631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Scammers Can Use Gift Cards to Target Your Company

Scammers Can Use Gift Cards to Target Your Company

Ready or not, the season of giving is here, and that means it’s gift card season. These can seem to be the perfect gift for coworkers and employees… which is why everyone will need to be wary of a particular business email compromise scam that has seen an uptick this year.

Some Background
Let’s face it - business owners, managers, and employees often feel the need to recognize the holiday season with some small gift or trinket given to their teammates.

However, some office relationships are strictly based around office matters, which makes gift-giving difficult. Moreover, the people who generally would be distributing gifts to the entire office - management - probably don’t have the time to select a well-thought-out gift for each employee. Frankly, in circumstances like these, the best gift is one that the recipient can pick out for themselves.

Hence, the popularity of gift cards in the workplace, and the reason that these scams can work so well.

How the Scam Plays Out
A cybercriminal carrying out this scam will leverage email spoofing and social engineering to pose as one of a company’s higher-ups, like the president or the CEO. Using this persona, the scammer then reaches out to an employee with a request to buy gift cards for the staff. Seeing as this request is “from the boss,” and these emails are typically directed to upper members of the business and accounting staff, the employee complies.

Inside the email, the scammer instructs the employee to provide the codes from the gift cards, allowing them to redeem them and make their own use of them. Since gift cards are an untraceable form of currency, the scammer gets away with it with very little effort.

How to Avoid Being Scammed
When it all comes down to it, the best defense is old-fashioned vigilance. Everyone in the company needs to be aware of threats like these and know how to spot them.

Most crucially, there needs to be a companywide understanding that any claims like this need to be substantiated through a second means of communication. While a twenty-second phone call may sound more like a pain than anything else, it is nothing at all compared to the stress and hassle of being scammed.

Scammers are only getting more clever. For assistance in keeping yourself safe, turn to the professionals at Suffolk Computer Consultants. Call 631-905-9617 today.

The Unofficial Guide to Comprehensive Google Accou...
Tip of the Week: 5 Ways IT Adds to Business Succes...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, December 14 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Cloud Privacy Network Security Cybersecurity Managed IT Services Malware Tech Term User Tips Microsoft Productivity Communications Backup Smartphones Internet Communication Hosted Solutions Business Hardware Email Efficiency Passwords Software Business Management Hackers Google Browser Outsourced IT Data Backup VoIP Data Recovery Wi-Fi Small Business Ransomware Android Social Media Alert Save Money Windows 10 Cloud Computing IT Services Applications Microsoft Office IT Support Mobile Device Saving Money Bandwidth Twitter Managed IT Services Smartphone Computer Business Intelligence Data Employer-Employee Relationship Apps Collaboration Internet of Things Users Innovation Router Network Miscellaneous Analytics Networking Password VoIP Wireless Information Mobile Devices Business Continuity Data Breach Government BDR Patch Management Settings Vulnerability Data Management Workplace Tips Marketing Blockchain Gadgets Phishing Excel Virtualization Holiday Office Automation Access Control Politics Word Battery Cortana Spam Remote Monitoring and Management Windows Mobile Device Management How To App Hacking Tech Terms Connectivity Wireless Charging Data Protection Paperless Office Physical Security Managed IT Service Managed Service Cost Management Retail Gmail IT Support Virtual Assistant Productivity Remote Monitoring Compliance Workers Dark Web Law Enforcement VPN BYOD WiFi Cybercrime Computers Chrome Scam Tip of the week Website Remote Computing Office 365 Artificial Intelligence Company Culture Virus IT budget PowerPoint SaaS Spam Blocking Business Technology Touchscreen SSD Google Maps Upgrade eCommerce Voice over Internet Protocol Copy Apple Reporting Managing Stress Telecommuting Help Desk Digital Internet Explorer Machine Learning A.I. Staffing Multi-Factor Security Conferencing Update Hard Drive disposal News IT Management Sports Email Management Sales Microsoft Office 365 Inventory Licensing Online Shopping Information Technology Paste iPhone Medical IT Dongle Spotify G Suite Gadget Millennials Certification Edge Threat Analysis Telecommute Movies Content Filtering Outlook Processors Value Telephone System Two-factor Authentication Hiring/Firing Printer Server Tablet Authentication Lead Generation Mobile Security Travel Amazon Entertainment Biometrics GDPR Bring Your Own Device Facebook Shortcut Laptop Printing Tech Support Data loss Work/Life Balance Unified Communications Recovery Profitability Spyware Disaster Recovery Network Attached Storage Streaming Media Managed IT Cleaning Printers Knowledge Safety Authorization Operating System Maintenance Live Streaming Access Telephone Systems File Sharing Storage Technology Tips Office Tips Hybrid Cloud Automobile CrashOverride Files Telephony Paper Botnet Remote Support Staff RAM User Tip Eliminating Downtime HP Database Server Management Downloads Google Drive Comparison WannaCry Environment Antivirus WhatsApp Plug-In Remote Control User Security Error Backup and Disaster Recovery Big Data Voice over IP Cables Hard Drives Ink Hosted Solution Websites Microsoft Teams Phone System Wireless Internet Document Management Tactics Education Smart Technology Server Trends Specifications Troubleshooting HIPAA e-waste Proactive IT Autocorrect Mobile Office Emergency Avoiding Downtime Scalability Domains Scheduling Video Games Dark Data Synergy IaaS Samsung Worker Windows 10 Television Credit Cards Public Speaking Managed Service Provider Instagram Presentation DDoS Emoji Money HaaS Lithium-ion battery Printer Employer Employee Relationship Augmented Reality Wireless Technology 5G Fun Unified Threat Management Freedom of Information IBM Leadership Hacker Current Events The Internet of Things Budget Encryption Computer Care Competition Quick Tips Yahoo Customer Relationship Management Personal Information IP Address Net Neutrality Regulation Search Vendor Management Gaming Console Customer Service

Newsletter Sign Up