Velocity Technology Partners Blog

Velocity Technology Partners has been serving Athens, Gainesville and North Georgia since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Holiday Season, the Greatest Gift of All Could Be Your Personal Information

This Holiday Season, the Greatest Gift of All Could Be Your Personal Information

Hackers always love the holiday season. Lots of people are spending lots of money (both online and in-store) for the perfect gifts for their loved ones. When there are so many people making purchases all over the world, there are countless opportunities to steal information. Data such as credit card numbers and personally identifiable information can be taken and used to make people’s lives pretty miserable, during what is supposed to be the most wonderful time of the year.

Hackers always love the holiday season. Lots of people are spending lots of money (both online and in-store) for the perfect gifts for their loved ones. When there are so many people making purchases all over the world, there are countless opportunities to steal information. Data such as credit card numbers and personally identifiable information can be taken and used to make people’s lives pretty miserable, during what is supposed to be the most wonderful time of the year.


Holidays are the perfect chance for hackers to take advantage of unsuspecting consumers, which means that you need to take extra precaution when doing your holiday shopping.

Just a few short years ago, Target suffered a massive data breach around the holiday season that exposed countless users’ personal and financial information, putting the exposed people in peril and ruining many a holiday season.

We’ll walk you through some tips about how to be careful both in-store and online.

Look for Encryption Protocol
Before you shop for anything online, look for encryption protocol set up on any retail websites or payment portals. By this, we mean that the site has been equipped with HTTPS security protocol, which hides your payment credentials behind a layer of encryption designed to obfuscate your information in the event of a breach. Furthermore, you should only shop via trusted online retailers and not sketchy unheard-of stores for hard-to-find items.

Make Purchases with Cash
One of the best ways to keep your credit card information safe during the holiday season is to just make purchases with cash. This is a simple preventative method, but it can be somewhat risky to carry a lot of cash in case of theft or loss. It’s all about risk management, so only carry what you need.

Use Online Wallets
Services like Apple Pay and Android Pay can act as a go-between for the retailer and your bank account, and as long as you only add cash as part of a one-time addition (so that the app doesn’t store your information), you can effectively limit the risk associated with using these services to make payments. Due to the increase in popularity of smartphones over the past several years, most retailers accept some form of payment via smartphone app. Just do a little bit of research beforehand so that you’re not caught off-guard when a retailer doesn’t allow it.

With these tips from Velocity Technology Partners, you’ll be sure to stay safe during this holiday season.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Big Data App store Adobe Edge IT support Passwords Marketing Commerce intranet Network Spam Vulnerability Content Filter Congratulations Applications Apps FAQ Application WannaCry Fraud Telephone Redundancy Thank You User Error Company Culture Identities Collaboration Data Privacy Wireless Charging Data VPN Server Cybersecurity Smartphones NFL Google Android Project Management Remote Computing Updates OneNote Data Security Disaster Recovery Flexibility Maintenance Microsoft Office BDR BYOD Productivity Sports Financial Work/Life Balance Law Enforcement Operating System Windows Ink Data Protection Licensing Networking Outsourced IT Hosted Solution Data Recovery Windows 10 Device Security Computer Forensics Twitter Google Drive The Internet of Things Internet of Things Update Software Retail Tech Support Safety Business Computing Blockchain Browser Travel Smartphone IT Management Proactive SaaS Saving Money Hosted Solutions Small Business Money Risk Management Sync Gifts Business Management Websites Business Continuity Word IoT Charger IT budget Google Docs Email Identity Theft Evernote Encryption Wireless Technology Language Internet Content Filtering Unsupported Software Communication Compliance Specifications IT Solutions Lifestyle Smart Tech Spyware Education iPhone Audit Sales Proactive IT Tech Term Data Management Virus Mobile Device Management Automation Best Practices Chromebook Virtualization Artificial Intelligence Alert Hard Drive Wireless Internet Communications WIndows Server 2008 Legislation Hackers HBO Tip of the Week Connectivity Microsoft Excel Computer Unified Communications IT Services Identity Management Value Data Storage Network Security Data Theft Business Managed IT Services Emergency Screen Mirroring eWaste Comparison Holiday Best Practice Computers Hardware Apple Cloud Computing Cortana Cast Ciminal Politics Softphones Data Breach Phishing Backup Analysis Microsoft Word Outlook VoIp Remote Monitoring Tablets Efficiency Memory Financial Technology Antivirus Security Streaming Media Social Engineering Managing Stress Vendor Management Technology History WiFi Storage Office 365 Credit Cards User Tips Gmail Employer-Employee Relationship Printing Innovation Excel Gadgets Legal Google Assistant Students Patch Management Social Media Chrome Computing Conferencing Personal Information PowerPoint Google Maps Cleaning IT Support Government Managed IT Router Ransomware Monitoring Devices App Cloud Mobility MSP Cybercrime Mobile Security Mobile Devices Cost Management Two-factor Authentication Telephone Systems Data Backup Malware Wi-Fi Managed Service Provider Privacy Software as a Service Windows File Sharing Microsoft Workers Gamification Shortcut Data Loss