Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Tip of the Week: Ward Off Holiday Scammers

Tip of the Week: Ward Off Holiday Scammers

It’s the most wonderful time of the year… for scammers, that is. These kinds of criminals love to take advantage of the gift-giving season. With the right tools for the job, hackers can have a field day stealing sensitive information, like credit card numbers, due to the sheer amount of stuff being purchased by consumers. It’s up to you to stay vigilant and make sure you’re not being scammed, but we have a couple of tricks you can use to stay as safe as possible.

Keep in mind that these are only preventative measures; we can’t guarantee that whoever you’re shopping through is protecting your data adequately, so if the retailer is known for suffering from big data breaches (think Target), perhaps your patronage will be best served elsewhere.

Do Your Research
Going off of the previous point, you’ll want to investigate a little bit to see how well the retailer handles their security. By this, we mean simply going online and seeing if they have been the victim of a massive data breach in previous years. If they have, see what they did about it and whether or not they learned from their mistakes. After all, it would be unfair to judge them on something that happened years ago if they have had a clean record ever since. If you’re unsure or unsettled by any data breaches, there are always other options to shop at, so don’t be too worried.

Check the Physical Vicinity of ATMs
Sometimes you might need some cash in your pocket for a purchase, and while you might think thieving is your biggest problem, ATM scamming is a serious contender. This happens when an ATM has been tampered with to send your banking credentials to a third party--in this case, a hacker. You should always check to see if the ATM has been fitted with devices on the card reader slot, as well as any kind of device attached to the back of it. For example, if the ATM has panels on the back missing, it’s a good sign that perhaps you shouldn’t use that particular machine. Furthermore, make sure that you only use ATMs in well-traveled areas with security cameras, as the chances of the ATM being tampered with are significantly lower.

Be Careful of Wireless Connections
Wireless communications are a significant weak point this holiday season, as public Wi-Fi is notorious for being much more dangerous than any protected network. This is largely in part due to the fact that these networks don’t require a sign-in, and any device can just access it unimpeded. You should keep your devices from accessing these networks automatically, as the data flowing to and from them could be under watch by scammers.

Keep an Eye On Your Devices
As always, the threat of device theft is omnipresent in locations where a lot of people gather. Pickpockets and thieves know full well how much valuable data can be found on these devices, and they might even try to use them for their own purposes. Alternatively, they could sell the devices to make a quick buck or sell the data on the black market to fund further thieving initiatives.

This holiday season be prepared for anything. For more great tips and tricks about how to stay secure with your purchases and online interactions, subscribe to Tekie Geek’s blog.

