Out of the Box Solutions Blog

Scammers Can Use Gift Cards to Target Your Company

Scammers Can Use Gift Cards to Target Your Company

Ready or not, the season of giving is here, and that means it’s gift card season. These can seem to be the perfect gift for coworkers and employees… which is why everyone will need to be wary of a particular business email compromise scam that has seen an uptick this year.

Some Background
Let’s face it - business owners, managers, and employees often feel the need to recognize the holiday season with some small gift or trinket given to their teammates.

However, some office relationships are strictly based around office matters, which makes gift-giving difficult. Moreover, the people who generally would be distributing gifts to the entire office - management - probably don’t have the time to select a well-thought-out gift for each employee. Frankly, in circumstances like these, the best gift is one that the recipient can pick out for themselves.

Hence, the popularity of gift cards in the workplace, and the reason that these scams can work so well.

How the Scam Plays Out
A cybercriminal carrying out this scam will leverage email spoofing and social engineering to pose as one of a company’s higher-ups, like the president or the CEO. Using this persona, the scammer then reaches out to an employee with a request to buy gift cards for the staff. Seeing as this request is “from the boss,” and these emails are typically directed to upper members of the business and accounting staff, the employee complies.

Inside the email, the scammer instructs the employee to provide the codes from the gift cards, allowing them to redeem them and make their own use of them. Since gift cards are an untraceable form of currency, the scammer gets away with it with very little effort.

How to Avoid Being Scammed
When it all comes down to it, the best defense is old-fashioned vigilance. Everyone in the company needs to be aware of threats like these and know how to spot them.

Most crucially, there needs to be a companywide understanding that any claims like this need to be substantiated through a second means of communication. While a twenty-second phone call may sound more like a pain than anything else, it is nothing at all compared to the stress and hassle of being scammed.

Scammers are only getting more clever. For assistance in keeping yourself safe, turn to the professionals at Out of the Box Solutions. Call 800-750-4OBS (4627) today.

The Unofficial Guide to Comprehensive Google Accou...
Tip of the Week: 5 Ways IT Adds to Business Succes...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, April 20 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Productivity User Tips Privacy Tech Term Internet Efficiency Smartphones Communication Microsoft Google Data Innovation Hardware Email Cybersecurity Windows 10 IT Support Mobile Device Cloud Browser Users Android Malware Mobile Devices Business Passwords Small Business Business Management IT Services Collaboration Communications Ransomware Network Software Workplace Tips Bandwidth Managed IT services Applications Data Backup Outsourced IT Backup Saving Money Managed IT Services Wi-Fi Data recovery Internet of Things Wireless Holiday Hackers VoIp Apps Cloud Computing Marketing Business Intelligence Blockchain Hosted Solutions Social Media Information Networking Employer-Employee Relationship Chrome Paperless Office Smartphone Gmail Artificial Intelligence Facebook Analytics Healthcare Virtual Assistant Password Gadgets Cost Management Managed Service Mobility Wireless Charging Data Security Net Neutrality Compliance Virtualization Managed IT Service VPN Patch Management Remote Computing BDR G Suite Data Management Computer Office Remote Monitoring and Management Computers Office 365 Save Money Tech Terms Access Control Microsoft Office Cortana Automation Connectivity Medical IT Dongle Paper Authentication Operating System Company Culture Analysis Certification Battery Data Breach Error instant Messaging Processors Specifications Movies BYOD eCommerce Laptop Workers Maintenance Voice over IP Technology Tips Troubleshooting Health Cables SaaS Ink Authorization Chrome OS Digital Data loss Managing Stress Sales Vulnerabilities Vulnerability Machine Learning Employees Twitter Plug-In Wireless Internet Online Shopping Millennials Router Streaming Media Update Database Voice over Internet Protocol GDPR Government PowerPoint Spam Environment Training IT Management Tablet Touchscreen Cryptocurrency Spyware Conferencing Inventory Unified Communications Proactive IT Help Desk Business Technology Websites Internet Explorer Backup and Disaster Recovery Downloads Outlook Big Data Cybercrime Personal Information WannaCry Server Management Excel Sports Human Resources Edge Virus e-waste Security Cameras Server Threat Microsoft Office 365 HP Data Protection RAM Business Continuity Settings Safety Hard Drives Trends Profitability Telecommuting Tactics Storage E-Commerce HIPAA Knowledge Miscellaneous Employee-Employer Relationship Antivirus Tip of the week disposal Bring Your Own Device Reporting Word Printing Time Management Document Management Telecommute Content Filtering Mobile Security Microsoft Teams Upgrade IT budget Phishing Hard Drive Comparison SSD A.I. Amazon Eliminating Downtime Physical Security Dark Web Payment Telephony Electronic Health Records Staff User Tip Value Hybrid Cloud Wearables Lead Generation Network Attached Storage Quick Tips Solid State Drive Disaster Recovery Regulation Windows 7 Hard Disk Drive Alert Printers