Out of the Box Solutions Blog

Scammers Can Use Gift Cards to Target Your Company

Scammers Can Use Gift Cards to Target Your Company

Ready or not, the season of giving is here, and that means it’s gift card season. These can seem to be the perfect gift for coworkers and employees… which is why everyone will need to be wary of a particular business email compromise scam that has seen an uptick this year.

Some Background
Let’s face it - business owners, managers, and employees often feel the need to recognize the holiday season with some small gift or trinket given to their teammates.

However, some office relationships are strictly based around office matters, which makes gift-giving difficult. Moreover, the people who generally would be distributing gifts to the entire office - management - probably don’t have the time to select a well-thought-out gift for each employee. Frankly, in circumstances like these, the best gift is one that the recipient can pick out for themselves.

Hence, the popularity of gift cards in the workplace, and the reason that these scams can work so well.

How the Scam Plays Out
A cybercriminal carrying out this scam will leverage email spoofing and social engineering to pose as one of a company’s higher-ups, like the president or the CEO. Using this persona, the scammer then reaches out to an employee with a request to buy gift cards for the staff. Seeing as this request is “from the boss,” and these emails are typically directed to upper members of the business and accounting staff, the employee complies.

Inside the email, the scammer instructs the employee to provide the codes from the gift cards, allowing them to redeem them and make their own use of them. Since gift cards are an untraceable form of currency, the scammer gets away with it with very little effort.

How to Avoid Being Scammed
When it all comes down to it, the best defense is old-fashioned vigilance. Everyone in the company needs to be aware of threats like these and know how to spot them.

Most crucially, there needs to be a companywide understanding that any claims like this need to be substantiated through a second means of communication. While a twenty-second phone call may sound more like a pain than anything else, it is nothing at all compared to the stress and hassle of being scammed.

Scammers are only getting more clever. For assistance in keeping yourself safe, turn to the professionals at Out of the Box Solutions. Call 800-750-4OBS (4627) today.

The Unofficial Guide to Comprehensive Google Accou...
Tip of the Week: 5 Ways IT Adds to Business Succes...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, December 17 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term User Tips Privacy Internet Cybersecurity Productivity Smartphones Efficiency Microsoft Browser Communication Cloud Mobile Device Malware Hardware Email Android IT Support Communications Applications Users Backup Data Business Management Saving Money Managed IT services Data Backup Ransomware Google Passwords Network Small Business Windows 10 Wi-Fi Data recovery IT Services Networking Business Wireless Outsourced IT Social Media Managed IT Services Hosted Solutions Cloud Computing Collaboration Innovation Business Intelligence Employer-Employee Relationship Blockchain Software VoIp Marketing Information Mobile Devices Workplace Tips Internet of Things Tech Terms Save Money Managed Service Holiday Hackers Connectivity Automation Managed IT Service Patch Management Compliance Remote Computing Apps Artificial Intelligence Computer Bandwidth Virtual Assistant Cost Management Analytics Wireless Charging Remote Monitoring and Management Cortana Virtualization Microsoft Office VPN BDR Gmail Data Management Computers Troubleshooting Printing SaaS Mobile Security Microsoft Teams Millennials Antivirus IT budget SSD A.I. Document Management Telecommute Authorization Physical Security Plug-In Wireless Internet Hard Drive Value Hybrid Cloud Tablet Update Dongle Paper Conferencing Lead Generation Network Attached Storage GDPR Operating System Company Culture Business Technology Staff Battery Facebook Movies Paperless Office Smartphone Maintenance eCommerce Laptop Proactive IT Help Desk Technology Tips Processors Touchscreen Cables Excel Outlook Ink Office Password Managing Stress Router Twitter Telecommuting Digital Data loss Online Shopping Business Continuity Streaming Media Tip of the week Vulnerability Machine Learning Microsoft Office 365 Database Voice over Internet Protocol Knowledge Office 365 Profitability Government PowerPoint Content Filtering Storage Environment Phishing Miscellaneous Websites Internet Explorer Comparison IT Management Reporting Inventory Unified Communications Spam Upgrade Backup and Disaster Recovery Downloads User Tip Spyware Access Control Cybercrime Telephony Big Data Amazon Eliminating Downtime Sports WannaCry Server Management Dark Web e-waste G Suite Data Breach Safety Threat Specifications Server Medical IT Data Protection RAM Workers Edge Virus Voice over IP Settings Analysis Certification Hard Drives Trends HP Authentication Tactics BYOD Gadgets HIPAA Error disposal Bring Your Own Device Sales Mobility Alert Quick Tips Regulation Disaster Recovery Printers