Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: Watch Out for Scammers During the Holidays

Tip of the Week: Watch Out for Scammers During the Holidays

Scammers find the holidays to be a wonderful time for stealing from unsuspecting victims. They know that the gift-giving season inspires others to spend a lot of money, which means that sensitive information, like credit card numbers, is up for grabs in bulk. As a consumer yourself, you’ll have to keep an eye out for these scams to make sure that you’re staying as safe as possible this holiday season.

Please keep in mind that what we recommend can only be seen as preventative measures. We can’t guarantee that your data will be protected adequately on the side of the business you’re purchasing from. If the retailer is known for suffering from data breaches (like Target), you might try to find other places to purchase gifts from, as you don’t want to risk your data becoming the target of hackers.

Do Some Research
Before you commit to a purchase, you should first see if the retailer has control over their security. Just go online and see if there have been any considerable data breaches for the retailer in the past few years. While it might seem a little unfair to judge a retailer based on what happened years ago, you need to look at what they have done since to improve security. If you suspect that the retailer hasn’t put in the work to keep their consumers safe, then just take your business elsewhere.

Check the Physical Area Around ATMs
While you might be hesitant to keep too much cash on you while you go shopping, sometimes it’s unavoidable. You might find yourself using an ATM, and hackers understand this need all too well. ATM scamming is nothing new, but it can be devastating under the right circumstances. ATMs can be tampered with to send credentials to a third party. ATMs can be fitted with devices on the card reader slot, or even have devices attached to the back. If the ATM has back panels missing, or devices attached to it, you should never use it. Make sure to double check for suspicious devices being fit to either the card reader or the backs of the machines, and only use ATMs that are in well-traveled areas that have security cameras in place.

Be Careful of Wireless Connections
Wireless communications are important while shopping this holiday season, but you should never use public Wi-Fi if you can help it. You’re better off using your mobile data plan, as unsecured networks that don’t require a sign-in are well-known dangers. You should set your devices so that they don’t automatically connect to these networks, as the data going into and out of your device could be watched by scammers.

Keep an Eye on Your Devices
Device theft is even more common during the holiday season, as more people are out. Pickpockets and thieves are more common, and they know how valuable your data and devices are. They could sell the information on the black market or sell the devices entirely.

For more great tips and tricks on how to stay safe and secure during the holiday season, subscribe to Central Technology Solutions’s blog.

