Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Don’t Get Scammed with Gift Cards

Don’t Get Scammed with Gift Cards

It’s the holiday season, and shoppers are flocking to stores to find the perfect gift for anyone: the gift card. However, these handy little plastic rectangles may not be so perfect after all. This year, they’ve been a key component to a business email compromise scam that has been popular in the past few months.

Why Gift Cards, And Why Businesses
Let’s look at the situation for a moment. You spend most of your time around your team. You’ve more than likely developed some kind of familiarity with them, or at the very least have been roped into an office gift exchange. If you aren’t familiar with all of your coworkers or employees, you may have a rough time selecting the right gift for them.

In light of this, it starts to make sense to gift them something that they can pick out for themselves, as gift cards enable you to do. This probably explains why gift cards are such a popular option for so many.

Unfortunately, this also practically hands scammers the opportunity to make a lot of money.

The Scam in Action
Using spoofed emails and social engineering tactics to their advantage, a hacker can scam a company’s users by posing as an authority figure, like the president or the CEO. Under this guise, the scammer can instruct the user to purchase gift cards for the staff and to pass along the redemption codes to the scammer.

Since these instructions “come from above,” the employee complies, not realizing that they are sending company funds to a cybercriminal in an effectively untraceable form of currency.

How to Avoid This Scam
Awareness is key to protecting your business’ interests, resources, and funds--and this awareness needs to be on all levels of your organization. Each and every member needs to be educated on how to spot these scams, and how to confirm them.

This confirmation is another crucial component to your business security. If your employees don’t develop the habit of confirming requests like this through a secondary line of communication, the company is left vulnerable to this scam and similar ones. Sure, fielding confirmation requests from your employees may get old, and fast, but it will almost certainly be preferable when compared to being scammed.

When all is said and done, scammers are going to keep trying to take advantage of you, your employees, and your business at large. Network Solutions Unlimited can help to protect you. Give us a call at 217-428-6449 today.

How the Grinch Didn’t Send that Email!
Tip of the Week: Easy Android Use Tricks
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Employer Employee Relationship Rootkit Thank You Twitter Upgrade WannaCry Professional Services Big Data Communications Specifications Vendor Management Robot Root Cause Analysis Compliance Updates Spam Blocking Information Technology Remote Computing Privacy CrashOverride Internet Commerce Managed IT Services Microsoft Excel Windows Ink Data Security Hyperlink Benefits Google Drive Worker Worker Commute Language SMB Books Wasting Time Update Security Technology Automobile Business Continuity Mobile Security Business Management Bring Your Own Device Management Reputation Battery Analysis Congratulations Microsoft Word Google Assistant IT Service Telephone Systems Projects Video Games Windows Office Ciminal Proactive IT Artificial Intelligence Data Privacy Business Computing Administration Ransomware Printing Hardware Legal Quick Tips Cost Management Financial Cleaning Black Market Productivity SaaS Touchscreen Co-Managed Services Phone System Amazon Emergency Outlook Human Resources The Internet of Things Managed IT Services Hard Drives Computer Forensics Best Practices Social Engineering Efficiency Word Flexibility Telephone IT Solutions Saving Money FAQ Maintenance Risk Management Cast Workplace Tips Browser Meetings Evernote Data Management Admin Business Recovery Server Virtual Reality Internet exploMicrosoft OneNote Access Control Work/Life Balance App store Scalability Assessment Health Keyboard Shortcuts Utility Computing Transportation Settings Content iPhone Mobile Device Management Data Two-factor Authentication Hard Disk Drive Monitor App Gadgets Testing Legislation Employee-Employer Relationship Money IT solutions Saving Time Smart Tech hacker Wasting Money Streaming Media File Storage Best Practice Solid State Drive Social Media Financial Technology Communication Wireless Peripheral Nanotechnology Application Edge Computer Accessories Tech Term Emails Router Data Breach How To Audit Firewall Keyboard Consultant Conferencing Chrome Instant Messaging Going Green Computers Vendor Scam Avoiding Downtime Remote Workers VPN Innovation Techology Windows 10s Electronic Medical Records Identity Theft Unified Threat Management Hybrid Cloud Loyalty NFL Charger Unified Communications Data Backup Miscellaneous Downtime Retail Display Business Intelligence Passwords Shortcut Data Protection Training Holiday HBO Content Filtering Law Enforcement Internet of Things Cache BDR Search IoT Windows 7 Device Security Machine Learning Personal Information Public Cloud Google Augmented Reality VoIP Business Owner Shadow IT Software Data storage IT Management Identities Computer Care Google Docs Managed IT Service Excel Customer Lifestyle Patch Management Webinar Managing Stress Apple Colocation Education User Tips Politics Cloud Files Cloud Computing Collaboration Apps Sales Virus Data Loss Wireless Internet Productivity MSP Password Entertainment IT Support Office Tips Identity Smartphones Audiobook Physical Security Devices Comparison Virtual Private Network Microsoft Office Malware History Windows 10 Accessory PDF Upgrades Wireless Technology Dark Web Software as a Service Company Culture Hard Drive BYOD Marketing Sync Laptop Printers Monitoring Storage Chromebook Tip of the Week WPA3 Outsourced IT Hacking Adobe Television Network Security HaaS Network Antivirus Tech Support Gamification Mobility Paperless Office File Sharing Networking Virtualization Document Management Memory Mobile Devices Monitors Operating System Project Management Managed Service Wi-Fi Applications Students Humor Phishing Blockchain Computing Infrastructure Advertising WiFi Remote Monitoring Content Filter eWaste Travel Unsupported Software IT Support Encryption User Error Safety Gmail Vulnerability Redundancy Regulation Tablets Virtual Assistant Proactive Samsung Private Cloud Credit Cards Chromecast Office 365 IT budget Touchpad Disaster Recovery intranet Computer Alexa for Business iOS Data Storage Spam Google Maps USB Cybersecurity Save Money Hiring/Firing Hackers Microsoft WIndows Server 2008 Hosted Solutions Troubleshooting Spyware Workers Small Business Mobile Device Public Computer Security Cameras Experience Data Theft Connectivity Two Factor Authentication Android Smartphone Screen Mirroring Bandwidth Relocation Sports PowerPoint Alert Computer Fan Wireless Charging Data Recovery Users Smart Technology Cybercrime Payroll Managed Service Provider Mobile Value Managed IT Hosted Solution Cortana Information HIPAA Government Budget Automation Business Technology Windows 10 Bluetooth Computing Employer-Employee Relationship End of Support Internet Exlporer Email Websites IT Services How to Fraud Facebook Licensing Gifts Backup Camera Save Time