Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Watch Out for Scammers During the Holidays

Tip of the Week: Watch Out for Scammers During the Holidays

Scammers find the holidays to be a wonderful time for stealing from unsuspecting victims. They know that the gift-giving season inspires others to spend a lot of money, which means that sensitive information, like credit card numbers, is up for grabs in bulk. As a consumer yourself, you’ll have to keep an eye out for these scams to make sure that you’re staying as safe as possible this holiday season.

Please keep in mind that what we recommend can only be seen as preventative measures. We can’t guarantee that your data will be protected adequately on the side of the business you’re purchasing from. If the retailer is known for suffering from data breaches (like Target), you might try to find other places to purchase gifts from, as you don’t want to risk your data becoming the target of hackers.

Do Some Research
Before you commit to a purchase, you should first see if the retailer has control over their security. Just go online and see if there have been any considerable data breaches for the retailer in the past few years. While it might seem a little unfair to judge a retailer based on what happened years ago, you need to look at what they have done since to improve security. If you suspect that the retailer hasn’t put in the work to keep their consumers safe, then just take your business elsewhere.

Check the Physical Area Around ATMs
While you might be hesitant to keep too much cash on you while you go shopping, sometimes it’s unavoidable. You might find yourself using an ATM, and hackers understand this need all too well. ATM scamming is nothing new, but it can be devastating under the right circumstances. ATMs can be tampered with to send credentials to a third party. ATMs can be fitted with devices on the card reader slot, or even have devices attached to the back. If the ATM has back panels missing, or devices attached to it, you should never use it. Make sure to double check for suspicious devices being fit to either the card reader or the backs of the machines, and only use ATMs that are in well-traveled areas that have security cameras in place.

Be Careful of Wireless Connections
Wireless communications are important while shopping this holiday season, but you should never use public Wi-Fi if you can help it. You’re better off using your mobile data plan, as unsecured networks that don’t require a sign-in are well-known dangers. You should set your devices so that they don’t automatically connect to these networks, as the data going into and out of your device could be watched by scammers.

Keep an Eye on Your Devices
Device theft is even more common during the holiday season, as more people are out. Pickpockets and thieves are more common, and they know how valuable your data and devices are. They could sell the information on the black market or sell the devices entirely.

