Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: Watch Out for Scammers During the Holidays

Tip of the Week: Watch Out for Scammers During the Holidays

Scammers find the holidays to be a wonderful time for stealing from unsuspecting victims. They know that the gift-giving season inspires others to spend a lot of money, which means that sensitive information, like credit card numbers, is up for grabs in bulk. As a consumer yourself, you’ll have to keep an eye out for these scams to make sure that you’re staying as safe as possible this holiday season.

Please keep in mind that what we recommend can only be seen as preventative measures. We can’t guarantee that your data will be protected adequately on the side of the business you’re purchasing from. If the retailer is known for suffering from data breaches (like Target), you might try to find other places to purchase gifts from, as you don’t want to risk your data becoming the target of hackers.

Do Some Research
Before you commit to a purchase, you should first see if the retailer has control over their security. Just go online and see if there have been any considerable data breaches for the retailer in the past few years. While it might seem a little unfair to judge a retailer based on what happened years ago, you need to look at what they have done since to improve security. If you suspect that the retailer hasn’t put in the work to keep their consumers safe, then just take your business elsewhere.

Check the Physical Area Around ATMs
While you might be hesitant to keep too much cash on you while you go shopping, sometimes it’s unavoidable. You might find yourself using an ATM, and hackers understand this need all too well. ATM scamming is nothing new, but it can be devastating under the right circumstances. ATMs can be tampered with to send credentials to a third party. ATMs can be fitted with devices on the card reader slot, or even have devices attached to the back. If the ATM has back panels missing, or devices attached to it, you should never use it. Make sure to double check for suspicious devices being fit to either the card reader or the backs of the machines, and only use ATMs that are in well-traveled areas that have security cameras in place.

Be Careful of Wireless Connections
Wireless communications are important while shopping this holiday season, but you should never use public Wi-Fi if you can help it. You’re better off using your mobile data plan, as unsecured networks that don’t require a sign-in are well-known dangers. You should set your devices so that they don’t automatically connect to these networks, as the data going into and out of your device could be watched by scammers.

Keep an Eye on Your Devices
Device theft is even more common during the holiday season, as more people are out. Pickpockets and thieves are more common, and they know how valuable your data and devices are. They could sell the information on the black market or sell the devices entirely.

For more great tips and tricks on how to stay safe and secure during the holiday season, subscribe to Central Technology Solutions’s blog.

