Velocity Technology Partners Blog

Velocity Technology Partners has been serving the Bogart area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Holiday Season, the Greatest Gift of All Could Be Your Personal Information

This Holiday Season, the Greatest Gift of All Could Be Your Personal Information

Hackers always love the holiday season. Lots of people are spending lots of money (both online and in-store) for the perfect gifts for their loved ones. When there are so many people making purchases all over the world, there are countless opportunities to steal information. Data such as credit card numbers and personally identifiable information can be taken and used to make people’s lives pretty miserable, during what is supposed to be the most wonderful time of the year.

Hackers always love the holiday season. Lots of people are spending lots of money (both online and in-store) for the perfect gifts for their loved ones. When there are so many people making purchases all over the world, there are countless opportunities to steal information. Data such as credit card numbers and personally identifiable information can be taken and used to make people’s lives pretty miserable, during what is supposed to be the most wonderful time of the year.


Holidays are the perfect chance for hackers to take advantage of unsuspecting consumers, which means that you need to take extra precaution when doing your holiday shopping.

Just a few short years ago, Target suffered a massive data breach around the holiday season that exposed countless users’ personal and financial information, putting the exposed people in peril and ruining many a holiday season.

We’ll walk you through some tips about how to be careful both in-store and online.

Look for Encryption Protocol
Before you shop for anything online, look for encryption protocol set up on any retail websites or payment portals. By this, we mean that the site has been equipped with HTTPS security protocol, which hides your payment credentials behind a layer of encryption designed to obfuscate your information in the event of a breach. Furthermore, you should only shop via trusted online retailers and not sketchy unheard-of stores for hard-to-find items.

Make Purchases with Cash
One of the best ways to keep your credit card information safe during the holiday season is to just make purchases with cash. This is a simple preventative method, but it can be somewhat risky to carry a lot of cash in case of theft or loss. It’s all about risk management, so only carry what you need.

Use Online Wallets
Services like Apple Pay and Android Pay can act as a go-between for the retailer and your bank account, and as long as you only add cash as part of a one-time addition (so that the app doesn’t store your information), you can effectively limit the risk associated with using these services to make payments. Due to the increase in popularity of smartphones over the past several years, most retailers accept some form of payment via smartphone app. Just do a little bit of research beforehand so that you’re not caught off-guard when a retailer doesn’t allow it.

With these tips from Velocity Technology Partners, you’ll be sure to stay safe during this holiday season.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 23 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Retail Hosted Solutions Holiday Emergency Shortcut Identity Theft Encryption Sports Device Security Storage Thank You Microsoft Office Proactive IT Managed Service Provider Backup Tablets Cloud Computing Apple Blockchain Redundancy Flexibility Business Management Screen Mirroring Lifestyle IT Services Charger Two-factor Authentication Hardware WannaCry Smartphones Money Adobe Gifts Data Backup Commerce Marketing FAQ Credit Cards Applications eWaste Maintenance Alert Privacy Politics Google Maps Outsourced IT Data Breach WIndows Server 2008 Business Content Filtering Security The Internet of Things Mobile Devices VPN Software as a Service Updates SaaS Small Business Virtualization Office 365 Server IT Support Smartphone Specifications Cybersecurity Managed IT VoIp Spyware Cloud Government Networking File Sharing Tip of the Week Outlook Wi-Fi Tech Support IT Solutions Word IT Management Email Communications Mobile Device Management Phishing Sales Windows 10 Data Loss Congratulations Social Media Gadgets OneNote WiFi HBO Data Security Apps Legal Project Management Conferencing Passwords Audit Disaster Recovery Technology Browser Law Enforcement Business Continuity MSP Hackers Evernote Saving Money Windows Comparison Devices Google Docs Data IT budget Chrome Wireless Technology BYOD Work/Life Balance Software Microsoft Hosted Solution Productivity Malware Efficiency IT support Spam Microsoft Word Artificial Intelligence Workers Business Computing App Social Engineering Vulnerability intranet Data Management Patch Management Mobility Android Personal Information Internet Computer Cortana Legislation Unsupported Software Sync Travel Wireless Charging User Error Computers iPhone Network Security Identities Windows Ink Google Drive Cybercrime Fraud Risk Management Google Cast NFL Excel Licensing Internet of Things Ciminal Collaboration Data Protection History Telephone Systems Microsoft Excel Best Practice Data Storage Best Practices Edge Data Recovery User Tips Managed IT Services