croom new

Eclipse Integrated Systems Blog

Scammers Can Use Gift Cards to Target Your Company

Scammers Can Use Gift Cards to Target Your Company

Ready or not, the season of giving is here, and that means it’s gift card season. These can seem to be the perfect gift for coworkers and employees… which is why everyone will need to be wary of a particular business email compromise scam that has seen an uptick this year.

Some Background
Let’s face it - business owners, managers, and employees often feel the need to recognize the holiday season with some small gift or trinket given to their teammates.

However, some office relationships are strictly based around office matters, which makes gift-giving difficult. Moreover, the people who generally would be distributing gifts to the entire office - management - probably don’t have the time to select a well-thought-out gift for each employee. Frankly, in circumstances like these, the best gift is one that the recipient can pick out for themselves.

Hence, the popularity of gift cards in the workplace, and the reason that these scams can work so well.

How the Scam Plays Out
A cybercriminal carrying out this scam will leverage email spoofing and social engineering to pose as one of a company’s higher-ups, like the president or the CEO. Using this persona, the scammer then reaches out to an employee with a request to buy gift cards for the staff. Seeing as this request is “from the boss,” and these emails are typically directed to upper members of the business and accounting staff, the employee complies.

Inside the email, the scammer instructs the employee to provide the codes from the gift cards, allowing them to redeem them and make their own use of them. Since gift cards are an untraceable form of currency, the scammer gets away with it with very little effort.

How to Avoid Being Scammed
When it all comes down to it, the best defense is old-fashioned vigilance. Everyone in the company needs to be aware of threats like these and know how to spot them.

Most crucially, there needs to be a companywide understanding that any claims like this need to be substantiated through a second means of communication. While a twenty-second phone call may sound more like a pain than anything else, it is nothing at all compared to the stress and hassle of being scammed.

Scammers are only getting more clever. For assistance in keeping yourself safe, turn to the professionals at Eclipse Integrated Systems. Call 800-340-0505 today.

Tip of the Week: 5 Ways IT Adds to Business Succes...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, December 09 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Network Security Internet Google User Tips Hackers Business Management Malware Software Microsoft Productivity Tech Term Hosted Solutions Efficiency Backup Innovation Computer Browser Windows 10 Business Cybersecurity Apps Email Managed IT Services Productivity Data Recovery Saving Money Windows Communication Mobile Devices Data Backup Smartphones Cybercrime Virtualization Internet of Things Smartphone VoIP Hardware Small Business communications Collaboration Law Enforcement IT Support Passwords Business Continuity Android Workplace Tips Disaster Recovery Operating System IT Services Users Microsoft Office Cloud Computing IT Support Network Data Security Miscellaneous Wireless Ransomware Money Chrome Server Windows 10 Mobility Update Social Media Mobile Device Management Telephone Systems Wi-Fi Mobile Device Office 365 BDR Holiday Outsourced IT Quick Tips Data Gadgets Phishing Cost Management Application Employer-Employee Relationship Information Technology App Government Vulnerability Unsupported Software Password Upgrade Best Practice Health Google Drive Risk Management Social Politics Automation Information Spam Two-factor Authentication Alert Managed Service Provider Networking Work/Life Balance Computers Facebook Shortcut Current Events Hacking Office tips Proactive IT USB Data Management Blockchain Streaming Media Artificial Intelligence Antivirus Managed IT Services Save Money Bandwidth Sports Managed IT User Error Patch Management Marketing Identity Theft SaaS Commerce Applications Maintenance Encryption Mobile Security Router Computer Care Outlook Tech Support Gmail History End of Support Battery Storage Managed Service Meetings Excel Business Intelligence Transportation Internet Exlporer Going Green Connectivity Private Cloud The Internet of Things Office BYOD Wireless Technology Apple Devices iPhone Managing Stress Cortana Compliance HaaS Hosted Solution Cleaning eWaste Samsung OneNote Mobile Computing DDoS Automobile WiFi Personal Information VPN Google Docs Telephony Humor Wireless Charging Social Engineering Fraud Legal Touchscreen Search Audit Data Storage Analytics Remote Computing Save Time Remote Monitoring and Management Television Company Culture Recovery Data Protection Flexibility Smart Technology Education Computer Fan Screen Mirroring Specifications Printing Medical IT Big Data G Suite Hacker Hard Disk Drive File Sharing Language Analysis Teamwork Avoiding Downtime Evernote Movies Eliminating Downtime Windows Ink Ciminal Proactive PDF Worker Commute IT Management PowerPoint Authentication Chromecast Safety Scalability Emails WannaCry Cast Sales Google Assistant GDPR Files Unified Threat Management Books Licensing Device Security Bring Your Own Device Keyboard Instant Messaging Identity Experience Wireless Internet Wearable Technology Google Maps Project Management Websites Amazon Laptop Text Messaging Vendor Management IT Solutions FAQ Authorization How To Webinar Point of Sale Retail Value Dark Web Upgrades Travel Hybrid Cloud Data Privacy Phone System Sync Workers Unified Communications Help Desk Robot IT solutions Data Loss IT budget Data Theft Virtual Assistant Touchpad Charger Downloads Managed IT Service Data storage Advertising Scam Nanotechnology Conferencing Error Trending Video Games Consultant Tablets Spyware Hiring/Firing iOS Legislation Hard Drive Music Updates RAM Lithium-ion battery Running Cable Reputation Windows 10s Computing Plug-In SharePoint Training WIndows Server 2008 Trends Troubleshooting Administrator Cables Bluetooth Distributed Denial of Service Employer Employee Relationship Root Cause Analysis HBO Gifts Internet Explorer Microsoft Office 365 NFL Benefits Virtual Reality Comparison Chromebook Reporting Adobe Microsoft Word Microsoft Teams Black Market Solid State Drive Microsoft Excel Identities App store Uninterrupted Power Supply Operating Sysytem Entertainment Settings Data Breach A.I. Profitability Access Word Edge Virus Voice over Internet Protocol Fax Server Computer Accessories Augmented Reality Credit Cards Threat Access Control Budget Electronic Medical Records Cache Relocation Remote Monitoring CrashOverride Emergency Monitors Disaster Printers Twitter Regulation Certification Worker

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login