For more great tips and tricks on how to stay safe and secure during the holiday season, subscribe to The Connection, Inc’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 23 January 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Computer Care Telephony Infrastructure App Alert Save Time Spam GPS Entrepreneur Chatbots Innovation Uninterrupted Power Supply IT Services End of Support Geography IT Support Google Software as a Service Point of Sale G Suite Big Data Spyware Hard Drive Business Growth CIO Customer Relationship Management Machine Learning Save Money Robot Firewall Typing Customer Service E-Commerce Managed IT Management Google Maps Zero-Day Threat Data Recovery Cables Computing Infrastructure Proactive Utility Computing Training Touchscreen IP Address Display IT Consulting Managed IT Services Managing Stress Hosted Solutions MSP Android Patch Management Security Compliance Downloads Disaster Recovery Cabling Cortana Virtualization Business Continuity Windows Bandwidth Licensing Monitors Lenovo Settings Vulnerability Facebook Modem PowerPoint Security Cameras Information Network Consumers Search Internet of Things Crowdsourcing Employee-Employer Relationship Avoiding Downtime Virtual Private Network Employer-Employee Relationship Halloween Tech Term Experience Malware Windows 10 Redundancy Office Website Bookmarks Business Computing Nanotechnology Microsoft Office Files Chromebook Vendor Management USB Education Cloud Digital Hard Disk Drive Government Electronic Health Records Risk Management 5G Collaboration Alerts LiFi VoIP Identity Bitcoin Black Friday Efficiency Remote Monitoring and Management Corporate Profile SharePoint Mobile Data Quick Tips Disaster Resistance Tablet Hotspot Environment Network Security Google Drive Data storage Botnet Saving Money Documents Analyitcs Health Virtual Reality Vulnerabilities Superfish Content Filtering IT service Mobile Device Managment Saving Time Programming Instant Messaging Migration Servers Consultation 3D Printing Mobile Google Docs Hacker Software Tips Chrome Personal Information Social Engineering Piracy Word Access Control Troubleshooting Asset Tracking Co-managed IT Hacks Hackers Drones Telephone Systems Hacking Marketing Business Technology Competition IBM Healthcare Fun Staff Best Practices Proactive IT Operating System Comparison Refrigeration Technology Upgrades Fleet Tracking Test Productivity Emoji Domains Unsupported Software Taxes Scam Mobile Devices User Tips Workplace Tips Data Warehousing Cyber Monday Trending Business Dark Data Upgrade Enterprise Resource Planning Email Recycling User Error Star Wars Technology Laws BYOD Legal Smart Tech Error IT Management Bring Your Own Device Social Public Cloud Encryption Information Technology Distributed Denial of Service Tracking Downtime Social Media Hiring/Firing Retail Dark Web Gmail Cookies Data Security Specifications Google Wallet Outsourced IT History Digital Payment Connectivity Authentication Automobile Identity Theft Router Computer Assessment IT Support Samsung Cache IT Consultant Authorization Statistics Public Speaking Blockchain Solid State Drive Data Breach Consulting CCTV Theft Break Fix Safety Mail Merge Tech Support Language Remote Workers Productivity User Fraud Google Calendar Gadget IoT IT solutions Humor Windows 10 communications Printer Cryptocurrency Favorites Phone System Internet Exlporer Backup and Disaster Recovery Unified Threat Management Backup Data loss Mirgation PDF Meetings Paperless Office Windows 8 Computing Tip of the Week Gadgets Cooperation Cyberattacks Physical Security Wireless Staffing Permissions Financial Social Networking Mobile Device Augmented Reality Managed Service Provider Regulations Identities Websites Document Management HIPAA Artificial Intelligence How To WannaCry Current Events Firefox Unified Threat Management Law Enforcement How To Office 365 Data Backup Passwords Digital Signature Processors High-Speed Internet Techology Recovery Privacy Data Business Owner Undo Cybercrime Smart Technology Software Managed Services Provider Project Management Wi-Fi Holiday Tip of the week Business Intelligence Computer Repair Legislation Antivirus Microsoft Finance WPA3 Sports Ransomware YouTube Unified Communications Employees Mobile Device Management Buisness Electronic Medical Records eWaste Motherboard Supercomputer Computers Virus Twitter Sync Cybersecurity Travel Intranet Mobile Security Administration Alt Codes Time Management Business Management Hard Drives Hardware Web Server Budget Relocation Best Practice VPN Server Knowledge SaaS Mouse iPhone Managed IT services Networking Browser Webcam OneNote Address Hosted Solution Storage Lithium-ion Battery Monitoring Network Congestion Network Management Technology Tips Printing Backups IT Budget Human Error Mobile Office Password Communication Mobility Politics Writing Motion Sickness Money Update Private Cloud Apps File Sharing WiFi Wires Permission Cleaning Development Users Read Only Work/Life Balance Net Neutrality Notifications Bluetooth Conferencing Miscellaneous Server Management Cost Management Microsoft Excel The Internet of Things Remote Computing Maintenance Smartphones Tech Terms Small Business Mobile Computing VoIP Operations Features Remote Monitoring Managed IT Service Applications Company Culture Internet Shortcut Presentation Cameras Running Cable Procurement ROI Wearable Technology Laptop Administrator RMM Managed Service Data Management Analytics Office Tips Help Desk Heating/Cooling Cloud Computing Virtual Desktop Apple Remote Worker Scary Stories Phishing Outlook IT Technicians Automation Multi-Factor Security Screen Reader Black Market Going Green Smartphone Wireless Technology Deep Learning Flexibility Enterprise Content Management Disaster Application Two-factor Authentication BDR

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code