Shopping Safely Online During Black Friday

Leading security awareness solution supplier, CyberReady has announced five easy security tips to help holiday shoppers safely navigate Black Friday and Christmas as holiday sales put employee data and corporate networks at risk. 

Coinciding with Black Friday, the  CyberReady is also releasing its enhanced CISO Toolkit to provide free tools with guidance on safe online shopping to help CISOs defend employee desktops, laptops, mobile devices and corporate networks.

According to the FBI, “Every year, thousands of people become victims of holiday scams. Scammers can rob you of hard-earned money, personal information, and, at the very least, a festive mood.” Shopping scams are notoriously active during Black Friday and Cyber Monday as millions of shoppers use their PC, laptop, or mobile device to search for deals and make purchases. This presents a considerable risk to organisations with a large number of employees working remotely

Black Friday and Cyber Monday phishing emails tend to showcase amazing deals. These offers typically use emotional tactics to lure consumers into clicking offers that don’t really exist. 

  • Advertising lures the user to enter a fake website and provide credit card information. 
  • Payment traps force the user to submit their credit card information rather than using a digital wallet or payment service, allowing the capture of this sensitive payment information. 
  • Other factors weaken the buyer’s judgement, making the situation even more dangerous as limited-time deals make it difficult to dig into the details, and unknown senders frequently text and email the buyer, adding to the distraction.

Consequently, when this busy shopping season arrives, it is critical to be aware of the increasing risks to personal finances and employer networks.

Now, CybeReady is offering the following guidelines to help reduce the chance of a scam or other sinister attack achieving success:

Before Shopping: 

  1. Always enter the URL for a merchant’s website yourself. Do not use a link from an ad or email. Use the brand’s official shopping application on your smartphone.

While Shopping: 

  1. Check for the lock symbol next to a website’s URL to ensure it is a secure site.
  2. Use a third-party payment method that does not transmit credit card information to the seller (like PayPal or Venmo) or use a disposable card.

After Shopping: 

  1. Visit the merchant’s website to see sales updates. Do not click links in emails or texts claiming to provide order updates. 
  2. Keep an eye on your financial account for any unexpected transactions.

Because some employees will inevitably use their corporate connected PCs, laptops and mobile devices to take advantage of short-term shopping specials, CISOs are also advised to implement additional safeguards.

To assist security leaders, CybeReady is releasing its enhanced CISO Toolkit which provides complimentary tools to help communicate relevant security information to employees, quickly and effectively. The enhanced toolkit provides an overview of security guidelines, policies and tips, offering easy-to-understand information to help avoid cybersecurity traps with guidance on:

  • Holiday Shopping Security
  • Zoom Security
  • Online Privacy 
  •  Password Security 
  • Fake News and Rumours
  • Remote Work
  • COVID-19-related Phishing Emails
  • Security in Times of Crisis
  • Sextortion - what employees need to know
  • Tips for Worry-Free Vacations

Acording to CyberReady's CEO, Eitan Fogel “It is important to realize how good deals for employees can become a bad ordeal for your organisation... During the Holiday Season employees may be easily distracted and hackers are very aware of this, resulting in a significant increase in cyber attacks as the holidays approach. In response, it must be an all-hands effort to ensure security is a top priority.”

 Download the free CISO Toolkit >> Here

You Might Also Read: 

The Hidden Costs Behind Black Friday Bargains:

 

« Detected - A Hard Matching Vulnerability Which Enables Azure AD Account Takeover
Four Reasons You Need RASP Security For Web Applications »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The Networking People (TNP)

The Networking People (TNP)

TNP supplies independent advice allowing large organisations to design, build and operate their own networks independently of the established telecoms companies.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

CyberPoint

CyberPoint

CyberPoint delivers innovative, leading-edge cyber security products, solutions, and services to customers worldwide.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

Greylock Partners

Greylock Partners

Greylock Partners is a leading venture capital firm based in Silicon Valley. We invest in all sectors of enterprise software technology including applications, cloud/SaaS, networking and security.

Green House Data

Green House Data

Green House Data is a managed services provider delivering hybrid solutions to enterprises who need secure IT environments and efficient management of their critical applications and business data.

Selectron Systems

Selectron Systems

Selectron offers system solutions for automation in rail vehicles and support in dealing with your railway cyber security challenges.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

Digital Identification & Authentication Council of Canada (DIACC)

Digital Identification & Authentication Council of Canada (DIACC)

DIACC is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication.

ST Engineering Antycip

ST Engineering Antycip

ST Engineering Antycip (formerly Antycip Simulation) is Europe’s leading provider of professional grade COTS simulation software, projection & display systems, and related engineering services.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

CyberFOX

CyberFOX

CyberFOX is a global cybersecurity solutions provider focused on identity access management (IAM) for managed service providers (MSPs) and IT professionals.

rThreat

rThreat

rThreat is a cloud-based SaaS solution that challenges your cyber defenses using real-world and custom threats in a secure environment, ensuring your readiness for attacks.

Bedrock Security

Bedrock Security

Bedrock Security is at the forefront of revolutionizing data security in the cloud and GenAI era.