Velocity Technology Partners Blogs

This Holiday Season, the Greatest Gift of All Could Be Your Personal Information

This Holiday Season, the Greatest Gift of All Could Be Your Personal Information

Hackers always love the holiday season. Lots of people are spending lots of money (both online and in-store) for the perfect gifts for their loved ones. When there are so many people making purchases all over the world, there are countless opportunities to steal information. Data such as credit card numbers and personally identifiable information can be taken and used to make people’s lives pretty miserable, during what is supposed to be the most wonderful time of the year.

Hackers always love the holiday season. Lots of people are spending lots of money (both online and in-store) for the perfect gifts for their loved ones. When there are so many people making purchases all over the world, there are countless opportunities to steal information. Data such as credit card numbers and personally identifiable information can be taken and used to make people’s lives pretty miserable, during what is supposed to be the most wonderful time of the year.


Holidays are the perfect chance for hackers to take advantage of unsuspecting consumers, which means that you need to take extra precaution when doing your holiday shopping.

Just a few short years ago, Target suffered a massive data breach around the holiday season that exposed countless users’ personal and financial information, putting the exposed people in peril and ruining many a holiday season.

We’ll walk you through some tips about how to be careful both in-store and online.

Look for Encryption Protocol
Before you shop for anything online, look for encryption protocol set up on any retail websites or payment portals. By this, we mean that the site has been equipped with HTTPS security protocol, which hides your payment credentials behind a layer of encryption designed to obfuscate your information in the event of a breach. Furthermore, you should only shop via trusted online retailers and not sketchy unheard-of stores for hard-to-find items.

Make Purchases with Cash
One of the best ways to keep your credit card information safe during the holiday season is to just make purchases with cash. This is a simple preventative method, but it can be somewhat risky to carry a lot of cash in case of theft or loss. It’s all about risk management, so only carry what you need.

Use Online Wallets
Services like Apple Pay and Android Pay can act as a go-between for the retailer and your bank account, and as long as you only add cash as part of a one-time addition (so that the app doesn’t store your information), you can effectively limit the risk associated with using these services to make payments. Due to the increase in popularity of smartphones over the past several years, most retailers accept some form of payment via smartphone app. Just do a little bit of research beforehand so that you’re not caught off-guard when a retailer doesn’t allow it.

With these tips from Velocity Technology Partners, you’ll be sure to stay safe during this holiday season.

Are the Deals Better on Black Friday or Cyber Mond...
“Ring” in the New Year With a Brand New Smartphone...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, September 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Word Data Loss Computer Software as a Service Unified Communications Wireless Charging iPhone Cybercrime Saving Money Excel Microsoft Excel Connectivity Browser Workers Business Websites Router IT Solutions Updates Alert Emergency App store Application Computers Credit Cards Data Breach Mobile Devices Government Sync Evernote VPN Edge Law Enforcement Smartphone Google Docs Commerce Adobe WIndows Server 2008 Blockchain Proactive Mobile Security Microsoft Analysis Data Security MSP Data Security Patch Management Wireless Technology intranet Charger Business Computing WannaCry Data Protection Social Engineering WiFi Internet of Things Best Practice Windows 10 Cast Google Maps Financial Regulation Identity Company Culture Operating System Data Backup Managing Stress Cost Management Hardware Legal Politics Two-factor Authentication Memory Tech Support HBO Encryption Personal Information Mobility PowerPoint Hybrid Cloud Gamification Chromebook Gadgets Server Content Filter Language Monitoring Audit Printing Communications Managed IT Services Gifts Outsourced IT Tablets Unsupported Software Privacy Specifications Apps Legislation Managed IT services Artificial Intelligence Thank You Small Business Automation Tech Term Device Security Management User Tips Networking Project Management Licensing Holiday Vendor Management Fraud Comparison Hackers Sports IT Management BDR Safety OneNote Tip of the Week Productivity Phishing Applications Lifestyle Compliance Internet Sales Hosted Solutions IT Support Business Management Shortcut Social Media Telephone Systems Remote Computing Cybersecurity Email Redundancy Windows Ink Outlook Spam Streaming Media Flexibility Backup Windows Computing Google Cleaning Softphones Microsoft Office Marketing Update Employer-Employee Relationship File Sharing Managed IT Virus IT Services Content Filtering Telephone IT support Data Privacy Work/Life Balance Remote Monitoring IT budget Smart Tech Office 365 App Travel IoT FAQ Best Practices Managed Service Provider Congratulations Big Data Ransomware Network Security Wireless Internet Data Management Value Financial Technology eWaste Computer Forensics Mobile Device Management Data Theft Proactive IT BYOD Spyware Hosted Solution Money The Internet of Things Apple Innovation Software Google Drive Devices Ciminal Vulnerability Collaboration Cortana Identity Theft Passwords Storage Chrome Maintenance Hard Drive Cloud Computing Android Google Assistant VoIp Wi-Fi Screen Mirroring Retail Twitter Communication Virtualization Network Risk Management Antivirus Cloud SaaS Bring Your Own Device History Technology Conferencing User Error Efficiency Malware Identities Microsoft Word Smartphones Data Storage Education Students Business Continuity NFL Disaster Recovery Data Recovery Gmail