Heart of Texas Network Consultants Blog

Don’t Get Scammed with Gift Cards

Don’t Get Scammed with Gift Cards

It’s the holiday season, and shoppers are flocking to stores to find the perfect gift for anyone: the gift card. However, these handy little plastic rectangles may not be so perfect after all. This year, they’ve been a key component to a business email compromise scam that has been popular in the past few months.

Why Gift Cards, And Why Businesses
Let’s look at the situation for a moment. You spend most of your time around your team. You’ve more than likely developed some kind of familiarity with them, or at the very least have been roped into an office gift exchange. If you aren’t familiar with all of your coworkers or employees, you may have a rough time selecting the right gift for them.

In light of this, it starts to make sense to gift them something that they can pick out for themselves, as gift cards enable you to do. This probably explains why gift cards are such a popular option for so many.

Unfortunately, this also practically hands scammers the opportunity to make a lot of money.

The Scam in Action
Using spoofed emails and social engineering tactics to their advantage, a hacker can scam a company’s users by posing as an authority figure, like the president or the CEO. Under this guise, the scammer can instruct the user to purchase gift cards for the staff and to pass along the redemption codes to the scammer.

Since these instructions “come from above,” the employee complies, not realizing that they are sending company funds to a cybercriminal in an effectively untraceable form of currency.

How to Avoid This Scam
Awareness is key to protecting your business’ interests, resources, and funds--and this awareness needs to be on all levels of your organization. Each and every member needs to be educated on how to spot these scams, and how to confirm them.

This confirmation is another crucial component to your business security. If your employees don’t develop the habit of confirming requests like this through a secondary line of communication, the company is left vulnerable to this scam and similar ones. Sure, fielding confirmation requests from your employees may get old, and fast, but it will almost certainly be preferable when compared to being scammed.

When all is said and done, scammers are going to keep trying to take advantage of you, your employees, and your business at large. Heart of Texas Network Consultants can help to protect you. Give us a call at (254) 848-7100 today.

How the Grinch Didn’t Send that Email!
Tip of the Week: Easy Android Use Tricks


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, April 18 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Saving Money Cloud Government Microsoft Office Streaming Media Network Security Application Maintenance Laptop Business Management Social Engineering VoIP Mobile Office Going Green PowerPoint Miscellaneous Business Computing Office Windows 10 Router Office 365 Printer Information Holiday Browser Computer WiFi Update Vulnerability Antivirus Alert Budget Vendor Management Bandwidth BYOD Unsupported Software Humor Workplace Tips Internet of Things Social Media Security Hosted Solutions Windows 10 Marketing Wi-Fi Managed Service Provider Education Tech Support Hacking Money Spam Bring Your Own Device OneNote Proactive IT USB Current Events Mobility Virtualization Mobile Devices Law Enforcement Two-factor Authentication Data Backup Politics Customer Relationship Management Server Big Data Productivity Productivity Telephone Systems Encryption History Data Recovery Phishing Technology Hackers communications Hard Drives Tip of the Week Efficiency Google Drive Lithium-ion battery Artificial Intelligence Cybersecurity Disaster Recovery Facebook Smartphone App Gadgets Social Automation Shortcut Data Security Innovation Upgrade Mobile Computing Email Remote Computing Networking Data Communication Business Chrome Privacy Smartphones Mobile Device Management BDR IT Support Search The Internet of Things IT Support Cloud Computing Internet Windows Best Practices Users Hardware IT Services Wireless Technology Quick Tips Gmail Best Practice Malware Health Password Data Management Android Managed IT Services Office Tips Apps Employer-Employee Relationship Google Passwords Microsoft Save Money Information Technology Wireless Business Continuity Avoiding Downtime Collaboration Cybercrime Tablet Entertainment Small Business Cost Management Managed IT Services Ransomware Windows 8 Computers Software Tech Term Operating System Risk Management Applications Outsourced IT Unified Threat Management User Error Backup iPhone User Tips Network