631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Scammers Can Use Gift Cards to Target Your Company

Scammers Can Use Gift Cards to Target Your Company

Ready or not, the season of giving is here, and that means it’s gift card season. These can seem to be the perfect gift for coworkers and employees… which is why everyone will need to be wary of a particular business email compromise scam that has seen an uptick this year.

Some Background
Let’s face it - business owners, managers, and employees often feel the need to recognize the holiday season with some small gift or trinket given to their teammates.

However, some office relationships are strictly based around office matters, which makes gift-giving difficult. Moreover, the people who generally would be distributing gifts to the entire office - management - probably don’t have the time to select a well-thought-out gift for each employee. Frankly, in circumstances like these, the best gift is one that the recipient can pick out for themselves.

Hence, the popularity of gift cards in the workplace, and the reason that these scams can work so well.

How the Scam Plays Out
A cybercriminal carrying out this scam will leverage email spoofing and social engineering to pose as one of a company’s higher-ups, like the president or the CEO. Using this persona, the scammer then reaches out to an employee with a request to buy gift cards for the staff. Seeing as this request is “from the boss,” and these emails are typically directed to upper members of the business and accounting staff, the employee complies.

Inside the email, the scammer instructs the employee to provide the codes from the gift cards, allowing them to redeem them and make their own use of them. Since gift cards are an untraceable form of currency, the scammer gets away with it with very little effort.

How to Avoid Being Scammed
When it all comes down to it, the best defense is old-fashioned vigilance. Everyone in the company needs to be aware of threats like these and know how to spot them.

Most crucially, there needs to be a companywide understanding that any claims like this need to be substantiated through a second means of communication. While a twenty-second phone call may sound more like a pain than anything else, it is nothing at all compared to the stress and hassle of being scammed.

Scammers are only getting more clever. For assistance in keeping yourself safe, turn to the professionals at Suffolk Computer Consultants. Call 631-905-9617 today.

The Unofficial Guide to Comprehensive Google Accou...
Tip of the Week: 5 Ways IT Adds to Business Succes...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, May 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Productivity Network Security User Tips Efficiency Google Microsoft Communication Cybersecurity Malware Smartphones Hardware Communications Business Internet Tech Term Data Hackers Managed IT Services Business Management Email Passwords Outsourced IT Innovation Backup Windows 10 Mobile Device Small Business Software Android Ransomware Hosted Solutions IT Support Browser Managed IT Services Social Media Data Recovery Mobile Devices VoIP Wi-Fi Applications Apps Collaboration Network Bandwidth Users Smartphone Data Backup IT Services Cloud Computing Holiday Computer Internet of Things Microsoft Office Gadgets Save Money Alert Miscellaneous Wireless Employer-Employee Relationship Business Intelligence Router Office Password Workplace Tips Twitter Chrome Access Control Saving Money Business Continuity Data Breach Data Management BDR Phishing Information Virtualization Patch Management Settings Gmail Blockchain Excel Vulnerability Managed Service Marketing Automation Analytics VoIP Office 365 Networking Government Word Paperless Office IT Support G Suite Cost Management Voice over Internet Protocol Spam Value How To Mobile Device Management Tech Terms Connectivity Facebook Remote Monitoring Wireless Charging Retail Remote Monitoring and Management Law Enforcement Healthcare Data Protection Physical Security Managed IT Service WiFi Cybercrime Medical IT Virtual Assistant Workers VPN Scam Telephony Data Security Mobility Net Neutrality Dark Web BYOD Computers Battery Productivity Company Culture Cortana Artificial Intelligence Politics Tip of the week Remote Computing Virus Compliance App Website Hacking Windows Upgrade Edge Threat Licensing Online Shopping Proactive IT instant Messaging Dongle Email Management Sales Troubleshooting Work/Life Balance Printer Server Wearables Telecommute Paste Movies iPhone Touchscreen Solid State Drive Managed IT Processors Millennials Office Tips Automobile Telephone System Shortcut Reporting Human Resources Botnet Lead Generation Mobile Security Content Filtering Entertainment Biometrics Help Desk Laptop Printing Travel Recovery Vulnerabilities Bring Your Own Device Tablet Disaster Recovery Update Cleaning Printers Data loss Unified Communications Maintenance Microsoft Office 365 Hard Disk Drive Two-factor Authentication Spyware Certification Network Attached Storage Streaming Media CrashOverride Employee-Employer Relationship Hard Drives Operating System Access Paper Live Streaming Analysis Cryptocurrency Technology Tips Hybrid Cloud Knowledge Outlook Amazon Staff Telephone Systems RAM File Sharing Antivirus Authentication Video Server Tech Support HP Database Files Google Maps Safety Server Management Downloads Remote Support GDPR Electronic Health Records WannaCry Environment User Tip Personal Information Ink WhatsApp Phone System Backup and Disaster Recovery Google Drive Comparison Education Smart Technology Profitability Tactics Voice over IP E-Commerce Websites Remote Control Microsoft Teams User Security Authorization Document Management SaaS Training Hosted Solution Trends Storage Health HIPAA e-waste IT budget PowerPoint Time Management Big Data SSD Specifications Eliminating Downtime Spotify Digital Internet Explorer eCommerce Staffing Plug-In Payment Spam Blocking Managing Stress Business Technology Cables Security Cameras Machine Learning Copy A.I. Apple Error Employees Hiring/Firing Customer Service Hard Drive disposal Telecommuting IT Management Sports News Gadget Chrome OS Inventory Multi-Factor Security Conferencing Information Technology Wireless Internet Fun Domains Emoji HaaS Freedom of Information Printer Windows 10 Public Speaking Unified Threat Management Presentation Yahoo Encryption Lithium-ion battery Current Events Leadership Search Augmented Reality Computer Care Wireless Technology 5G Vendor Management Autocorrect IBM Windows 7 The Internet of Things Avoiding Downtime Hacker Gaming Console Dark Data OneNote Scheduling Budget Competition Samsung Customer Relationship Management Scalability Managed Service Provider IP Address Emergency Video Games DDoS Synergy Quick Tips Instagram IaaS Worker Money Employer Employee Relationship Mobile Office Credit Cards Regulation Television

Newsletter Sign Up