Contact us today!

FRS Pros Blog

Don’t Get Scammed with Gift Cards

Don’t Get Scammed with Gift Cards

It’s the holiday season, and shoppers are flocking to stores to find the perfect gift for anyone: the gift card. However, these handy little plastic rectangles may not be so perfect after all. This year, they’ve been a key component to a business email compromise scam that has been popular in the past few months.

Why Gift Cards, And Why Businesses
Let’s look at the situation for a moment. You spend most of your time around your team. You’ve more than likely developed some kind of familiarity with them, or at the very least have been roped into an office gift exchange. If you aren’t familiar with all of your coworkers or employees, you may have a rough time selecting the right gift for them.

In light of this, it starts to make sense to gift them something that they can pick out for themselves, as gift cards enable you to do. This probably explains why gift cards are such a popular option for so many.

Unfortunately, this also practically hands scammers the opportunity to make a lot of money.

The Scam in Action
Using spoofed emails and social engineering tactics to their advantage, a hacker can scam a company’s users by posing as an authority figure, like the president or the CEO. Under this guise, the scammer can instruct the user to purchase gift cards for the staff and to pass along the redemption codes to the scammer.

Since these instructions “come from above,” the employee complies, not realizing that they are sending company funds to a cybercriminal in an effectively untraceable form of currency.

How to Avoid This Scam
Awareness is key to protecting your business’ interests, resources, and funds--and this awareness needs to be on all levels of your organization. Each and every member needs to be educated on how to spot these scams, and how to confirm them.

This confirmation is another crucial component to your business security. If your employees don’t develop the habit of confirming requests like this through a secondary line of communication, the company is left vulnerable to this scam and similar ones. Sure, fielding confirmation requests from your employees may get old, and fast, but it will almost certainly be preferable when compared to being scammed.

When all is said and done, scammers are going to keep trying to take advantage of you, your employees, and your business at large. FRS Pros can help to protect you. Give us a call at 561-795-2000 today.

How the Grinch Didn’t Send that Email!
Tip of the Week: Easy Android Use Tricks


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, January 20 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Computing Business Management Google User Tips Cloud Tech Term Hackers Hardware Software Microsoft Computer Data Backup Mobile Devices Malware Productivity Efficiency Hosted Solutions Browser Smartphone Windows Cybersecurity Android IT Services Windows 10 Data Recovery Data Security Outsourced IT Internet of Things Data Smartphones Innovation Cybercrime Office 365 Apps Email Backup Business Continuity Upgrade VoIP IT Support Operating System Communications Money Business Mobile Device Management Vulnerability Alert Saving Money Disaster Recovery Law Enforcement Ransomware Phishing Server Employer-Employee Relationship Applications Best Practice IT Support Chrome Workplace Tips Spam Small Business Managed IT Services Collaboration Passwords Network Microsoft Office Information Two-factor Authentication Managed Service Provider Router Telephone Systems Managed IT Tech Support Google Drive Managed IT Services Gadgets Unsupported Software Networking App Cloud Computing Users Artificial Intelligence Windows 10 Information Technology Miscellaneous Computers OneNote Virtualization Holiday Blockchain Facebook Fraud Data Management Data Protection Bring Your Own Device Mobile Security Evernote Productivity Wi-Fi Quick Tips Google Assistant Update Cost Management User Error Sports Hosted Solution Politics Augmented Reality Shortcut Avoiding Downtime Mobility WannaCry Cortana Commerce Automation Password BDR Word Communication Business Technology Hacking SaaS Google Docs Project Management Government Patch Management Wireless Charging Proactive IT Devices Gmail Application Robot Encryption Touchscreen Data Storage Save Money Safety WiFi Data Breach The Internet of Things Social Media Mobile Device VPN iPhone Travel Budget Access Control Managed Service Wireless Technology Risk Management Excel Audit Printing Telephone Administrator Data storage Apple Meetings Point of Sale History Solid State Drive Remote Computing Health Tablets Root Cause Analysis Maintenance Security Cameras Lithium-ion battery Emails Sales Cast Proactive Projects Streaming Media Sync Computer Fan PowerPoint Admin Upgrades Storage Social Engineering Vendor Identity Theft Hyperlink Access Settings Edge Wireless Hard Disk Drive FAQ IT Management Chromecast Search NFL eWaste Hybrid Cloud Machine Learning Marketing Retail BYOD Websites Identity Wireless Internet Saving Time Telephony Laptop Identities Employee-Employer Relationship Vendor Management Transportation Value Wasting Time Internet Exlporer Data Loss Ciminal Scam Private Cloud Charger IT Solutions Device Security Amazon Webinar Conferencing Data Theft Data Privacy Windows 7 Samsung Going Green Social Adobe Workers Gamification Keyboard Shortcuts Uninterrupted Power Supply Touchpad Consultant Legislation Language Accessory Remote Monitoring Software as a Service Display Legal Windows Ink Virtual Assistant IT solutions Gifts Computing Hard Drive Antivirus Licensing Updates Memory Human Resources Humor Comparison Testing Computer Forensics Peripheral DDoS Microsoft Excel IT budget Bandwidth Files Outlook iOS WIndows Server 2008 Chromebook Co-Managed Services Recovery Google Maps Spyware Alexa for Business Disaster Personal Information Windows 10s Credit Cards HBO App store Computer Care Nanotechnology Microsoft Word Financial Payroll Hacker Specifications Screen Mirroring Virus Camera Management Emergency Unified Threat Management File Sharing Reputation Scalability Analytics Mobile Computing Entertainment Keyboard Thank You Black Market Cleaning Text Messaging Big Data Compliance Automobile Office Managing Stress Printers Congratulations USB Worker Office tips How To Books Advertising Cache Regulation Video Games Experience Downtime Education Hiring/Firing Training Monitors Virtual Reality Work/Life Balance Twitter Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship Phone System End of Support Television CrashOverride Benefits HaaS Relocation Company Culture Save Time Computer Accessories Flexibility Music Battery Smart Technology Instant Messaging es PDF