VoIP Is the Leading Choice for Business Communicat...
Why You Shouldn't Say “Humbug” to Your Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 20 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Productivity Hosted Solutions Email Malware IT Services Privacy Network Security Hackers Internet Data Software Data Backup Outsourced IT Productivity Managed IT Services Business IT Support Innovation Microsoft Mobile Devices Data Recovery Ransomware Hardware Tech Term Computer Google Cloud Computing Efficiency IT Support Backup Small Business User Tips Business Continuity Internet of Things Collaboration Managed Service Provider Android Communication Business Management Smartphone Upgrade Disaster Recovery Paperless Office Remote Monitoring Smartphones Encryption VoIP Windows 10 Data Management Social Media Windows 10 Phishing Artificial Intelligence Browser Managed IT Services Workplace Tips Server Windows Managed IT communications Save Money Facebook Mobile Device BYOD Risk Management Cybersecurity App Mobile Device Management Office 365 Saving Money Holiday Passwords Business Technology BDR Firewall Network Wi-Fi Chrome Compliance Robot Applications Bandwidth Bring Your Own Device Government Document Management Quick Tips Unified Threat Management Apps Vendor Management Employer-Employee Relationship Password Gmail Automation Recovery Managed Service Analytics Virtualization Blockchain Information Help Desk Big Data File Sharing IT Management Money Hosted Solution Data storage Telephone Systems Tip of the week SaaS Scam Website Going Green Healthcare Project Management Antivirus Microsoft Office Wireless Content Filtering Infrastructure Vulnerability Settings Training Customer Service Apple Unified Communications Social Tablet Users Virtual Reality Files Downtime Miscellaneous Computing Regulations Office IT Service Router Two-factor Authentication Politics Work/Life Balance VPN Printing Computers Customer Relationship Management Storage Data Security Remote Computing Data loss Assessment IoT HIPAA How To Flexibility Server Management Gadgets Business Growth Access Control Cooperation Chromebook Machine Learning Mobility Mobile Security Avoiding Downtime Employees Consultation Mobile Computing Uninterrupted Power Supply Hacker Company Culture Upgrades RMM Spam Twitter YouTube Word WiFi Wireless Technology Legal Redundancy Private Cloud Proactive Tech Support The Internet of Things End of Support Health Administration Software as a Service LiFi Education Budget Smart Technology Digital Payment Remote Monitoring and Management Information Technology Maintenance Monitors Management Operating System Websites Identity Theft Alert Networking Net Neutrality Electronic Medical Records Patch Management IT solutions Outlook Licensing Remote Workers Mouse Virtual Private Network Google Drive How To Samsung Network Management Internet Exlporer Sports Safety Geography Authorization Cookies Mobile Device Managment Software Tips Dark Data Personal Information Disaster Trending Marketing Voice over Internet Protocol Google Calendar Mail Merge Buisness 5G Managed IT Service San Diego Automobile Computer Care Fleet Tracking Procurement Technology Laws PowerPoint Google Wallet Gadget Mobile Favorites OneDrive Hard Drives Google Docs Specifications Notifications Test Touchscreen Techology Cache Electronic Health Records VoIP Sponsor GPS Black Market High-Speed Internet Lenovo Humor Permissions Nanotechnology Star Wars Monitoring Windows 7 Legislation IT Technicians Conferencing Address Wireless Internet Backups Break Fix Social Networking Asset Tracking Statistics Professional Services Drones SharePoint Staff Writing Emoji Manufacturing Solid State Drive Black Friday Roanoke — Central Technology Solutions Supercomputer MSP Disaster Resistance Security Cameras Deep Learning Unified Threat Management Hotspot Crowdsourcing Meetings Network Congestion Recycling Cyberattacks Digital Obstacle Tracking Development Zero-Day Threat Superfish Current Events Fraud Screen Reader G Suite History Computer Repair Utility Computing Consulting Search Transportation Mirgation Managing Stress Instant Messaging Employer/Employee Relationships Dark Web Motherboard Google Maps Physical Security OneNote Bluetooth Virtual Assistant Alt Codes Downloads Augmented Reality Taxes Retail Cortana Hard Disk Drives Cryptocurrency Cyber Monday technology services provider IT Budget 3D Printing Tech Terms Proactive IT Remote Worker User Error Language Display eWaste Read Only Spyware Course Migration Processors Cables Backup and Disaster Recovery Smart Tech Cabling Managed Services Provider Shortcut Enterprise Content Management Finance Firefox Proactive Maintenance Hacks Data Warehousing Office Tips Employee-Employer Relationship Wasting Time Typing Operations Solid State Drives Bitcoin Technology Assurance Group ’s 18 Unsupported Software Virus Theft Heating/Cooling IT Consulting Virtual Desktop ROI Best Practice Computing Infrastructure Point of Sale Update Technology Tips Chatbots Wires Human Error Time Management Cybercrime Cost Management E-Commerce WannaCry Teamwork Social Engineering USB Vulnerabilities Authentication Database Management Microsoft Excel Modem Sync Connectivity Hacking Database Multi-Factor Security Wearable Technology Telephony Options Windows 8 Save Time Distributed Denial of Service Annual Convention Public Cloud Mobile Data WPA3 Financial Servers Data Breach Notes Printer Alerts Law Enforcement Enterprise Resource Planning Bookmarks Identities Comparison Identity Botnet Permission Travel Hard Drive Features Shared resources GDPR Cameras Regulation Motion Sickness Administrator CCTV Relocation Webcam Hard Disk Drive Students IT Consultant Error Printers Emergency Web Server CrashOverride