888.678.7282    Get SUPPORT

Strata Information Technology Blog

Scammers Can Use Gift Cards to Target Your Company

Scammers Can Use Gift Cards to Target Your Company

Ready or not, the season of giving is here, and that means it’s gift card season. These can seem to be the perfect gift for coworkers and employees… which is why everyone will need to be wary of a particular business email compromise scam that has seen an uptick this year.

Some Background
Let’s face it - business owners, managers, and employees often feel the need to recognize the holiday season with some small gift or trinket given to their teammates.

However, some office relationships are strictly based around office matters, which makes gift-giving difficult. Moreover, the people who generally would be distributing gifts to the entire office - management - probably don’t have the time to select a well-thought-out gift for each employee. Frankly, in circumstances like these, the best gift is one that the recipient can pick out for themselves.

Hence, the popularity of gift cards in the workplace, and the reason that these scams can work so well.

How the Scam Plays Out
A cybercriminal carrying out this scam will leverage email spoofing and social engineering to pose as one of a company’s higher-ups, like the president or the CEO. Using this persona, the scammer then reaches out to an employee with a request to buy gift cards for the staff. Seeing as this request is “from the boss,” and these emails are typically directed to upper members of the business and accounting staff, the employee complies.

Inside the email, the scammer instructs the employee to provide the codes from the gift cards, allowing them to redeem them and make their own use of them. Since gift cards are an untraceable form of currency, the scammer gets away with it with very little effort.

How to Avoid Being Scammed
When it all comes down to it, the best defense is old-fashioned vigilance. Everyone in the company needs to be aware of threats like these and know how to spot them.

Most crucially, there needs to be a companywide understanding that any claims like this need to be substantiated through a second means of communication. While a twenty-second phone call may sound more like a pain than anything else, it is nothing at all compared to the stress and hassle of being scammed.

Scammers are only getting more clever. For assistance in keeping yourself safe, turn to the professionals at Strata Information Technology. Call 888.678.7282 today.

Strategizing Your IT Leads to Better Business
Tip of the Week: 5 Ways IT Adds to Business Succes...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 15 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Managed IT Services Privacy Cloud Network Security Internet Malware Hackers User Tips Cybersecurity Communications Tech Term Ransomware Backup Software Productivity Business Management Outsourced IT Efficiency Smartphones IT Support VoIP Microsoft Passwords Business Hardware Productivity Email Data Alert Data Recovery Browser Network Innovation Google Data Backup Social Media Windows 10 Communication Small Business IT Services Collaboration Microsoft Office Cloud Computing Users Save Money Hosted Solutions Mobile Device Smartphone Holiday Phishing Android App Vulnerability Bandwidth Miscellaneous Twitter Saving Money Internet of Things Business Continuity Access Control Apps Data Breach Employer-Employee Relationship Workplace Tips Personal Information Excel Blockchain Remote Monitoring Scam Patch Management Company Culture Office 365 Cybercrime Politics Government Settings Wireless Mobile Device Management Mobile Devices Networking Applications Wi-Fi Facebook Computer Law Enforcement Compliance Workers BDR Office Education BYOD Vendor Management Website Automation SaaS Data Security Computers Spam Medical IT Windows Managed IT Service Chrome Dark Web Managing Stress Virus Information Remote Monitoring and Management Entertainment Recovery Antivirus Word Virtual Assistant Maintenance Password Connectivity Retail Marketing How To Telephone System WannaCry Battery Data Management HP Gadgets Budget Error Encryption Data loss Computer Care Help Desk Automobile Net Neutrality CrashOverride Regulation Vulnerabilities Sales Streaming Media Outlook Travel Healthcare WiFi Synergy Disaster Recovery Troubleshooting Physical Security Technology Tips Hybrid Cloud Certification HIPAA Yahoo Document Management Database Touchscreen Router Content Filtering Staff RAM Gaming Console Reporting Tablet Downloads Analytics Managed Service Live Streaming Cables Scalability Upgrade Phone System Plug-In Telephone Systems Data Protection VoIPMyths Files Hard Drives Backup and Disaster Recovery Mobility Remote Support Hard Drive DDoS Paperless Office Tactics Microsoft Office 365 Gmail Websites Microsoft Teams Video Games Google Maps e-waste Worker Knowledge Artificial Intelligence Trends IaaS Profitability WhatsApp Wireless Charging SSD Voice over Internet Protocol Credit Cards Proactive IT E-Commerce Remote Control Dark Data IT budget PowerPoint Television Information Technology VoIPSavings Avoiding Downtime Staffing Training Processors Digital Internet Explorer Smart Technology Authentication Lead Generation Cortana disposal Printer Two-factor Authentication GDPR Comparison A.I. HaaS Printer Server Eliminating Downtime Inventory Gadget Payment Unified Threat Management IT Management Sports Biometrics Update Emergency Telephony Security Cameras Apple Edge Threat Business Intelligence Authorization Managed Service Provider Cost Management Dongle News Spyware Value Tech Support Storage Multi-Factor Security Specifications Managed IT Movies Cleaning Printers Wireless Internet Hiring/Firing Employer Employee Relationship Amazon Current Events Shortcut instant Messaging Email Management Botnet VPN Tech Terms Leadership Access Safety Technology Efficiently Licensing Voice over IP The Internet of Things iPhone Bring Your Own Device Conferencing Fun Unified Communications Operating System Customer Relationship Management Network Attached Storage Competition eCommerce Big Data Paper IP Address Telecommuting Hosted Solution Virtualization Environment Customer Service Cryptocurrency Autocorrect Server Management Online Shopping Ink Mobile Office Millennials Copy Search Scheduling Domains Server Windows 10 Google Drive VoIP File Sharing Emoji IT Support Paste User Tip Instagram Public Speaking Samsung Money Machine Learning Presentation Spam Blocking User Security Lithium-ion battery Managed IT Services Augmented Reality Tip of the week G Suite Telecommute Wireless Technology 5G Mobile Security IBM Business Technology Wearables Laptop Printing Hacker Quick Tips Remote Computing

Newsletter Sign Up