Home

About Us

IT Services

Understanding IT

News & Events

Blog

Support

Contact Us

Blog
  • Register

Texas Professional IT Services LLC Blog

Scammers Can Use Gift Cards to Target Your Company

Scammers Can Use Gift Cards to Target Your Company

Ready or not, the season of giving is here, and that means it’s gift card season. These can seem to be the perfect gift for coworkers and employees… which is why everyone will need to be wary of a particular business email compromise scam that has seen an uptick this year.

Some Background
Let’s face it - business owners, managers, and employees often feel the need to recognize the holiday season with some small gift or trinket given to their teammates.

However, some office relationships are strictly based around office matters, which makes gift-giving difficult. Moreover, the people who generally would be distributing gifts to the entire office - management - probably don’t have the time to select a well-thought-out gift for each employee. Frankly, in circumstances like these, the best gift is one that the recipient can pick out for themselves.

Hence, the popularity of gift cards in the workplace, and the reason that these scams can work so well.

How the Scam Plays Out
A cybercriminal carrying out this scam will leverage email spoofing and social engineering to pose as one of a company’s higher-ups, like the president or the CEO. Using this persona, the scammer then reaches out to an employee with a request to buy gift cards for the staff. Seeing as this request is “from the boss,” and these emails are typically directed to upper members of the business and accounting staff, the employee complies.

Inside the email, the scammer instructs the employee to provide the codes from the gift cards, allowing them to redeem them and make their own use of them. Since gift cards are an untraceable form of currency, the scammer gets away with it with very little effort.

How to Avoid Being Scammed
When it all comes down to it, the best defense is old-fashioned vigilance. Everyone in the company needs to be aware of threats like these and know how to spot them.

Most crucially, there needs to be a companywide understanding that any claims like this need to be substantiated through a second means of communication. While a twenty-second phone call may sound more like a pain than anything else, it is nothing at all compared to the stress and hassle of being scammed.

Scammers are only getting more clever. For assistance in keeping yourself safe, turn to the professionals at Texas Professional IT Services LLC. Call (832) 514-6260 today.

The Unofficial Guide to Comprehensive Google Accou...
Tip of the Week: 5 Ways IT Adds to Business Succes...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, December 11, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Best Practices Technology Cloud Privacy Network Security Cybersecurity Tech Term User Tips Productivity Communications Microsoft Malware Managed IT Services Communication Internet Smartphones Backup Software Efficiency Browser Business Email Outsourced IT Google Android Hardware Data Backup Wi-Fi Hackers VoIp Ransomware Small Business Data Recovery Hosted Solutions Cloud Computing Passwords Social Media Windows 10 IT Services Business Management Applications IT Support Save Money Business Intelligence Network Saving Money Collaboration Managed IT Services Apps Data Smartphone Miscellaneous Mobile Device Innovation Internet of Things Users Microsoft Office Workplace Tips Analytics Employer-Employee Relationship Networking Office Government Business Continuity Blockchain Wireless Automation VoIP Data Management Router Information Patch Management Bandwidth Computer Excel Settings Mobile Devices Twitter Access Control Data Breach Phishing Marketing Cybercrime Website App Compliance Password Word Vulnerability Physical Security Law Enforcement Workers Cost Management Managed IT Service Connectivity Virtual Assistant Company Culture How To Gmail Politics Dark Web Computers Mobile Device Management Wireless Charging Windows Alert Artificial Intelligence Remote Monitoring and Management BDR IT Support Battery Retail Virtualization Cortana Holiday Virus Scam Remote Computing Spam Office 365 Data Protection BYOD VPN Managed Service Tip of the week Tech Terms Gadgets Chrome Safety A.I. Tablet Microsoft Office 365 Laptop Value Smart Technology Hiring/Firing Spam Blocking Telephone System Online Shopping Multi-Factor Security File Sharing Processors GDPR Digital Operating System Education Millennials Voice over Internet Protocol Upgrade Telecommute Sports Lead Generation Hard Drives Content Filtering Outlook Network Attached Storage Threat Phone System Movies Knowledge Authentication Staffing Email Management Cleaning Plug-In Shortcut User Security Spyware Storage Edge Live Streaming Data loss Apple SSD Remote Monitoring Licensing G Suite Profitability Server Management Printing Proactive IT Dongle Unified Communications Recovery Files Authorization Database Botnet Business Technology HP Error Environment Disaster Recovery Automobile Telephone Systems WhatsApp Telephony Antivirus Streaming Media Gadget Google Drive iPhone WannaCry Reporting Facebook Biometrics Hosted Solution Tech Support User Tip Bring Your Own Device Eliminating Downtime Paper RAM Managed IT Comparison IT budget Tactics Big Data e-waste Printer Server Voice over IP Amazon Staff Downloads Two-factor Authentication HIPAA Medical IT Document Management Inventory Access Copy Hybrid Cloud Wireless Internet Machine Learning Ink Analysis Technology Tips Microsoft Teams Specifications Troubleshooting IT Management Maintenance Remote Support Server Websites Trends Information Technology Sales Touchscreen disposal Printers Google Maps Remote Control News eCommerce Hard Drive SaaS Paperless Office Mobile Security Paste Travel Telecommuting Cables Help Desk PowerPoint Backup and Disaster Recovery Managing Stress Conferencing Update Internet Explorer Entertainment CrashOverride Emergency Certification Regulation Quick Tips Thank You WiFi Congratulations

Latest News & Events

Texas Professional IT Services LLC is proud to announce the launch of our new website at http://www.texproit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Texas Professional IT Services LLC can do for your business.

Call Us Today
Call us today
(832) 514-6260

1209 Decker Dr.
STE 202

Baytown, Texas 77520