Online Shopping Safety Tips

Part One of our Cyber Holiday Safety Series focuses on protecting your information while online shopping. Phishing emails focused on fake deals and last minute sales heavily increase this time of year.

For Part Two, Employee Safety Tips, Check Back Next Week!

As the holiday season comes into full swing, it’s important to be on the lookout for cybercriminals.  With increased spending, planning, and traveling this time of year, it is easy to get caught off guard and fall for a malicious email.

Shopping Safety Tips

Online shopping sales dramatically increase this time of year, and hackers will try to trick shoppers with various forms of phishing emails and fake web pages.

Here’s a few tips to shop safe this year:

  • Always be careful when it comes to links in text messages, emails, and websites. Even if the email seems to be from a legitimate source, it can easily be a malicious impostor.
  • Enable Two Factor Authentication where possible. If a cybercriminal obtains your account credentials, Two Factor Authentication may be not only a fail-safe to protect your account, but also an alert system that your account has been compromised.
  • Be mindful of how much personal information you give away. It’s normal to inquire about why you have to give sensitive information to a company if it may not relate to what your are purchasing.
  • Use complex passwords! A strong, complex, and unique password may protect your account in the event of “brute force” or “credential stuffing” attacks.
  • Keep all of your devices and applications up-to-date on the latest stable update. Many application vulnerabilities are exploited this time of year and updating your software may protect your devices.
  • Lastly, if something doesn’t seem right please do not hesitate to contact your IT Professional. Being overly cautious may just protect your data! 

DATA BREACHES CAN HAPPEN TO BUSINESSES OF ANY SIZE

Subscribe TO OUR NEWSLETTER AND GET
A FREE CYBER THREAT REPORT 

Employee Safety Tips

Part Two of our Cyber Holiday Safety Series focuses on protecting your workplace. Gift card scams and money wiring scams increase this time of year …

Read More →

Online Shopping Safety Tips

Part One of our Cyber Holiday Safety Series focuses on protecting your information while online shopping. Phishing emails focused on fake deals and last minute …

Read More →

New York and New Jersey Data Regulation

If your company does any business in New York or New Jersey, it can be difficult to know what laws pertain to your business. We’ve …

Read More →

Security Alert: Lack of Trust Comes with a High Price Tag for U.S. Businesses

A new study finds that “Almost half (44%) of US consumers have suffered the negative consequences of a security breach or hack…”. The research done by …

Read More →

Preparing for an IT Disaster

IT disasters are devastating to the infrastructure of any business. In 2018, threats to your IT infrastructure are growing no matter what sector your business …

Read More →

Building an Incident Response Program

In part one of our series, our overview of Building an incident response plan, we discussed what regulations organizations will need to meet in order …

Read More →

NetConnect / VISN-IT Featured in StorageCraft Press Release

New StorageCraft Partner Success Program Boosts Profit Paths Across All Channel Partner Business Models DRAPER, Utah, Sept. 27, 2018 /PRNewswire/ — StorageCraft®, whose mission is to protect all …

Read More →

Small Business Cyber Security Concerns

The truth is that Small Businesses have a lot to fear when it comes to Cyber Security. Any disruption that causes downtime or loss of …

Read More →

Email Compromise – How Does it Work?

Email compromises are becoming more and more dangerous every year, and it’s important to know how they work. Email Compromises involve the hacking of a …

Read More →

Cloud Computing Pros and Cons

What is the cloud? Cloud Computing is “the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, …

Read More →

Phishing Threats

Phishing threats are getting more and more sophisticated as cyber security measures become smarter. The main reason why phishing must be handled differently than other …

Read More →

The Dark Web and You

Chances are that somewhere out on the Dark Web lies passwords, email address, and other compromising information that relates to your company. From clicking on …

Read More →

The New Extortion Scam you’ll want to look out for!

Email Threats constantly evolve and try to find new ways to steal your money or steal your information. A large part of Cyber Security is …

Read More →

Two Factor Authentication – Do I Really Need It?

Two Factor Authentication procedures or Multi Factor Authentication procedures are a part of many interactions in our daily life. Most credit and debit cards now …

Read More →

The True Cost of a Data Breach

One of the biggest headaches your company can endure is a data breach. Whether its caused by employee error or targeted cyber attacks, the long …

Read More →