301-571-5040    Get SUPPORT

Washington Works Blog

Tip of the Week: Watch Out for Scammers During the Holidays

Tip of the Week: Watch Out for Scammers During the Holidays

Scammers find the holidays to be a wonderful time for stealing from unsuspecting victims. They know that the gift-giving season inspires others to spend a lot of money, which means that sensitive information, like credit card numbers, is up for grabs in bulk. As a consumer yourself, you’ll have to keep an eye out for these scams to make sure that you’re staying as safe as possible this holiday season.

Please keep in mind that what we recommend can only be seen as preventative measures. We can’t guarantee that your data will be protected adequately on the side of the business you’re purchasing from. If the retailer is known for suffering from data breaches (like Target), you might try to find other places to purchase gifts from, as you don’t want to risk your data becoming the target of hackers.

Do Some Research
Before you commit to a purchase, you should first see if the retailer has control over their security. Just go online and see if there have been any considerable data breaches for the retailer in the past few years. While it might seem a little unfair to judge a retailer based on what happened years ago, you need to look at what they have done since to improve security. If you suspect that the retailer hasn’t put in the work to keep their consumers safe, then just take your business elsewhere.

Check the Physical Area Around ATMs
While you might be hesitant to keep too much cash on you while you go shopping, sometimes it’s unavoidable. You might find yourself using an ATM, and hackers understand this need all too well. ATM scamming is nothing new, but it can be devastating under the right circumstances. ATMs can be tampered with to send credentials to a third party. ATMs can be fitted with devices on the card reader slot, or even have devices attached to the back. If the ATM has back panels missing, or devices attached to it, you should never use it. Make sure to double check for suspicious devices being fit to either the card reader or the backs of the machines, and only use ATMs that are in well-traveled areas that have security cameras in place.

Be Careful of Wireless Connections
Wireless communications are important while shopping this holiday season, but you should never use public Wi-Fi if you can help it. You’re better off using your mobile data plan, as unsecured networks that don’t require a sign-in are well-known dangers. You should set your devices so that they don’t automatically connect to these networks, as the data going into and out of your device could be watched by scammers.

Keep an Eye on Your Devices
Device theft is even more common during the holiday season, as more people are out. Pickpockets and thieves are more common, and they know how valuable your data and devices are. They could sell the information on the black market or sell the devices entirely.

For more great tips and tricks on how to stay safe and secure during the holiday season, subscribe to Washington Works’s blog.

VoIP Is the Leading Choice for Business Communicat...
Why You Shouldn't Say “Humbug” to Your Security


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, March 23 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Productivity Privacy Malware Hackers Business Email Network Security Software Tech Term Hosted Solutions Internet Data Computer Data Backup Data Recovery Mobile Devices IT Support Ransomware IT Services Google Managed IT Services Efficiency Innovation User Tips Backup Business Management Microsoft Cloud Computing Hardware Small Business Productivity Outsourced IT Workplace Tips Managed Service Provider Android Paperless Office Smartphone Encryption Business Continuity Social Media Collaboration Remote Monitoring Windows 10 Office 365 Managed IT Services Smartphones Windows 10 Communication Phishing Browser Server Data Management Upgrade Save Money Cybersecurity Government VoIP Holiday Employer-Employee Relationship Communications Disaster Recovery Bandwidth IT Management App Quick Tips Wi-Fi Business Technology BDR Artificial Intelligence BYOD Passwords Internet of Things Unified Threat Management Compliance Apps Work/Life Balance Document Management Facebook Infrastructure Tip of the week Managed Service Information Automation Scam Risk Management Antivirus Healthcare Windows Vulnerability Saving Money SaaS VPN Maintenance Applications Hosted Solution Two-factor Authentication Word Office Password Politics Chrome Money File Sharing Blockchain Chromebook Microsoft Office Customer Relationship Management Virtual Reality Big Data Vendor Management Network How To Mobile Device Identity Theft Access Control HIPAA Wireless How To Management Samsung Point of Sale Mobile Security Physical Security Twitter Telephone Systems Electronic Medical Records Mobile Device Management Computing Data Security G Suite Analytics Smart Technology Server Management Private Cloud Computer Care Virtual Private Network Robot Firewall Tablet Downtime Bring Your Own Device Taxes Recovery Social Tech Support Router Remote Monitoring and Management Training Remote Computing Employees Remote Workers Hacker Websites Gmail Company Culture Meetings Regulations IoT Patch Management Storage Botnet Website Automobile Alert Data loss Professional Services Health Machine Learning Asset Tracking Tech Terms Emoji Printing Networking Enterprise Content Management Bookmarks Crowdsourcing Gadget Dark Web Nanotechnology WiFi Licensing Cyberattacks Spam Windows 7 Cyber Monday Motherboard Uninterrupted Power Supply Servers MSP Human Error Cost Management YouTube USB Consulting Software as a Service Travel Mouse Identity Network Management Development Authentication Relocation Cleaning Managed IT OneNote Theft Remote Worker Supercomputer SharePoint Unified Communications Favorites Personal Information Microsoft Excel Screen Reader GPS Cooperation Enterprise Resource Planning Files Proactive Permission Update Hotspot Assessment Settings Dongle Managed Services Provider Wasting Time Motion Sickness IT Support Touchscreen Cables Authorization Legal Corporate Profile Outlook Employee-Employer Relationship Augmented Reality ROI IT Budget Downloads IT Technicians Google Drive Project Management Smart Tech Test Financial Office Tips Tracking Unified Threat Management Staff Lenovo Mobile Read Only Notifications Web Server Distributed Denial of Service Solid State Drive Statistics Error Language Internet Exlporer Digital Mail Merge Service Level Agreement E-Commerce IT Solutions IBM Database Comparison Cabling Wires Sports WannaCry Shortcut Virtualization The Internet of Things Notes Digital Payment Multi-Factor Security Mirgation VoIP Techology Vulnerabilities Conferencing Computer Repair IT Consultant Connectivity WPA3 RMM Procurement User Error Firefox Superfish Gadgets Budget Cameras Managed IT Service Modem Hard Disk Drive Bluetooth Staffing Computing Infrastructure Value Spyware Address Utility Computing Features Upgrades Processors Voice over Internet Protocol Specifications Search Zero-Day Threat Monitors PowerPoint Cybercrime Google Calendar Avoiding Downtime Geography Instant Messaging Permissions Fleet Tracking Operating System Security Cameras Administrator Printer Wearable Technology Managing Stress Help Desk Users Law Enforcement CCTV Break Fix Cookies Alerts Electronic Health Records Customer Service Net Neutrality Webcam Black Friday Social Networking Disaster Heating/Cooling Backup and Disaster Recovery Fraud Star Wars Monitoring Cortana Black Market Virtual Assistant Legislation Chatbots Time Management High-Speed Internet Finance Education Domains Emergency Hiring/Firing Public Speaking Presentation Fun Lithium-ion battery Wireless Technology 5G Safety Marketing Hard Drives Printers Competition IP Address Miscellaneous CrashOverride Regulation Mobile Office