VoIP Is the Leading Choice for Business Communicat...
Why You Shouldn't Say “Humbug” to Your Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, March 24 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Privacy Malware Hosted Solutions Hackers IT Services Internet Productivity Data Network Security Productivity Managed IT Services Outsourced IT Software Data Backup IT Support Business Innovation Mobile Devices Data Recovery Computer Ransomware Tech Term Hardware Microsoft Backup Cloud Computing Small Business Google Internet of Things Business Continuity Managed Service Provider Efficiency Smartphone Upgrade Business Management Remote Monitoring Android Paperless Office IT Support Encryption User Tips Disaster Recovery Social Media VoIP Data Management Windows 10 Smartphones Browser Managed IT Communication Artificial Intelligence Phishing Windows Workplace Tips Facebook Windows 10 Save Money Risk Management Collaboration BYOD Cybersecurity Mobile Device Management Saving Money Holiday Mobile Device Server App communications Network Office 365 Automation Recovery Applications Managed IT Services Government Firewall Bandwidth Unified Threat Management Wi-Fi Document Management Employer-Employee Relationship Compliance Apps Robot Bring Your Own Device Passwords Gmail BDR Vendor Management Big Data Password Analytics Virtualization Chrome IT Management Tip of the week Quick Tips Scam Hosted Solution Healthcare Antivirus Website Project Management Infrastructure Money Data storage Telephone Systems Content Filtering SaaS Managed Service Going Green Vulnerability Business Technology Information Wireless Microsoft Office Storage File Sharing Tablet Unified Communications Remote Computing Files Help Desk Customer Service Apple Router Social Two-factor Authentication Politics Work/Life Balance VPN Virtual Reality Miscellaneous Customer Relationship Management Computing Data Security Regulations Data loss Office IT Service Blockchain Training Printing Computers Outlook Uninterrupted Power Supply Mouse Employees Company Culture Google Drive How To Samsung Users Spam Word Settings WiFi Flexibility YouTube Business Growth Redundancy Chromebook Private Cloud Downtime Avoiding Downtime The Internet of Things Mobile Computing Software as a Service Tech Support Administration Hacker Digital Payment Remote Monitoring and Management Upgrades LiFi Maintenance Management Education Smart Technology Twitter Net Neutrality Patch Management Websites Identity Theft Wireless Technology Legal IT solutions Licensing Remote Workers Virtual Private Network Network Management Internet Exlporer End of Support Health Sports IoT HIPAA Budget Assessment Server Management Access Control Information Technology How To Monitors Operating System Alert Mobile Security Electronic Medical Records Machine Learning Mobility Consultation Lenovo Social Engineering USB Permissions Nanotechnology Star Wars Monitoring Windows 7 Legislation IT Technicians GPS High-Speed Internet Break Fix Social Networking Windows 8 Save Time Asset Tracking Statistics Mobile Data Professional Services SharePoint Staff Conferencing Address Supercomputer Identities MSP RMM Disaster Resistance Security Cameras Unified Threat Management Hotspot Crowdsourcing Meetings Recycling Cyberattacks Digital Obstacle Black Friday Roanoke — Central Technology Solutions Zero-Day Threat Superfish Safety Fraud Screen Reader G Suite History Utility Computing Consulting Search Dark Data Personal Information Mirgation Tracking Development Dark Web Motherboard Google Maps OneNote Bluetooth Virtual Assistant Downloads Augmented Reality Taxes Google Wallet Managing Stress Instant Messaging IT Budget Hard Drives Google Docs Proactive Tech Terms Proactive IT Notifications Remote Worker User Error Language eWaste Read Only Spyware Course Cyber Monday technology services provider Cables Backup and Disaster Recovery Black Market Smart Tech Cabling Humor Managed Services Provider Shortcut Migration Emoji Data Warehousing Backups Employee-Employer Relationship Wasting Time Operations Drones Enterprise Content Management Finance Firefox Writing Technology Assurance Group ’s 18 Solid State Drive Theft Heating/Cooling IT Consulting ROI Computing Infrastructure Point of Sale Deep Learning Network Congestion Wires Human Error Time Management Networking Current Events Cost Management E-Commerce WannaCry Computer Repair Virtual Desktop Technology Tips Chatbots Retail Cortana Microsoft Excel Modem Sync Connectivity Hacking Physical Security Database Multi-Factor Security Wearable Technology Telephony Alt Codes Vulnerabilities Authentication Distributed Denial of Service Annual Convention Public Cloud Cryptocurrency WPA3 Financial Servers Data Breach 3D Printing Notes Printer Alerts Law Enforcement Enterprise Resource Planning Bookmarks Display Permission Processors Travel Hard Drive Features Comparison Identity Botnet Cookies Mobile Device Managment Software Tips Hacks Disaster Trending Office Tips Voice over Internet Protocol Google Calendar Typing Geography Authorization Managed IT Service San Diego Automobile Computer Care Bitcoin Fleet Tracking Procurement Technology Laws Unsupported Software Virus PowerPoint Cooperation Gadget Best Practice Mobile Favorites Mail Merge Update Marketing Test Touchscreen Techology Buisness Cache Electronic Health Records VoIP Sponsor Gadgets Specifications Administrator CCTV Relocation Webcam Hard Disk Drive IT Consultant Error Printers Cybercrime Emergency Web Server CrashOverride Cameras Regulation Motion Sickness