Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Don’t Get Scammed with Gift Cards

Don’t Get Scammed with Gift Cards

It’s the holiday season, and shoppers are flocking to stores to find the perfect gift for anyone: the gift card. However, these handy little plastic rectangles may not be so perfect after all. This year, they’ve been a key component to a business email compromise scam that has been popular in the past few months.

Why Gift Cards, And Why Businesses
Let’s look at the situation for a moment. You spend most of your time around your team. You’ve more than likely developed some kind of familiarity with them, or at the very least have been roped into an office gift exchange. If you aren’t familiar with all of your coworkers or employees, you may have a rough time selecting the right gift for them.

In light of this, it starts to make sense to gift them something that they can pick out for themselves, as gift cards enable you to do. This probably explains why gift cards are such a popular option for so many.

Unfortunately, this also practically hands scammers the opportunity to make a lot of money.

The Scam in Action
Using spoofed emails and social engineering tactics to their advantage, a hacker can scam a company’s users by posing as an authority figure, like the president or the CEO. Under this guise, the scammer can instruct the user to purchase gift cards for the staff and to pass along the redemption codes to the scammer.

Since these instructions “come from above,” the employee complies, not realizing that they are sending company funds to a cybercriminal in an effectively untraceable form of currency.

How to Avoid This Scam
Awareness is key to protecting your business’ interests, resources, and funds--and this awareness needs to be on all levels of your organization. Each and every member needs to be educated on how to spot these scams, and how to confirm them.

This confirmation is another crucial component to your business security. If your employees don’t develop the habit of confirming requests like this through a secondary line of communication, the company is left vulnerable to this scam and similar ones. Sure, fielding confirmation requests from your employees may get old, and fast, but it will almost certainly be preferable when compared to being scammed.

When all is said and done, scammers are going to keep trying to take advantage of you, your employees, and your business at large. Network Solutions Unlimited can help to protect you. Give us a call at 217-428-6449 today.

How the Grinch Didn’t Send that Email!
Tip of the Week: Easy Android Use Tricks
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 19 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Updates Humor Hosted Solution The Internet of Things Outsourced IT iPhone App store Project Management Cost Management Travel Sales WannaCry Identity Theft Comparison App Printers Tip of the Week Data storage Admin Reputation Hard Disk Drive WiFi Backup Business Small Business Network Security Proactive IT Human Resources Mobile Security Gamification HBO Office 365 Malware Payroll Scalability Avoiding Downtime Monitor Software as a Service Phone System Smart Tech Telephone Troubleshooting iOS Internet Techology Flexibility Employee Augmented Reality Data Recovery Remote Workers Managed IT Service Display Cache Experience Colocation Regulation Cortana Bandwidth Chrome Computer Accessories Audit Mobility Worker eWaste Google Assistant IT budget Computing IT Service Assessment Managed Service File Storage Proactive Video Games Wireless Internet Two-factor Authentication Remote Computing Safety Hyperlink Public Computer Evernote Audiobook Google Maps Word Update FAQ Big Data Applications Managing Stress Computer Fan Productivity Social Media Data Protection Hiring/Firing Cleaning Recovery Lifestyle Politics User Tips Printing Government Saving Money Emails Data Theft Mobile Managed IT Break/Fix Upgrades Loyalty Battery Data Security Computer Forensics Computer Care Identity Medical IT Hardware Tablets Smartphone Windows 7 Technology Automation Networking Streaming Media Nanotechnology How to Security Cameras Electronic Medical Records HIPAA Collaboration Professional Services Firewall Credit Cards Employee-Employer Relationship Hackers Windows Ink Wireless Encryption Tech Term Bring Your Own Device Work/Life Balance Backup and Disaster Recovery Automobile Accessory Google SMB Innovation Holiday Amazon Mobile Devices Document Management WIndows Server 2008 Content Legislation Conferencing Company Culture Microsoft Vulnerability Fraud Employer Employee Relationship hacker Mobile Device Management Touchscreen Solid State Drive Business Computing Marketing Virtual Private Network Best Practice Edge Saving Time USB Bluetooth Books SaaS Mobile Device Utility Computing Dark Web User Error Cybercrime Devices Business Intelligence Data Miscellaneous Hybrid Cloud Social Engineering Congratulations Identities Patch Management Alexa for Business Education Meetings How To VoIP Internet of Things Unified Communications Spam Financial Technology Quick Tips Peripheral OneNote Licensing Facebook Monitoring Gifts Emergency Android Windows 10s Private Cloud IT Services Risk Management Settings Robot Data Backup Going Green Chromebook Device Security Paperless Office Retail Connectivity Virtualization File Sharing Computing Infrastructure End of Support Hard Drive NFL Hosted Solutions WPA3 Sports Ransomware Cast Keyboard Data Loss Websites Office Tips Vendor Smart Technology Best Practices Users Operating System Wasting Time Security Unified Threat Management Gadgets Payment Cards Webinar Projects Administration Google Drive Value Email Monitors Keyboard Shortcuts HaaS Root Cause Analysis Router Data Privacy Language Laptop Cloud Computing Personal Information Storage Alert Money Smartphones Health Relocation Windows IT Management Network Compliance Camera Customer Transportation Wireless Technology Server Telephone Systems IT Support Commerce Worker Commute Office Excel Financial Employer-Employee Relationship Analytics Black Market Budget Wi-Fi VPN Workers Consultant Content Filter Scam Training Shadow IT Entertainment Law Enforcement Browser Save Money Maintenance Managed IT Services Data Breach Touchpad Internet Exlporer Vendor Management Thank You Charger Legal Managed Service Provider Antivirus Artificial Intelligence Spam Blocking Disaster Recovery PDF Virtual Assistant intranet Screen Mirroring Remote Monitoring Analysis Content Filtering Cloud Microsoft Office Windows 10 History Workplace Tips Software Co-Managed Services Information Save Time IT solutions Application Testing Data Management Microsoft Excel Shortcut IT Support Password E-Commerce Microsoft Word Communication Twitter Physical Security MSP Apps Instant Messaging Efficiency Data Storage Information Technology Advertising Business Technology Business Management Tech Support Apple Virus Hacking Gmail Unsupported Software Search Google Docs Cybersecurity Computer Two Factor Authentication Business Continuity Computers CrashOverride Adobe Privacy Hard Drives Students BDR IT Solutions Blockchain Virtual Reality Rootkit Files Ciminal IoT BYOD Upgrade Machine Learning Access Control Benefits Specifications Passwords Public Cloud Phishing Redundancy Sync Television Spyware Windows 10 Memory Management Productivity Wasting Money Downtime Communications Business Owner Outlook PowerPoint Chromecast Samsung Managed IT Services Wireless Charging Internet exploMicrosoft