Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Watch Out for Scammers During the Holidays

Tip of the Week: Watch Out for Scammers During the Holidays

Scammers find the holidays to be a wonderful time for stealing from unsuspecting victims. They know that the gift-giving season inspires others to spend a lot of money, which means that sensitive information, like credit card numbers, is up for grabs in bulk. As a consumer yourself, you’ll have to keep an eye out for these scams to make sure that you’re staying as safe as possible this holiday season.

Please keep in mind that what we recommend can only be seen as preventative measures. We can’t guarantee that your data will be protected adequately on the side of the business you’re purchasing from. If the retailer is known for suffering from data breaches (like Target), you might try to find other places to purchase gifts from, as you don’t want to risk your data becoming the target of hackers.

Do Some Research
Before you commit to a purchase, you should first see if the retailer has control over their security. Just go online and see if there have been any considerable data breaches for the retailer in the past few years. While it might seem a little unfair to judge a retailer based on what happened years ago, you need to look at what they have done since to improve security. If you suspect that the retailer hasn’t put in the work to keep their consumers safe, then just take your business elsewhere.

Check the Physical Area Around ATMs
While you might be hesitant to keep too much cash on you while you go shopping, sometimes it’s unavoidable. You might find yourself using an ATM, and hackers understand this need all too well. ATM scamming is nothing new, but it can be devastating under the right circumstances. ATMs can be tampered with to send credentials to a third party. ATMs can be fitted with devices on the card reader slot, or even have devices attached to the back. If the ATM has back panels missing, or devices attached to it, you should never use it. Make sure to double check for suspicious devices being fit to either the card reader or the backs of the machines, and only use ATMs that are in well-traveled areas that have security cameras in place.

Be Careful of Wireless Connections
Wireless communications are important while shopping this holiday season, but you should never use public Wi-Fi if you can help it. You’re better off using your mobile data plan, as unsecured networks that don’t require a sign-in are well-known dangers. You should set your devices so that they don’t automatically connect to these networks, as the data going into and out of your device could be watched by scammers.

Keep an Eye on Your Devices
Device theft is even more common during the holiday season, as more people are out. Pickpockets and thieves are more common, and they know how valuable your data and devices are. They could sell the information on the black market or sell the devices entirely.

