Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: Watch Out for Scammers During the Holidays

Tip of the Week: Watch Out for Scammers During the Holidays

Scammers find the holidays to be a wonderful time for stealing from unsuspecting victims. They know that the gift-giving season inspires others to spend a lot of money, which means that sensitive information, like credit card numbers, is up for grabs in bulk. As a consumer yourself, you’ll have to keep an eye out for these scams to make sure that you’re staying as safe as possible this holiday season.

Please keep in mind that what we recommend can only be seen as preventative measures. We can’t guarantee that your data will be protected adequately on the side of the business you’re purchasing from. If the retailer is known for suffering from data breaches (like Target), you might try to find other places to purchase gifts from, as you don’t want to risk your data becoming the target of hackers.

Do Some Research
Before you commit to a purchase, you should first see if the retailer has control over their security. Just go online and see if there have been any considerable data breaches for the retailer in the past few years. While it might seem a little unfair to judge a retailer based on what happened years ago, you need to look at what they have done since to improve security. If you suspect that the retailer hasn’t put in the work to keep their consumers safe, then just take your business elsewhere.

Check the Physical Area Around ATMs
While you might be hesitant to keep too much cash on you while you go shopping, sometimes it’s unavoidable. You might find yourself using an ATM, and hackers understand this need all too well. ATM scamming is nothing new, but it can be devastating under the right circumstances. ATMs can be tampered with to send credentials to a third party. ATMs can be fitted with devices on the card reader slot, or even have devices attached to the back. If the ATM has back panels missing, or devices attached to it, you should never use it. Make sure to double check for suspicious devices being fit to either the card reader or the backs of the machines, and only use ATMs that are in well-traveled areas that have security cameras in place.

Be Careful of Wireless Connections
Wireless communications are important while shopping this holiday season, but you should never use public Wi-Fi if you can help it. You’re better off using your mobile data plan, as unsecured networks that don’t require a sign-in are well-known dangers. You should set your devices so that they don’t automatically connect to these networks, as the data going into and out of your device could be watched by scammers.

Keep an Eye on Your Devices
Device theft is even more common during the holiday season, as more people are out. Pickpockets and thieves are more common, and they know how valuable your data and devices are. They could sell the information on the black market or sell the devices entirely.

For more great tips and tricks on how to stay safe and secure during the holiday season, subscribe to Central Technology Solutions’s blog.

VoIP Is the Leading Choice for Business Communicat...
Why You Shouldn't Say “Humbug” to Your Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, January 21 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Email Privacy Hosted Solutions Hackers IT Services Internet Network Security Productivity Outsourced IT Managed IT Services Data Software Data Backup IT Support Business Productivity Mobile Devices Ransomware Tech Term Innovation Microsoft Computer Hardware Data Recovery Backup Small Business Cloud Computing Google Internet of Things Smartphone Managed Service Provider Business Continuity Windows 10 Smartphones Data Management Android Remote Monitoring Efficiency Social Media Disaster Recovery Browser Paperless Office Encryption Managed IT User Tips Communication VoIP Artificial Intelligence Business Management Windows BYOD Facebook IT Support Upgrade Save Money Holiday Phishing Collaboration Workplace Tips App Cybersecurity Windows 10 Risk Management Mobile Device Management Mobile Device Robot Employer-Employee Relationship Passwords Gmail Government Unified Threat Management Bring Your Own Device communications Network Server Recovery BDR Saving Money Bandwidth Managed IT Services Applications Wi-Fi Firewall Compliance Healthcare Content Filtering Document Management Telephone Systems Infrastructure SaaS Money Vulnerability Data storage Going Green Big Data Vendor Management Chrome Virtualization Wireless Password IT Management Hosted Solution Tip of the week Office 365 Website Scam Project Management Antivirus Apps Apple Social Two-factor Authentication Miscellaneous Router Customer Relationship Management Regulations Politics Data Security Work/Life Balance Data loss Office IT Service Computing Microsoft Office Computers Managed Service Information Storage Blockchain Automation Unified Communications Printing Training Analytics Remote Computing Help Desk File Sharing Customer Service Quick Tips Virtual Reality Files Twitter Mobile Computing IT solutions VPN The Internet of Things Private Cloud Hacker Patch Management Maintenance Smart Technology Remote Monitoring and Management Tech Support Sports End of Support Health Wireless Technology Legal Virtual Private Network Remote Workers Digital Payment Network Management Websites Identity Theft Assessment Business Technology Monitors Alert Licensing Server Management Electronic Medical Records How To Internet Exlporer IoT HIPAA Budget Access Control Users Information Technology Uninterrupted Power Supply Mobile Security How To Samsung Spam Operating System Outlook WiFi Employees Mouse YouTube Machine Learning Mobility Flexibility Company Culture Word Downtime Chromebook Google Drive Redundancy Avoiding Downtime Tablet Administration Settings Education Business Growth LiFi Upgrades Managed Services Provider Google Maps Humor Heating/Cooling Software as a Service IT Consulting Migration Computer Repair Cables Backup and Disaster Recovery Taxes Smart Tech IT Budget Backups Time Management Networking Operations Physical Security Enterprise Content Management Finance Drones WannaCry Data Warehousing Retail Cortana Employee-Employer Relationship Solid State Drive Computing Infrastructure 3D Printing Management ROI Cabling Deep Learning Hacking Technology Assurance Group ’s 18 Display Theft Processors Cost Management E-Commerce Current Events Servers Technology Tips Data Breach Chatbots Wires Human Error Net Neutrality Connectivity Multi-Factor Security Wearable Technology Marketing Office Tips Vulnerabilities Authentication Point of Sale Alt Codes Microsoft Excel Modem Cryptocurrency Printer Alerts Gadgets Unsupported Software Virus Enterprise Resource Planning Bookmarks Disaster Trending Distributed Denial of Service Annual Convention Buisness Update WPA3 Financial Hard Drive Features Sync Comparison Technology Laws Identity Permission Telephony Mail Merge Public Cloud Hacks Touchscreen Google Calendar Techology Geography Authorization Law Enforcement Typing VoIP Sponsor Cookies Social Engineering USB Botnet Bitcoin Consultation Lenovo Cooperation Mobile Data Mobile Favorites Travel Best Practice Managed IT Service San Diego Fleet Tracking Procurement Address Cache Electronic Health Records Mobile Device Managment Software Tips Statistics Specifications Test Star Wars Monitoring Automobile Computer Care Legislation Disaster Resistance IT Technicians Dark Data Personal Information High-Speed Internet Gadget Digital Obstacle Permissions Nanotechnology Safety Windows 8 Save Time SharePoint Superfish Staff Conferencing Search Break Fix Social Networking Asset Tracking Unified Threat Management Hotspot Notifications Recycling Security Cameras Cyberattacks Bluetooth Black Friday Roanoke — Central Technology Solutions MSP RMM GPS Identities Black Market Utility Computing Consulting Proactive IT Mirgation Development Zero-Day Threat Spyware Course Fraud Screen Reader Supercomputer Downloads Augmented Reality Managing Stress Instant Messaging Crowdsourcing Meetings Google Wallet Shortcut Dark Web Motherboard Writing Emoji OneNote Hard Drives Google Docs Firefox User Error Language Virtual Desktop eWaste Remote Worker Read Only G Suite History Cyber Monday technology services provider Network Congestion Proactive Tech Terms Tracking Webcam Emergency Printers IT Consultant CrashOverride Error Notes Cybercrime Web Server Regulation Cameras Motion Sickness Administrator CCTV Relocation Hard Disk Drive