Get Started Today!  217-475-0226

croom new

Decatur Computers Inc. Blog

Tip of the Week: Ward Off Holiday Scammers

Tip of the Week: Ward Off Holiday Scammers

It’s the most wonderful time of the year… for scammers, that is. These kinds of criminals love to take advantage of the gift-giving season. With the right tools for the job, hackers can have a field day stealing sensitive information, like credit card numbers, due to the sheer amount of stuff being purchased by consumers. It’s up to you to stay vigilant and make sure you’re not being scammed, but we have a couple of tricks you can use to stay as safe as possible.

Keep in mind that these are only preventative measures; we can’t guarantee that whoever you’re shopping through is protecting your data adequately, so if the retailer is known for suffering from big data breaches (think Target), perhaps your patronage will be best served elsewhere.

Do Your Research
Going off of the previous point, you’ll want to investigate a little bit to see how well the retailer handles their security. By this, we mean simply going online and seeing if they have been the victim of a massive data breach in previous years. If they have, see what they did about it and whether or not they learned from their mistakes. After all, it would be unfair to judge them on something that happened years ago if they have had a clean record ever since. If you’re unsure or unsettled by any data breaches, there are always other options to shop at, so don’t be too worried.

Check the Physical Vicinity of ATMs
Sometimes you might need some cash in your pocket for a purchase, and while you might think thieving is your biggest problem, ATM scamming is a serious contender. This happens when an ATM has been tampered with to send your banking credentials to a third party--in this case, a hacker. You should always check to see if the ATM has been fitted with devices on the card reader slot, as well as any kind of device attached to the back of it. For example, if the ATM has panels on the back missing, it’s a good sign that perhaps you shouldn’t use that particular machine. Furthermore, make sure that you only use ATMs in well-traveled areas with security cameras, as the chances of the ATM being tampered with are significantly lower.

Be Careful of Wireless Connections
Wireless communications are a significant weak point this holiday season, as public Wi-Fi is notorious for being much more dangerous than any protected network. This is largely in part due to the fact that these networks don’t require a sign-in, and any device can just access it unimpeded. You should keep your devices from accessing these networks automatically, as the data flowing to and from them could be under watch by scammers.

Keep an Eye On Your Devices
As always, the threat of device theft is omnipresent in locations where a lot of people gather. Pickpockets and thieves know full well how much valuable data can be found on these devices, and they might even try to use them for their own purposes. Alternatively, they could sell the devices to make a quick buck or sell the data on the black market to fund further thieving initiatives.

This holiday season be prepared for anything. For more great tips and tricks about how to stay secure with your purchases and online interactions, subscribe to Decatur Computers Inc.’s blog.

The Top 5 Smartphones for the Start of 2019
Why Protecting Your Google Account Should Be a Pri...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, April 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Privacy Tech Term Hackers Productivity Innovation IT Support Software Efficiency Data User Tips Data Backup Google Android Cybersecurity Email Computer Business Management Malware Data Recovery Collaboration Internet Communications Small Business Smartphone Communication Windows 10 IT Services Cloud Hosted Solutions Backup Phishing Hardware Ransomware Managed IT Services Artificial Intelligence Mobile Device Facebook VoIp IT Management Automation Microsoft Office Browser Business Mobile Devices Outsourced IT Cloud Computing Business Technology Social Media BDR Network Applications Cybercrime Cost Management Blockchain Smartphones Two-factor Authentication Managed Service Access Control Office 365 Mobile Device Management App Information Holiday Workplace Tips Data Security Patch Management Scam Microsoft Analytics Hard Drive Passwords Apps Antivirus Update Maintenance Gadgets Internet of Things Data Management Managed IT Services Saving Money Disaster Recovery Websites Encryption Server Vulnerabilities Alert Augmented Reality Bandwidth Upgrade VPN Vulnerability Law Enforcement Bitcoin Business Continuity Printer Quick Tips Operating System Mobility Social Engineering Cooperation Money Search Spam Saving Time Tech Terms Word Remote Monitoring Big Data Gmail Data Protection Touchscreen Digital Conferencing Virtual Assistant Data loss Users SaaS Project Management Healthcare Hacking Apple Windows Start Menu Managed Service Provider Google Maps Laptop Document Management Save Money Vendor Data Breach Television Solid State Drive Hard Drive Disposal Compliance Social Network Modem Administration Trends Emergency Upgrades Website Monitoring Term Cryptocurrency Tablet Software as a Service Samsung Piracy Bluetooth Network Management Help Desk Google Docs Twitter Travel Processor Freedom of Information Corporate Profile Time Management Computing Infrastructure Sports Cabling Unified Threat Management Entertainment Mouse email scam Regulations Customer Resource management SSID Unified Communications Cortana Employer-Employee Relationship Virtual Reality Screen Reader Gamification Password Management Google Play Audit How to Software License Wireless Headphones Service Level Agreement Vendor Management Redundancy Budget Mobile Security Username Navigation Knowledge News Networking Legislation Windows 7 Data Analysis DDoS Uninterrupted Power Supply Google Drive Automobile Accountants Telephone System Printing WiFi Company Culture Telephone Systems HTML Computing Security Cameras Virus Cleaning Going Green Paperless Office Evernote Fake News Unified Threat Management IT Support Business Cards Virtualization Microsoft 365 User Tip Managed IT Worker Best Practice Content Fileless Malware Telephony eWaste Training Voice over Internet Protocol Electronic Medical Records Medical IT Government Wireless Identity Theft Vendor Mangement Consultant Error Social Computer Care Excel YouTube Information Technology Computers Download Bookmark Comparison Unsupported Software Multi-factor Authentication Database Miscellaneous Solutions Addiction Google Calendar BYOD Directions SharePoint History VoIP Robot Equifax iPhone Health IT PowerPoint Legal Access Desktop Chromebook Business Mangement Devices Telephone Router Tip of the week Settings Mobile Technology Nanotechnology Upload Browsers Specifications Device security Tactics Tech Microsoft Excel Downtime Emails Integration Machine Learning Proxy Server Outlook Microchip Disaster Distributed Denial of Service IBM Startup Retail Professional Services Downloads Running Cable Spyware Backup and Disaster Recovery Multi-Factor Security Transportation CrashOverride Windows 10 Managing Stress Marketing Office Printers Office Tips Regulation

Latest Blog

The capabilities of business technology are truly incredible, and they’re only becoming more impressive. This means that the solutions you have in place now will certainly need to be upgraded to other options at some point.

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.