The Top 5 Smartphones for the Start of 2019
Why Protecting Your Google Account Should Be a Pri...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, January 16, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Freedom of Information Hard Drive Disposal Data Breach Office 365 Language Windows Law Enforcement IT consulting firms Network Security managed services email scam Regulations Managed Service Provider Worker Virtualization Microchip Processors Augmented Reality Content Processor CCTV Society IT Consultant Lenovo Cybersecurity Digital Payment Vendor Mangement Update WiFi Access Comparison Bitcoin Machine Learning Scam Navigation Company Culture Windows XP IT support Staten Island data loss Private Cloud Business Mangement Powerful Technology Solutions Information staten island managed services Virus Mobility Upgrade Cryptocurrency Spyware Webcam 3D Printing Settings Unified Threat Management Printer Taxes CryptoLocker Evernote Writing Visible Light Communication Legal Flexibility IT services Staten Island Multi-factor Authentication Advertising Excel Safety Gamification Botnet Hosted Solution Cleaning Google Wallet Notifications IT consulting Staten Island IT consulting NYC Internet of Things Redundancy Banking Bookmark G Suite Managing Stress Staffing BYOD Screen Reader Hardware Money computer support firms Hacking Data Management it support Tech Term Identity Theft Antivirus Managed IT Documents Applications Networking Paperless Office Microsoft Samsung Administrator Piracy Vendor Management Tip of the week Facebook Virtual Reality Staten Island IT consulting Email tech support Staten Island IT Support SaaS Business Growth end-user files Websites Vulnerability Alert History Tip of the Week Retail Term Data Security Miscellaneous Vulnerabilities Tracking Computer Care Modem Hosted Solutions IT support NYC eWaste Cost Management Supercomputer data recovery Employer Employee Relationship Printing Outlook Memory Bring Your Own Device datto Mobile Device DDoS Efficiency Telephone Systems Rental Service Tech Download Flash PDF Artificial Intelligence Meetings Wireless managed IT services NYC Television Electronic Medical Records IT support New York City Digital Ransomware IT services New York City Social Network data recovery Staten Island Virtual Desktop Web Server Communication Solid State Drive Specifications Service Level Agreement IT consulting Passwords Security Cameras Unified Threat Management Data Protection Trends Saving Money Document Management HTML Hack Social Vendor Mobile Devices Computers Thank You Downtime Smartphone Hard Drive User Tips computer services Managed IT Services Knowledge Staten Island tech support Start Menu Accidental deletion Tablets Small Business Cabling Tablet Telephone System Network Management Password Business Metrics Cloud Healthcare App Scalability Information Technology managed it services Budget Computing Patch Management Managed Service Monitoring Distributed Denial of Service Google Play Software Business Management Data Analysis Workers File Sharing managed IT services staten island User Tip IT consulting firm Management Privacy Data Server Browser Device security Search Software as a Service Smartphones IT consulting company Health IT Automation Browsers Google Technology Training Conferencing Social Media Virtual Assistant managed services Staten Island IT Services Cloud Computing Customer Service computer support Staten Island tech support Best Practice Internet Cybercrime Disaster Cloud computing Staten Island Tech Support Work/Life Balance Firewall In Internet of Things Office Fileless Malware Productivity Directions computer repair Staten Island computer support IT consulting Staten island Chromebook Time Management Fake News Business Cortana Innovation Android Experience IBM Corporate Profile Lithium-ion battery Telephone Physical Security Laptop Recovery Emergency Devices Computer Microsoft Excel Social Engineering Quick Tips Tech Terms Microsoft Office Addiction Mobile Technology Saving Time SSID Computing Infrastructure Backup Router News Automobile Gadgets Wireless Technology Business Technology Workplace Tips Encryption communications Productivity Congratulations Collaboration SharePoint Public Cloud Tactics Malware Printers Business Continuity malware worms Data storage VPN Streaming Media Backup and Disaster Recovery Legislation CrashOverride Remote Computing Data Backup Laptops Save Money Politics Robot VoIP Domains Username IT support Staten Islans Health Compliance Hacks Entertainment Maintenance Phishing Multi-Factor Security computer support NYC Two-factor Authentication Holiday Relocation Analytics Upload Music Apps Error Google Drive ransomware attacks Managed IT Services Monitors Proactive IT Big Data Audit Travel Going Green Content Filtering Apple LiFi Best Practices Twitter Bandwidth Bluetooth IT Management Wireless Headphones Network Operating System Securty Nanotechnology Outsourced IT Workstations Telephony Hiring/Firing Motion Sickness Employer-Employee Relationship Website Staten Island IT support Sports Administration Reliable Computing YouTube Uninterrupted Power Supply Startup Proxy Server Mouse Downloads Unified Communications Network Congestion tech support Staten Isalnd Computer Malfunction Text Messaging Windows 8 computer services Staten Island today ’s organizations IT services NYC Staten Island computer support VoIP Customer Resource management Windows 10 How To Wi-Fi Security Displays Accountants Black Market Disaster Recovery Running Cable Hardware Solutions Mobile Security BDR Touchscreen Desktop malware Hard disk Deep Learning Emails Equifax Business Cards Windows 10 Spam Software License Cache The Internet of Things Gmail Google Calendar Regulation Database Hackers Project Management Access Control Office Tips End of Support Users Remote Monitoring IT support firms Google Docs Help Desk Hacker Google Maps Business Computing Mobile Device Management Drones Blockchain Word computer repair IT support Education Government

Newsletter Sign Up