Heart of Texas Network Consultants Blog

Don’t Get Scammed with Gift Cards

Don’t Get Scammed with Gift Cards

It’s the holiday season, and shoppers are flocking to stores to find the perfect gift for anyone: the gift card. However, these handy little plastic rectangles may not be so perfect after all. This year, they’ve been a key component to a business email compromise scam that has been popular in the past few months.

Why Gift Cards, And Why Businesses
Let’s look at the situation for a moment. You spend most of your time around your team. You’ve more than likely developed some kind of familiarity with them, or at the very least have been roped into an office gift exchange. If you aren’t familiar with all of your coworkers or employees, you may have a rough time selecting the right gift for them.

In light of this, it starts to make sense to gift them something that they can pick out for themselves, as gift cards enable you to do. This probably explains why gift cards are such a popular option for so many.

Unfortunately, this also practically hands scammers the opportunity to make a lot of money.

The Scam in Action
Using spoofed emails and social engineering tactics to their advantage, a hacker can scam a company’s users by posing as an authority figure, like the president or the CEO. Under this guise, the scammer can instruct the user to purchase gift cards for the staff and to pass along the redemption codes to the scammer.

Since these instructions “come from above,” the employee complies, not realizing that they are sending company funds to a cybercriminal in an effectively untraceable form of currency.

How to Avoid This Scam
Awareness is key to protecting your business’ interests, resources, and funds--and this awareness needs to be on all levels of your organization. Each and every member needs to be educated on how to spot these scams, and how to confirm them.

This confirmation is another crucial component to your business security. If your employees don’t develop the habit of confirming requests like this through a secondary line of communication, the company is left vulnerable to this scam and similar ones. Sure, fielding confirmation requests from your employees may get old, and fast, but it will almost certainly be preferable when compared to being scammed.

When all is said and done, scammers are going to keep trying to take advantage of you, your employees, and your business at large. Heart of Texas Network Consultants can help to protect you. Give us a call at (254) 848-7100 today.

How the Grinch Didn’t Send that Email!
Tip of the Week: Easy Android Use Tricks
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Tuesday, February 19 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Cybercrime Mobility Cybersecurity Two-factor Authentication Data Backup Chrome Government Malware Office Tips Wireless Technology Router Mobile Office Email The Internet of Things History Remote Computing Risk Management Unsupported Software Smartphones WiFi Money Outsourced IT Marketing Wi-Fi Antivirus USB Wireless VoIP Security Cloud Computing Apps Printer Tip of the Week Retail Network Security Cost Management Search Productivity Operating System Unified Threat Management Mobile Devices Office Cloud Information Technology Excel Gadgets Communication Laptop Vulnerability Proactive IT Automation communications Users Collaboration IT Support Encryption Upgrade Current Events Law Enforcement Tech Support Technology Mobile Device Management App Business Continuity Hacking Workplace Tips Shortcut Networking Mobile Computing Big Data Applications Server Microsoft Office BYOD Privacy Hosted Solutions Computers Windows 8 Phishing Save Money Data Politics Artificial Intelligence Holiday Telephone Systems Managed IT Services Vendor Management Best Practice Lithium-ion battery Bring Your Own Device Data Recovery Update Hard Drives Streaming Media Employer-Employee Relationship Small Business Tech Term Health Social Maintenance Spam Internet Smartphone Business Management Passwords Business Computing Budget Avoiding Downtime Entertainment Managed Service Provider OneNote Saving Money Productivity Humor Social Engineering Customer Relationship Management Microsoft User Error User Tips Data Security Disaster Recovery Social Media Hardware Ransomware Backup Computer Efficiency Windows Virtualization iPhone Application Google Drive Going Green Miscellaneous PowerPoint Facebook Gmail Hackers Hosted Solution Windows 10 IT Support Software IT Services Internet of Things Office 365 Data Management Browser Innovation Quick Tips Alert Bandwidth Tablet Google Password Android Best Practices Business Network BDR Windows 10