Get Started Today!  217-475-0226

croom new

Decatur Computers Inc. Blog

Tip of the Week: Ward Off Holiday Scammers

Tip of the Week: Ward Off Holiday Scammers

It’s the most wonderful time of the year… for scammers, that is. These kinds of criminals love to take advantage of the gift-giving season. With the right tools for the job, hackers can have a field day stealing sensitive information, like credit card numbers, due to the sheer amount of stuff being purchased by consumers. It’s up to you to stay vigilant and make sure you’re not being scammed, but we have a couple of tricks you can use to stay as safe as possible.

Keep in mind that these are only preventative measures; we can’t guarantee that whoever you’re shopping through is protecting your data adequately, so if the retailer is known for suffering from big data breaches (think Target), perhaps your patronage will be best served elsewhere.

Do Your Research
Going off of the previous point, you’ll want to investigate a little bit to see how well the retailer handles their security. By this, we mean simply going online and seeing if they have been the victim of a massive data breach in previous years. If they have, see what they did about it and whether or not they learned from their mistakes. After all, it would be unfair to judge them on something that happened years ago if they have had a clean record ever since. If you’re unsure or unsettled by any data breaches, there are always other options to shop at, so don’t be too worried.

Check the Physical Vicinity of ATMs
Sometimes you might need some cash in your pocket for a purchase, and while you might think thieving is your biggest problem, ATM scamming is a serious contender. This happens when an ATM has been tampered with to send your banking credentials to a third party--in this case, a hacker. You should always check to see if the ATM has been fitted with devices on the card reader slot, as well as any kind of device attached to the back of it. For example, if the ATM has panels on the back missing, it’s a good sign that perhaps you shouldn’t use that particular machine. Furthermore, make sure that you only use ATMs in well-traveled areas with security cameras, as the chances of the ATM being tampered with are significantly lower.

Be Careful of Wireless Connections
Wireless communications are a significant weak point this holiday season, as public Wi-Fi is notorious for being much more dangerous than any protected network. This is largely in part due to the fact that these networks don’t require a sign-in, and any device can just access it unimpeded. You should keep your devices from accessing these networks automatically, as the data flowing to and from them could be under watch by scammers.

Keep an Eye On Your Devices
As always, the threat of device theft is omnipresent in locations where a lot of people gather. Pickpockets and thieves know full well how much valuable data can be found on these devices, and they might even try to use them for their own purposes. Alternatively, they could sell the devices to make a quick buck or sell the data on the black market to fund further thieving initiatives.

This holiday season be prepared for anything. For more great tips and tricks about how to stay secure with your purchases and online interactions, subscribe to Decatur Computers Inc.’s blog.

The Top 5 Smartphones for the Start of 2019
Why Protecting Your Google Account Should Be a Pri...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Network Security Business Computing Tech Term Privacy Hackers Productivity Data Backup Data Software IT Support Efficiency Innovation Android Business Management Malware User Tips Google Data Recovery Computer Cybersecurity Internet Email Communications Collaboration Smartphone Windows 10 Cloud Small Business IT Services Backup Ransomware Phishing Communication Hosted Solutions Mobile Device Managed IT Services Microsoft Office Social Media Hardware BDR Artificial Intelligence Business Technology Browser Facebook VoIp Business Blockchain Outsourced IT App Managed Service Applications Access Control Office 365 Cloud Computing Automation Mobile Device Management Mobile Devices Cybercrime Information Cost Management IT Management Antivirus Saving Money Disaster Recovery Update Smartphones Maintenance Microsoft Passwords Apps Websites Encryption Workplace Tips Holiday Two-factor Authentication Server Patch Management Data Security Network Gadgets Scam Data Management Hard Drive Managed IT Services Cooperation Social Engineering Vulnerabilities Money Saving Time Data Breach Remote Monitoring Tech Terms Augmented Reality Search Spam Word Gmail Big Data Save Money Project Management Bandwidth Touchscreen Digital Alert Data Protection Healthcare Windows Managed Service Provider Printer Law Enforcement Document Management Google Maps Start Menu Laptop Vendor Internet of Things Conferencing Data loss VPN Vulnerability Hacking Apple Analytics Bitcoin Users SaaS Business Continuity Quick Tips Operating System Mobility Telephone System DDoS Downtime Emails Data Analysis Printing Device security Tactics Security Cameras Startup Going Green Backup and Disaster Recovery Uninterrupted Power Supply Google Drive Computing Hard Drive Disposal Compliance Virus User Tip Fake News Evernote Managed IT Unified Threat Management Electronic Medical Records Medical IT Piracy Bluetooth Worker Content Fileless Malware Government Website Error Social Comparison Computing Infrastructure Download Bookmark Computer Care Excel Twitter Telephony Google Calendar email scam Regulations YouTube Upgrades Addiction Virtual Reality Screen Reader Vendor Mangement Samsung Miscellaneous Unified Threat Management Health IT PowerPoint SharePoint Software License Wireless Headphones BYOD Directions Legal Telephone Router Specifications Networking Legislation Access Upload Browsers Tip of the week Mobile Security History VoIP Outlook Accountants Settings Machine Learning Proxy Server Microsoft Excel Company Culture Business Mangement Tech HTML Professional Services Disaster Distributed Denial of Service Cleaning Microchip Downloads Voice over Internet Protocol Social Network Modem Emergency Television Business Cards Virtualization Running Cable Spyware Automobile Trends Paperless Office IBM WiFi Google Docs eWaste Training Administration Telephone Systems Network Management Help Desk Cryptocurrency Identity Theft Solid State Drive Monitoring Term Virtual Assistant Tablet Software as a Service Best Practice Sports Freedom of Information Information Technology Computers IT Support Travel Processor Wireless iPhone Customer Resource management SSID Mouse Cabling Gamification Entertainment Unified Communications Cortana Multi-factor Authentication Database Corporate Profile Time Management Redundancy Budget Robot Equifax Employer-Employee Relationship Consultant Service Level Agreement Vendor Management Audit Desktop Chromebook Management Google Play Devices How to Unsupported Software Knowledge News Mobile Technology Nanotechnology Password Username Navigation Retail Managing Stress Multi-Factor Security Printers Windows 10 Regulation Marketing Office CrashOverride Office Tips

Latest Blog

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.