croom new

Eclipse Integrated Systems Blog

Scammers Can Use Gift Cards to Target Your Company

Scammers Can Use Gift Cards to Target Your Company

Ready or not, the season of giving is here, and that means it’s gift card season. These can seem to be the perfect gift for coworkers and employees… which is why everyone will need to be wary of a particular business email compromise scam that has seen an uptick this year.

Some Background
Let’s face it - business owners, managers, and employees often feel the need to recognize the holiday season with some small gift or trinket given to their teammates.

However, some office relationships are strictly based around office matters, which makes gift-giving difficult. Moreover, the people who generally would be distributing gifts to the entire office - management - probably don’t have the time to select a well-thought-out gift for each employee. Frankly, in circumstances like these, the best gift is one that the recipient can pick out for themselves.

Hence, the popularity of gift cards in the workplace, and the reason that these scams can work so well.

How the Scam Plays Out
A cybercriminal carrying out this scam will leverage email spoofing and social engineering to pose as one of a company’s higher-ups, like the president or the CEO. Using this persona, the scammer then reaches out to an employee with a request to buy gift cards for the staff. Seeing as this request is “from the boss,” and these emails are typically directed to upper members of the business and accounting staff, the employee complies.

Inside the email, the scammer instructs the employee to provide the codes from the gift cards, allowing them to redeem them and make their own use of them. Since gift cards are an untraceable form of currency, the scammer gets away with it with very little effort.

How to Avoid Being Scammed
When it all comes down to it, the best defense is old-fashioned vigilance. Everyone in the company needs to be aware of threats like these and know how to spot them.

Most crucially, there needs to be a companywide understanding that any claims like this need to be substantiated through a second means of communication. While a twenty-second phone call may sound more like a pain than anything else, it is nothing at all compared to the stress and hassle of being scammed.

Scammers are only getting more clever. For assistance in keeping yourself safe, turn to the professionals at Eclipse Integrated Systems. Call 800-340-0505 today.

The Unofficial Guide to Comprehensive Google Accou...
Tip of the Week: 5 Ways IT Adds to Business Succes...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, February 24 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Network Security Google Hackers User Tips Internet Productivity Software Malware Business Management Microsoft Innovation Efficiency Tech Term Hosted Solutions Computer Backup Business Windows 10 Browser Email Smartphones Cybersecurity Mobile Devices Apps Productivity Hardware Managed IT Services Data Backup Windows Data Recovery Saving Money Communication Collaboration Internet of Things Smartphone Passwords Small Business Holiday Data Security communications VoIP Android Virtualization Cybercrime Workplace Tips Law Enforcement Wireless Business Continuity Disaster Recovery Microsoft Office Ransomware Network Data Operating System Mobility Mobile Device IT Support Cloud Computing Office 365 Users Windows 10 IT Services Miscellaneous IT Support Outsourced IT Wi-Fi Update Gadgets Phishing Password BDR Quick Tips Social Media Money Mobile Device Management Telephone Systems Chrome Server Risk Management Health Upgrade Best Practice Cost Management Employer-Employee Relationship Government Google Drive Vulnerability Unsupported Software Social Application Information Technology Facebook App User Error Alert Managed IT Marketing Office tips Current Events Computers Blockchain USB Personal Information Hacking Artificial Intelligence Antivirus Patch Management Spam Data Management Managed Service Provider Identity Theft Save Money Two-factor Authentication Sports Shortcut Politics Networking Information Automation Work/Life Balance Managed IT Services Streaming Media Proactive IT Bandwidth Connectivity Audit HaaS Transportation iPhone Managing Stress Save Time Internet Exlporer Company Culture Television Wireless Charging The Internet of Things Automobile Google Docs Wireless Technology Compliance Fraud SaaS Commerce Hosted Solution Computer Care Data Storage Legal Search Word Analytics Data Protection VPN Applications Telephony Maintenance Humor Meetings Social Engineering Outlook Going Green Flexibility Remote Computing Office Remote Monitoring and Management Apple Access Control Router Encryption Medical IT Cleaning Excel Recovery G Suite Samsung OneNote eWaste Storage History End of Support Battery Mobile Computing DDoS Mobile Security WiFi Devices BYOD Instant Messaging Tech Support Training Gmail Cortana Private Cloud Business Intelligence Managed Service Touchscreen Authorization Benefits Tablets Spyware Phone System Websites Amazon Conferencing Value Dark Web Solid State Drive Updates Laptop Hybrid Cloud Settings Legislation E-Commerce WIndows Server 2008 Advertising Unified Communications Help Desk Computer Accessories Fax Server Augmented Reality Video Games Data Privacy Electronic Medical Records Downloads Smart Technology Computer Fan NFL Music Data Theft Virtual Assistant HBO Gifts Robot Error Hacker Hard Disk Drive Adobe Microsoft Word Touchpad Managed IT Service Teamwork Comparison Reputation Emails Payment Data Breach Data storage RAM Certification Trending Microsoft Excel Identities Hard Drive Safety Virtual Reality Trends Troubleshooting WannaCry Edge Computing Plug-In Unified Threat Management Lithium-ion battery Credit Cards Internet Explorer Microsoft Office 365 Keyboard Wearable Technology Entertainment Cables Screen Mirroring Specifications Administrator Black Market Webinar Vulnerabilities Evernote Microsoft Teams Security Cameras Vendor Management File Sharing Language Chromebook Reporting Education A.I. Profitability Windows Ink Ciminal Big Data App store Upgrades IT Management Threat Licensing Uninterrupted Power Supply Device Security Operating Sysytem Virus Voice over Internet Protocol Cast Sales Access IT solutions Cryptocurrency PDF Worker Commute Wearables Budget Scalability Printing IT Solutions FAQ Movies Eliminating Downtime Scam Nanotechnology Google Maps Project Management Books Analysis Consultant PowerPoint Authentication Hiring/Firing iOS Running Cable Travel Avoiding Downtime Experience Proactive Retail Google Assistant GDPR Windows 10s Sync Workers Text Messaging Bring Your Own Device SharePoint Chromecast How To Charger Point of Sale Wireless Internet Employer Employee Relationship Bluetooth Root Cause Analysis Distributed Denial of Service Data Loss Files IT budget Identity Healthcare Printers Disaster Twitter Cache Regulation Remote Monitoring Emergency CrashOverride Monitors Relocation Worker Paperless Office

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login