888.678.7282    Get SUPPORT

Strata Information Technology Blog

Scammers Can Use Gift Cards to Target Your Company

Scammers Can Use Gift Cards to Target Your Company

Ready or not, the season of giving is here, and that means it’s gift card season. These can seem to be the perfect gift for coworkers and employees… which is why everyone will need to be wary of a particular business email compromise scam that has seen an uptick this year.

Some Background
Let’s face it - business owners, managers, and employees often feel the need to recognize the holiday season with some small gift or trinket given to their teammates.

However, some office relationships are strictly based around office matters, which makes gift-giving difficult. Moreover, the people who generally would be distributing gifts to the entire office - management - probably don’t have the time to select a well-thought-out gift for each employee. Frankly, in circumstances like these, the best gift is one that the recipient can pick out for themselves.

Hence, the popularity of gift cards in the workplace, and the reason that these scams can work so well.

How the Scam Plays Out
A cybercriminal carrying out this scam will leverage email spoofing and social engineering to pose as one of a company’s higher-ups, like the president or the CEO. Using this persona, the scammer then reaches out to an employee with a request to buy gift cards for the staff. Seeing as this request is “from the boss,” and these emails are typically directed to upper members of the business and accounting staff, the employee complies.

Inside the email, the scammer instructs the employee to provide the codes from the gift cards, allowing them to redeem them and make their own use of them. Since gift cards are an untraceable form of currency, the scammer gets away with it with very little effort.

How to Avoid Being Scammed
When it all comes down to it, the best defense is old-fashioned vigilance. Everyone in the company needs to be aware of threats like these and know how to spot them.

Most crucially, there needs to be a companywide understanding that any claims like this need to be substantiated through a second means of communication. While a twenty-second phone call may sound more like a pain than anything else, it is nothing at all compared to the stress and hassle of being scammed.

Scammers are only getting more clever. For assistance in keeping yourself safe, turn to the professionals at Strata Information Technology. Call 888.678.7282 today.

Strategizing Your IT Leads to Better Business
Tip of the Week: 5 Ways IT Adds to Business Succes...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, December 11 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Managed IT Services Privacy Cloud Internet Network Security Malware Cybersecurity Communications Backup Tech Term Hackers User Tips Business Management VoIP Outsourced IT Microsoft IT Support Ransomware Software Smartphones Alert Passwords Productivity IT Services Social Media Business Google Windows 10 Efficiency Email Communication Productivity Data Backup Browser Data Recovery Phishing Users Cloud Computing Hardware Save Money Hosted Solutions Data Small Business Network Internet of Things Miscellaneous Saving Money Android Vulnerability Business Continuity App Bandwidth Twitter Data Breach Apps Microsoft Office Mobile Device Smartphone Innovation Office 365 Employer-Employee Relationship Patch Management Networking Remote Monitoring Scam Applications Cybercrime Mobile Device Management Settings Government Wi-Fi Computer BDR Access Control Workers Collaboration Compliance Workplace Tips Blockchain Excel Company Culture Law Enforcement Politics Holiday Website Windows Managing Stress Education Spam Wireless Information Vendor Management Entertainment Facebook Recovery Managed IT Service Maintenance Password Connectivity Remote Monitoring and Management Chrome Dark Web Virus Retail Office Personal Information BYOD Word Virtual Assistant Marketing Antivirus Automation Computers SaaS How To Managed Service Travel Artificial Intelligence Trends Reporting Sales Video Games Google Maps e-waste Worker IT budget PowerPoint Battery Data Management Plug-In WiFi IaaS SSD Voice over Internet Protocol Encryption VoIPMyths Physical Security Upgrade Digital Internet Explorer Automobile HIPAA Television Information Technology Microsoft Office 365 Router Content Filtering Credit Cards Profitability Live Streaming Smart Technology A.I. Synergy Medical IT Tablet Staffing disposal Printer IT Management Sports Yahoo Proactive IT Telephone Systems Data Protection HaaS Printer Server Inventory VoIPSavings Files Edge Threat Remote Support Hard Drive Biometrics Dongle Authentication Gmail Gadget Hard Drives Eliminating Downtime WhatsApp Wireless Charging Business Intelligence Movies GDPR Knowledge Mobile Devices Spyware Value Two-factor Authentication Tech Terms DDoS Remote Control Cleaning Printers Amazon Update Shortcut Processors Leadership Access Bring Your Own Device Authorization Current Events HP Avoiding Downtime Wireless Internet Lead Generation Data loss Dark Data Storage Comparison Technology Efficiently Emergency Telephony Tech Support Streaming Media Computer Care Net Neutrality CrashOverride Cortana Apple Safety Technology Tips Hybrid Cloud Document Management Database Help Desk News Disaster Recovery Staff RAM Unified Threat Management Error Multi-Factor Security Specifications The Internet of Things Outlook Licensing Voice over IP Gadgets Budget Downloads Regulation Email Management Gaming Console Managed Service Provider Cost Management iPhone Analytics Backup and Disaster Recovery Cables Managed IT Troubleshooting Paperless Office Tactics Hiring/Firing Employer Employee Relationship Telephone System WannaCry Websites Microsoft Teams Botnet VPN Touchscreen Scalability Phone System eCommerce Copy Windows 10 Customer Service Fun Telecommuting Mobile Office VoIP Online Shopping Paste Machine Learning Domains Millennials Virtualization G Suite Autocorrect Telecommute Google Drive Managed IT Services Public Speaking File Sharing Presentation Mobile Security Search Scheduling IT Support Laptop Printing Server Lithium-ion battery User Tip Unified Communications Emoji Augmented Reality Network Attached Storage Spam Blocking User Security Wireless Technology 5G Operating System Instagram IBM Paper Samsung Money Quick Tips Tip of the week Hacker Hosted Solution Server Management Business Technology Environment Customer Relationship Management Ink Competition Remote Computing Big Data Certification IP Address Conferencing

Newsletter Sign Up