About Us

IT Services

Understanding IT

News & Events



Contact Us

  • Register

Texas Professional IT Services LLC Blog

Scammers Can Use Gift Cards to Target Your Company

Scammers Can Use Gift Cards to Target Your Company

Ready or not, the season of giving is here, and that means it’s gift card season. These can seem to be the perfect gift for coworkers and employees… which is why everyone will need to be wary of a particular business email compromise scam that has seen an uptick this year.

Some Background
Let’s face it - business owners, managers, and employees often feel the need to recognize the holiday season with some small gift or trinket given to their teammates.

However, some office relationships are strictly based around office matters, which makes gift-giving difficult. Moreover, the people who generally would be distributing gifts to the entire office - management - probably don’t have the time to select a well-thought-out gift for each employee. Frankly, in circumstances like these, the best gift is one that the recipient can pick out for themselves.

Hence, the popularity of gift cards in the workplace, and the reason that these scams can work so well.

How the Scam Plays Out
A cybercriminal carrying out this scam will leverage email spoofing and social engineering to pose as one of a company’s higher-ups, like the president or the CEO. Using this persona, the scammer then reaches out to an employee with a request to buy gift cards for the staff. Seeing as this request is “from the boss,” and these emails are typically directed to upper members of the business and accounting staff, the employee complies.

Inside the email, the scammer instructs the employee to provide the codes from the gift cards, allowing them to redeem them and make their own use of them. Since gift cards are an untraceable form of currency, the scammer gets away with it with very little effort.

How to Avoid Being Scammed
When it all comes down to it, the best defense is old-fashioned vigilance. Everyone in the company needs to be aware of threats like these and know how to spot them.

Most crucially, there needs to be a companywide understanding that any claims like this need to be substantiated through a second means of communication. While a twenty-second phone call may sound more like a pain than anything else, it is nothing at all compared to the stress and hassle of being scammed.

Scammers are only getting more clever. For assistance in keeping yourself safe, turn to the professionals at Texas Professional IT Services LLC. Call (832) 514-6260 today.

The Unofficial Guide to Comprehensive Google Accou...
Tip of the Week: 5 Ways IT Adds to Business Succes...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, February 20, 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Network Security Productivity Cybersecurity User Tips Communications Microsoft Tech Term Malware Smartphones Efficiency Managed IT Services Communication Software Internet Business Hardware Email Google Backup Browser Outsourced IT Hackers Innovation Android Small Business Mobile Device Ransomware Collaboration Data Passwords Data Backup Wi-Fi VoIp Windows 10 Applications Microsoft Office Data Recovery Hosted Solutions IT Services Smartphone Holiday Cloud Computing IT Support Internet of Things Network Social Media Mobile Devices Save Money Business Management Saving Money Business Intelligence Users Managed IT Services Apps Miscellaneous Wireless Access Control Analytics Employer-Employee Relationship Office Government Blockchain Password Word Networking Business Continuity Automation Patch Management VoIP Data Management Router Workplace Tips Bandwidth Marketing Computer Phishing Excel Data Breach Office 365 Settings Information Twitter App Tip of the week Managed IT Service Website Gmail Virtual Assistant Remote Monitoring and Management Workers Wireless Charging Medical IT Vulnerability Law Enforcement Connectivity Company Culture Cost Management Battery Mobile Device Management Virtualization Politics Windows Computers How To Virus Cortana Dark Web Scam Remote Computing Alert Managed Service Artificial Intelligence IT Support Facebook BDR Spam Retail Data Protection Compliance Chrome G Suite BYOD Gadgets VPN Data Security Physical Security Tech Terms Cybercrime Mobility Reporting Laptop Value Live Streaming Bring Your Own Device Eliminating Downtime Safety A.I. Entertainment User Security Spyware Licensing Telecommute Sports Hiring/Firing Spam Blocking Apple Personal Information Digital Operating System Multi-Factor Security Files Network Attached Storage Threat Botnet Amazon Training Hard Drives WhatsApp Telephony Hybrid Cloud Wireless Internet Movies Phone System Business Technology HP Tech Support User Tip Troubleshooting Data loss Staffing Email Management iPhone WannaCry Analysis Remote Monitoring E-Commerce Edge Shortcut Comparison Touchscreen Server Management Printing Security Cameras SSD Disaster Recovery SaaS Database Voice over IP Cables Help Desk Dongle Unified Communications Recovery Update Antivirus Streaming Media HIPAA Biometrics Payment Environment Specifications Microsoft Office 365 Paper Automobile Telephone Systems Remote Support Server Wearables GDPR Printer Server IT budget Tactics Hosted Solution News eCommerce Voice over Internet Protocol Upgrade RAM Gadget Google Drive Sales Managed IT Travel Telecommuting Outlook Staff Downloads Hard Drive Access instant Messaging Big Data e-waste Conferencing Authentication Machine Learning Ink Plug-In Healthcare Document Management Inventory Tablet Storage Printers IT Management Maintenance Copy Telephone System Online Shopping Information Technology Certification Technology Tips Microsoft Teams Two-factor Authentication Vulnerabilities disposal Education Millennials Profitability Websites Trends File Sharing Processors Content Filtering Authorization PowerPoint Google Maps Remote Control Lead Generation Proactive IT Paperless Office Mobile Security Knowledge Smart Technology Error Internet Explorer Paste Cleaning Backup and Disaster Recovery Managing Stress Cryptocurrency CrashOverride Quick Tips WiFi Thank You Congratulations Regulation Emergency

Latest News & Events

Texas Professional IT Services LLC is proud to announce the launch of our new website at http://www.texproit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Texas Professional IT Services LLC can do for your business.

Call Us Today
Call us today
(832) 514-6260

1209 Decker Dr.
STE 202

Baytown, Texas 77520