888.678.7282    Get SUPPORT

Strata Information Technology Blog

Scammers Can Use Gift Cards to Target Your Company

Scammers Can Use Gift Cards to Target Your Company

Ready or not, the season of giving is here, and that means it’s gift card season. These can seem to be the perfect gift for coworkers and employees… which is why everyone will need to be wary of a particular business email compromise scam that has seen an uptick this year.

Some Background
Let’s face it - business owners, managers, and employees often feel the need to recognize the holiday season with some small gift or trinket given to their teammates.

However, some office relationships are strictly based around office matters, which makes gift-giving difficult. Moreover, the people who generally would be distributing gifts to the entire office - management - probably don’t have the time to select a well-thought-out gift for each employee. Frankly, in circumstances like these, the best gift is one that the recipient can pick out for themselves.

Hence, the popularity of gift cards in the workplace, and the reason that these scams can work so well.

How the Scam Plays Out
A cybercriminal carrying out this scam will leverage email spoofing and social engineering to pose as one of a company’s higher-ups, like the president or the CEO. Using this persona, the scammer then reaches out to an employee with a request to buy gift cards for the staff. Seeing as this request is “from the boss,” and these emails are typically directed to upper members of the business and accounting staff, the employee complies.

Inside the email, the scammer instructs the employee to provide the codes from the gift cards, allowing them to redeem them and make their own use of them. Since gift cards are an untraceable form of currency, the scammer gets away with it with very little effort.

How to Avoid Being Scammed
When it all comes down to it, the best defense is old-fashioned vigilance. Everyone in the company needs to be aware of threats like these and know how to spot them.

Most crucially, there needs to be a companywide understanding that any claims like this need to be substantiated through a second means of communication. While a twenty-second phone call may sound more like a pain than anything else, it is nothing at all compared to the stress and hassle of being scammed.

Scammers are only getting more clever. For assistance in keeping yourself safe, turn to the professionals at Strata Information Technology. Call 888.678.7282 today.

Strategizing Your IT Leads to Better Business
Tip of the Week: 5 Ways IT Adds to Business Succes...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Privacy Managed IT Services Network Security Cloud Internet Hackers Malware Microsoft Productivity User Tips Communications Cybersecurity Smartphones Business Ransomware Business Management Data Outsourced IT Passwords Communication Efficiency Software IT Support Tech Term Backup Windows 10 VoIP Google Email IT Services Hardware Productivity Users Innovation Alert Social Media Network Bandwidth Data Backup Small Business Browser Data Recovery Holiday Cloud Computing Phishing Collaboration Save Money Apps Hosted Solutions Microsoft Office Mobile Device Smartphone Data Breach Android Mobile Devices Vulnerability App Twitter Internet of Things Access Control Business Continuity Office 365 Workplace Tips Miscellaneous Saving Money Workers Wireless Employer-Employee Relationship Patch Management Office Mobile Device Management Net Neutrality Personal Information Remote Monitoring Scam Excel Wi-Fi Cybercrime Networking Computer Company Culture Settings Politics Government Chrome Compliance BDR Applications Facebook Law Enforcement Blockchain Retail Spam Data Security Computers Education Paperless Office Medical IT BYOD Vendor Management Automation Managing Stress SaaS Information Remote Monitoring and Management Managed IT Service Dark Web Windows Virus Marketing Gadgets Connectivity Word Virtual Assistant Antivirus Entertainment Website Recovery Healthcare How To Maintenance Password Travel Downloads Managed Service Current Events Shortcut Sales Reporting Cryptocurrency Leadership Access VoIPMyths Battery Data Management Backup and Disaster Recovery WiFi Cables Plug-In Encryption Physical Security Computer Care Automobile Websites Microsoft Teams HIPAA Mobility Router Tactics Content Filtering Microsoft Office 365 Electronic Health Records Artificial Intelligence Live Streaming Trends Profitability CrashOverride Synergy e-waste Tablet VoIPSavings Yahoo Telephone Systems SSD Data Protection Voice over Internet Protocol Two-factor Authentication Proactive IT E-Commerce Disaster Recovery IT budget Files PowerPoint Gaming Console Remote Support Hard Drive Training Digital Internet Explorer Gmail Authentication Health WhatsApp A.I. Wireless Charging Eliminating Downtime disposal Knowledge GDPR Time Management Hard Drives Analytics Update Scalability DDoS Phone System Remote Control Inventory Tech Support Payment IT Management Sports Video Games Google Maps Dongle Processors Security Cameras Edge Threat Safety Authorization Employees Avoiding Downtime Movies The Internet of Things Lead Generation Wireless Internet Worker Dark Data Spyware Value Comparison Storage IaaS Technology Efficiently Credit Cards Amazon Budget instant Messaging Television Information Technology Tech Terms Emergency Telephony Cortana Staffing Apple Bring Your Own Device Smart Technology HaaS Printer Server Data loss News Help Desk Printer Unified Threat Management HP Multi-Factor Security Specifications Error Human Resources Outlook Gadget Email Management Regulation Vulnerabilities Managed Service Provider Biometrics Cost Management Licensing Streaming Media Voice over IP Troubleshooting Technology Tips iPhone Hybrid Cloud Managed IT Business Intelligence Cleaning Hiring/Firing Printers Employer Employee Relationship Staff Telephone System RAM Upgrade WannaCry Certification Botnet VPN Document Management Database Touchscreen Employee-Employer Relationship Domains eCommerce Environment Server Management Fun Ink Telecommuting Public Speaking Online Shopping Windows 7 Presentation Millennials Virtualization Autocorrect Hosted Solution Lithium-ion battery Machine Learning Augmented Reality Google Drive File Sharing Search Scheduling IT Support Wireless Technology 5G Server G Suite IBM Copy User Tip Telecommute Windows 10 Emoji Hacker Chrome OS VoIP Spam Blocking Mobile Security User Security Instagram Samsung Customer Relationship Management Wearables Money Paste Laptop Printing Competition Tip of the week Quick Tips Unified Communications Big Data IP Address Operating System Business Technology Network Attached Storage Managed IT Services Customer Service Paper Remote Computing Conferencing Mobile Office

Newsletter Sign Up