Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Safely Shop Online

b2ap3_thumbnail_safe_holiday_shopping_400.jpgThe holiday shopping season is upon us and more people are choosing to shop from the comforts of their home PC or mobile device rather than fight the crowds. Shopping online is super convenient, but it’s not without the risk of identity theft. The best way to protect your digital shopping cart from hackers is to know how to safely shop online. We’ll show you how.

This is a special time of the year when hackers are watching the habits of shoppers, hoping to steal identities and ruin the holidays in Grinch-like fashion. Going back to just last year, more than 70 million customer identities from Target were compromised in what Forbes magazine called “the nightmare before Christmas.” In this incident, it was Target’s job to protect its customers and they substantially missed the mark. When it comes to online shopping, retailers take several precautions to protect your data, but the consumer also has the responsibility to use safe Internet browsing practices.

Double Check to Make Sure that Your Information is Secure
In the same way that you wouldn’t leave your credit card out in the open for every shopper to see, you should take extra care to keep your financial information private when making online purchases. One way to do this is to avoid sending sensitive information via email. Your email may not be as secure as you think. A dedicated hacker can easily breach a password-protected email service or social media account. If they come across a message containing all of your sensitive information, then you might as well gift wrap your credit card and mail it to them tucked inside a holiday greeting card--along with a picture of your family and all of their financial information too.

It’s best practice to only send your financial information over online forms provided by the official website. These forms are encrypted and secure. You can check to see if an online form is secure by investigating its security certificate. Do this by making sure that the URL begins with “https” instead of the normal “http.” Also, depending on the browser, you should see a padlock icon at the beginning of the address letting you know that the entered information is encrypted.

Avoid Shopping Over Public WiFi
Data transferred over public WiFi is particularly susceptible to hackers. You don’t know for sure who you're sharing the connection with, and if they’ve got the tools needed to view your screen or directly access your files. Unless you know what kind of security the WiFi provider uses, it’s best not to connect to public WiFi, especially when dealing with sensitive personal and corporate information.

It may seem mighty tempting to break this rule and use public WiFi when traveling and find yourself in a pinch. One way to securely use a wireless Internet connection is over a Virtual Private Network. This is a private network that only you and the people you share it with can access. A PC Geek can help set this up for you on your mobile device and company network.

Using Up-to-Date Software Prevents Hack Attacks
One of the most important steps you can take in order to make sure that your online shopping experience is safe is to make sure that your software is up to date. This especially applies to your web browser and operating system. Actually, it applies to all of the software on your computer due to the fact that software updates often take into account vulnerabilities that hackers like to exploit. As far as online shopping goes, updating your software is like closing the door to the dressing room before trying on new clothes.

Updating your software isn’t difficult to do, but it can be a tedious task that’s easy to lose sight of--which can cost you dearly if a hacker exploits your oversight. With A PC Geek’s managed IT services, we remotely perform these updates for you so that you can shop freely from your workstation without concern of a hacker stealing your information.

If your systems are up to date and you’re using best practices when shopping online, then you won’t have to worry about hackers stealing your identity and ruining your holiday. If you have any doubt that your network can keep out a hacker, then call A PC Geek at (469) 567-0181 for a free IT consultation and security assessment.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 21 February 2020
If you'd like to register, please fill in the username, password and name fields.

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Google Business Software Business Computing Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Virtualization Server Smartphone Network Email Data Quick Tips Holiday Disaster Recovery Apps Alert Save Money Remote Computing Going Green Operating System Social Media Upgrade Business Continuity Mobile Device Management Office Saving Money Android Chrome Small Business Facebook Best Practice WiFi Identity Theft Employer-Employee Relationship Ransomware Antivirus The Internet of Things Big Data Managed Service Provider Mobility Microsoft Office Social Application Browser Current Events Government Saving Time Information Technology Spam Lithium-ion battery Bandwidth Printer Unified Threat Management Hacking Tablet BYOD Passwords Law Enforcement Office Tips Analytics History Gmail Search Password Money Wireless Data Management intranet Streaming Media Net Neutrality Firewall iPhone Education Collaboration Laptop User Error communications Work/Life Balance Computers Disaster Telephone Systems Humor Hard Drives Maintenance Avoiding Downtime Phone System Fraud Router Recovery Apple Network Security Automation Gadgets Smartphones Encryption Users USB Remote Monitoring Tech Support Marketing Budget Administration IT Consultant Fax Server Transportation Shortcut Business Intelligence Data Loss Managed IT Services Content Filtering Internet Exlporer Biometrics Point of Sale Wearable Technology PowerPoint Social Engineering Customer Service Cost Management Telephony Proactive IT Retail Virtual Reality BDR Wi-Fi Google Drive Online Currency Entertainment DDoS Flexibility Benefits Mobile Office Cybercrime IT Solutions Risk Management Office 365 Private Cloud VPN Managing Stress Wireless Technology Outlook Printer Server Update App Personal Information Access Emergency Presentation Meetings Compliance Science Programming Computing Hosted Solution Automobile Cleaning End of Support Running Cable Phishing Inbound Marketing Prodcuctivity Worker Commute Robot Save Time Emails Networking Audit Online Backup Advertising Video Games Twitter OneNote Data storage Hacker Human Resources Near Field Communication PDF Legal Display OneDrive Uninterrupted Power Supply Keyboard Bring Your Own Device Text Messaging Paperless Office Computer Accessories Internet of Things Politics Bloatware Workplace Applications Hiring/Firing IT consulting Miscelllaneous Mouse Artificial Intelligence Distributed Denial of Service Scalability Sports Experience Touchpad Branding Website HIPAA Network Congestion RAM eWaste How To Music Ebay Travel Operating Sysytem Regulations WIndows 7 Blogging Storage CPU ISP Amazon Television Files Books Two-factor Authentication 3D Printing Bluetooth Slow Smart Phones Trending Black Market Chromecast Electronic Medical Records Customer Relationship Management Cameras SharePoint HaaS User Windows 8 Data Theft Excel Instant Messaging Administrator Safety Reputation Teamwork Best Available Vendor Management CloudSync Battery

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code