Out of the Box Solutions Blog

Scammers Can Use Gift Cards to Target Your Company

Scammers Can Use Gift Cards to Target Your Company

Ready or not, the season of giving is here, and that means it’s gift card season. These can seem to be the perfect gift for coworkers and employees… which is why everyone will need to be wary of a particular business email compromise scam that has seen an uptick this year.

Some Background
Let’s face it - business owners, managers, and employees often feel the need to recognize the holiday season with some small gift or trinket given to their teammates.

However, some office relationships are strictly based around office matters, which makes gift-giving difficult. Moreover, the people who generally would be distributing gifts to the entire office - management - probably don’t have the time to select a well-thought-out gift for each employee. Frankly, in circumstances like these, the best gift is one that the recipient can pick out for themselves.

Hence, the popularity of gift cards in the workplace, and the reason that these scams can work so well.

How the Scam Plays Out
A cybercriminal carrying out this scam will leverage email spoofing and social engineering to pose as one of a company’s higher-ups, like the president or the CEO. Using this persona, the scammer then reaches out to an employee with a request to buy gift cards for the staff. Seeing as this request is “from the boss,” and these emails are typically directed to upper members of the business and accounting staff, the employee complies.

Inside the email, the scammer instructs the employee to provide the codes from the gift cards, allowing them to redeem them and make their own use of them. Since gift cards are an untraceable form of currency, the scammer gets away with it with very little effort.

How to Avoid Being Scammed
When it all comes down to it, the best defense is old-fashioned vigilance. Everyone in the company needs to be aware of threats like these and know how to spot them.

Most crucially, there needs to be a companywide understanding that any claims like this need to be substantiated through a second means of communication. While a twenty-second phone call may sound more like a pain than anything else, it is nothing at all compared to the stress and hassle of being scammed.

Scammers are only getting more clever. For assistance in keeping yourself safe, turn to the professionals at Out of the Box Solutions. Call 800-750-4OBS (4627) today.

The Unofficial Guide to Comprehensive Google Accou...
Tip of the Week: 5 Ways IT Adds to Business Succes...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, February 19 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Productivity User Tips Tech Term Privacy Smartphones Internet Efficiency Hardware Microsoft Cybersecurity Data Malware Mobile Device Innovation Email Browser Android Communication Collaboration Google Ransomware Network Passwords Small Business Windows 10 Mobile Devices IT Support Cloud Communications Backup Business Management Saving Money Managed IT services Data Backup Software Data recovery Internet of Things Wi-Fi IT Services Business Applications Wireless Holiday Users Workplace Tips Social Media Managed IT Services Cloud Computing Business Intelligence Employer-Employee Relationship Blockchain Hosted Solutions Information VoIp Marketing Networking Hackers Outsourced IT Facebook Patch Management Remote Computing Apps Smartphone Cost Management Bandwidth Artificial Intelligence Computer Analytics Virtual Assistant Password Managed Service Mobility Wireless Charging Office 365 Data Security Compliance Cortana Virtualization G Suite BDR VPN Gmail Data Management Remote Monitoring and Management Computers Access Control Tech Terms Microsoft Office Save Money Connectivity Automation Medical IT Managed IT Service Staff Authentication Conferencing Maintenance Lead Generation Network Attached Storage Analysis Certification Business Technology Movies Cables Battery BYOD Technology Tips Paperless Office Error instant Messaging Excel Managing Stress eCommerce Laptop Troubleshooting Ink Processors SaaS Healthcare Authorization Office Router Twitter Database Voice over Internet Protocol Plug-In Wireless Internet Telecommuting Streaming Media Digital Data loss Vulnerabilities Knowledge Environment Online Shopping Update Tip of the week Government PowerPoint Vulnerability Machine Learning GDPR Content Filtering Websites Internet Explorer Training Phishing Inventory Unified Communications Comparison Cybercrime IT Management Proactive IT Help Desk Backup and Disaster Recovery Downloads Spam Touchscreen Telephony e-waste Outlook User Tip Sports Spyware Personal Information Big Data Safety Threat WannaCry Server Management Security Cameras Data Breach Data Protection RAM Microsoft Office 365 Specifications Tactics Server Business Continuity Workers Hard Drives Trends Edge Virus Voice over IP disposal Bring Your Own Device Settings Profitability HP Storage E-Commerce Microsoft Teams Miscellaneous Gadgets Printing HIPAA Reporting Word Sales Mobile Security Antivirus Upgrade Millennials SSD A.I. Value Hybrid Cloud IT budget Amazon Eliminating Downtime Document Management Telecommute Dark Web Payment Operating System Company Culture Physical Security Dongle Paper Hard Drive Wearables Tablet Quick Tips Cryptocurrency Disaster Recovery Regulation Alert Printers