631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Scammers Can Use Gift Cards to Target Your Company

Scammers Can Use Gift Cards to Target Your Company

Ready or not, the season of giving is here, and that means it’s gift card season. These can seem to be the perfect gift for coworkers and employees… which is why everyone will need to be wary of a particular business email compromise scam that has seen an uptick this year.

Some Background
Let’s face it - business owners, managers, and employees often feel the need to recognize the holiday season with some small gift or trinket given to their teammates.

However, some office relationships are strictly based around office matters, which makes gift-giving difficult. Moreover, the people who generally would be distributing gifts to the entire office - management - probably don’t have the time to select a well-thought-out gift for each employee. Frankly, in circumstances like these, the best gift is one that the recipient can pick out for themselves.

Hence, the popularity of gift cards in the workplace, and the reason that these scams can work so well.

How the Scam Plays Out
A cybercriminal carrying out this scam will leverage email spoofing and social engineering to pose as one of a company’s higher-ups, like the president or the CEO. Using this persona, the scammer then reaches out to an employee with a request to buy gift cards for the staff. Seeing as this request is “from the boss,” and these emails are typically directed to upper members of the business and accounting staff, the employee complies.

Inside the email, the scammer instructs the employee to provide the codes from the gift cards, allowing them to redeem them and make their own use of them. Since gift cards are an untraceable form of currency, the scammer gets away with it with very little effort.

How to Avoid Being Scammed
When it all comes down to it, the best defense is old-fashioned vigilance. Everyone in the company needs to be aware of threats like these and know how to spot them.

Most crucially, there needs to be a companywide understanding that any claims like this need to be substantiated through a second means of communication. While a twenty-second phone call may sound more like a pain than anything else, it is nothing at all compared to the stress and hassle of being scammed.

Scammers are only getting more clever. For assistance in keeping yourself safe, turn to the professionals at Suffolk Computer Consultants. Call 631-905-9617 today.

The Unofficial Guide to Comprehensive Google Accou...
Tip of the Week: 5 Ways IT Adds to Business Succes...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Cloud Privacy Productivity Network Security User Tips Cybersecurity Malware Communications Smartphones Microsoft Tech Term Managed IT Services Backup Hardware Efficiency Passwords Business Internet Google Email Communication Software Hackers Innovation Business Management Android Small Business Outsourced IT Hosted Solutions Ransomware Browser Data Backup Windows 10 Data Recovery VoIP Wi-Fi Mobile Device Data Collaboration Smartphone IT Services Social Media Alert Cloud Computing Mobile Devices Holiday Applications Internet of Things Microsoft Office IT Support Save Money Network Users Miscellaneous Saving Money Bandwidth Employer-Employee Relationship Wireless Managed IT Services Business Intelligence Computer Router Apps Password Twitter Access Control Automation Office 365 Word Government Analytics VoIP Data Management Networking Business Continuity Data Breach Phishing Virtualization Patch Management Settings Vulnerability Information BDR Marketing Excel Gadgets Office Blockchain Workplace Tips Website Hacking Company Culture Politics Computers Compliance Paperless Office IT Support Cost Management Artificial Intelligence Windows How To Spam Remote Monitoring Mobile Device Management Wireless Charging Law Enforcement Data Protection Physical Security Managed IT Service G Suite Facebook Gmail Remote Monitoring and Management WiFi Cybercrime Retail Scam Medical IT Tech Terms Connectivity Dark Web Workers Battery VPN Data Security Productivity Virtual Assistant Mobility Cortana Chrome Tip of the week Remote Computing Managed Service BYOD Virus App Storage WannaCry Spam Blocking Environment Business Technology Training Server Management Downloads eCommerce Copy Backup and Disaster Recovery Apple Eliminating Downtime Hiring/Firing Ink Telecommuting SaaS Websites News Microsoft Teams Document Management Multi-Factor Security Tactics Conferencing Plug-In Upgrade Payment Licensing Trends Online Shopping Error Staffing HIPAA Email Management e-waste Sales Cables Security Cameras Work/Life Balance Paste SSD iPhone Wireless Internet Managed IT IT budget PowerPoint Millennials Telephone System Managing Stress Troubleshooting Botnet Gadget Digital Internet Explorer Content Filtering Proactive IT instant Messaging Office Tips Information Technology Automobile Machine Learning Travel A.I. Touchscreen Hard Drive disposal Tablet Voice over Internet Protocol Wearables Reporting Two-factor Authentication Printer Server Inventory Help Desk IT Management Sports Dongle Update Hard Drives Shortcut Edge Threat Entertainment Vulnerabilities Biometrics Telecommute Live Streaming Movies Microsoft Office 365 Recovery Processors Value Knowledge Healthcare Disaster Recovery Tech Support Cleaning Printers Lead Generation Telephone Systems Mobile Security File Sharing Certification Server Maintenance Files Telephony Remote Support Bring Your Own Device Outlook Safety CrashOverride Laptop Printing User Tip Analysis Google Maps Access Data loss WhatsApp Unified Communications Authentication Spyware Google Drive Comparison Amazon GDPR Remote Control Operating System User Security Antivirus Network Attached Storage Streaming Media Voice over IP Hosted Solution Technology Tips Hybrid Cloud Profitability Paper Personal Information Staff RAM Authorization Phone System HP Database Specifications Big Data Education E-Commerce Spotify Smart Technology Gaming Console DDoS Instagram Emergency Money Customer Service Quick Tips Mobile Office Scalability Employer Employee Relationship Fun Video Games Domains Synergy IaaS Freedom of Information Worker Regulation Credit Cards Windows 10 Television Public Speaking Emoji HaaS Yahoo Presentation Printer Encryption Lithium-ion battery Search Unified Threat Management Augmented Reality Wireless Technology 5G Vendor Management Current Events Autocorrect IBM Leadership Cryptocurrency Hacker The Internet of Things Avoiding Downtime Budget Computer Care Dark Data Scheduling Competition Net Neutrality Customer Relationship Management Samsung Managed Service Provider IP Address

Newsletter Sign Up