For more great tips and tricks on how to stay safe and secure during the holiday season, subscribe to The Connection, Inc’s blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 19 March 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Refrigeration Avoiding Downtime Application Conferencing Relocation Google Maps Data Licensing Data Breach Cache BYOD Websites Phishing Samsung Information Maintenance Managing Stress Black Market Hotspot Bluetooth Consumers Migration Machine Learning Business Monitoring Recovery WannaCry Website Ransomware Theft Router Hard Disk Drive Telephony Unified Threat Management Managed Service Google Tracking Professional Services Privacy Saving Time Data loss Environment Data Backup Supercomputer Wearable Technology Content Filtering Procurement Internet Exlporer Automobile BDR Virtual Reality Email CCTV Shortcut Remote Monitoring and Management Virtual Private Network Communication 3D Printing How To Hackers Cloud Budget Wireless Technology Piracy Digital Monitors USB Law Enforcement Apple Risk Management Instant Messaging HIPAA Recycling Security Cameras communications Backup Work/Life Balance Proactive IT Competition Windows 8 Connectivity Technology Remote Computing Identity Theft Mail Merge Favorites Cybercrime Virtual Assistant Network Management Knowledge Network Security Cookies Mobile Devices Cooperation Mobile Office Data storage Botnet Running Cable Development Error Writing Net Neutrality Going Green Smartphones Business Technology IT Consulting Computer Unsupported Software Files Alt Codes ROI Two-factor Authentication Gadget Tech Terms Comparison Search Antivirus Downloads Mouse Multi-Factor Security Webcam Drones Enterprise Resource Planning Spam Asset Tracking Statistics Utility Computing Wireless Phone System Browser Wasting Time Health Server Management IT Technicians Mobile Device Management Google Wallet Disaster Resistance Vulnerabilities Automation Electronic Health Records Hacks G Suite Disaster Regulations Artificial Intelligence Trending Word RMM Private Cloud Quick Tips Productivity Voice over Internet Protocol Operating System Cables History Disaster Recovery Uninterrupted Power Supply Telephone Systems Innovation Specifications Printing Identities Electronic Medical Records Training MSP IT Budget Black Friday Hacking Windows 7 Saving Money Small Business Fraud How To Break Fix Managed IT Service High-Speed Internet Digital Payment Enterprise Content Management Business Growth Infrastructure Sports WPA3 VoIP Managed IT Services Alerts Access Control Fleet Tracking Mobile Cryptocurrency PDF Social Networking Smart Tech Documents Taxes Information Technology Computing Mobile Computing YouTube eWaste Office Outlook Save Time Tip of the Week Notes Database Tablet IT Consultant Education IT solutions Staffing Microsoft Office Customer Service Big Data Legal E-Commerce Authorization VPN Administrator Business Intelligence Authentication Halloween Assessment Tech Support Money Hard Drive Superfish Social Media Servers Typing Remote Monitoring IP Address SaaS Upgrades Business Continuity Paperless Office Networking Collaboration Bring Your Own Device Staff Efficiency Travel Vendor Management Windows 10 Administration Office 365 Co-managed IT Undo Nanotechnology Holiday Consultation Internet Workplace Tips Managed Services Provider Buisness Lenovo Hosted Solution Emoji LiFi Hiring/Firing Google Calendar Password Data Recovery Apps IT Services Data Warehousing Entrepreneur Compliance User Tips Sync Scary Stories Test Permissions Users Smart Technology Government Save Money Encryption Help Desk Cyber Monday Hardware Managed IT services Digital Signature 5G Domains Virtual Desktop Tip of the week Time Management Server Cabling Downtime IBM WiFi Intranet The Internet of Things GPS Company Culture Remote Workers Bandwidth iPhone Productivity Android Firewall User Error Marketing Public Speaking Physical Security Business Management Tech Term Retail Virtualization Computers SharePoint Techology IT Support Deep Learning Corporate Profile Social Engineering Hosted Solutions Printer Document Management Processors Best Practice Network Congestion Proactive Safety Managed IT Management Mobile Security Current Events Fun Unified Threat Management Hacker Permission Operations Hard Drives Robot Office Tips Notifications Flexibility Star Wars Wi-Fi Geography Cloud Computing Cleaning Analytics Motion Sickness Storage Solid State Drive Employees Read Only Cost Management Employee-Employer Relationship Troubleshooting Unified Communications Address Public Cloud Best Practices Google Drive Chrome Personal Information Software Tips File Sharing Dark Data PowerPoint Business Owner Zero-Day Threat Redundancy Computer Care Laptop Microsoft Excel Augmented Reality Microsoft Remote Worker Point of Sale Wires Distributed Denial of Service Finance Mirgation Backups Consulting Identity Network Legislation Patch Management Settings Cybersecurity Chatbots Features Meetings Bitcoin Security Cortana Web Server Cyberattacks CIO Firefox Update Upgrade Miscellaneous Software as a Service Humor Motherboard Alert VoIP Virus Software Spyware Business Computing Dark Web Display Malware Windows 10 OneNote Computer Repair Crowdsourcing Vulnerability Programming Experience Employer-Employee Relationship Google Docs Passwords Computing Infrastructure Bookmarks Mobile Data Customer Relationship Management Mobile Device Managment Language Lithium-ion Battery IoT Facebook Project Management User Presentation Mobile Device Scam Twitter Gmail Human Error Modem Touchscreen Applications Data Security IT Management Social Internet of Things Backup and Disaster Recovery Windows Politics Cameras Blockchain End of Support Healthcare Analyitcs Technology Tips Data Management Technology Laws IT service Chromebook Outsourced IT Managed Service Provider Financial Smartphone App Gadgets IT Support Mobility Screen Reader Heating/Cooling

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...