Smart Devices Cyber Monday technology services provider Shortcut Solid State Drives Credit Cards Smart Tech Mobile Data Cables Backup and Disaster Recovery IT Budget ROI Migration Data Warehousing Alt Codes Firefox Enterprise Content Management Finance Return on Investment Operations Cabling Teamwork Safety Virtual Desktop Database Management Shadow IT Computing Infrastructure Dark Data Personal Information Cryptocurrency Heating/Cooling IT Consulting Theft Database Sensors Technology Assurance Group ’s 18 WannaCry Cost Management E-Commerce Point of Sale Options Holidays Peripheral Wires Human Error Notes Technology Tips Chatbots Shared resources Windows Server 2008 Microsoft Excel Modem Notifications Typing Vulnerabilities Authentication Active Directory Multi-Factor Security Wearable Technology Hacks Connectivity Hacking Cybercrime Distributed Denial of Service Annual Convention Black Market Best Practice Enterprise Resource Planning Bookmarks Telephony GDPR Outsourcing Printer Alerts Servers WPA3 Financial Sync Voice over Internet Protocol Features Law Enforcement 5G IT PCI DSS Permission Public Cloud PowerPoint Value of Managed Services Comparison Identity Writing Emoji Cameras Regulation Motion Sickness CCTV CRM Administrator Relocation Students Hard Disk Drive Webcam Printers IT Consultant Error Emergency CrashOverride Web Server