In anticipation of the holiday season, many of us find ourselves increasingly shopping online to avoid crowded storefronts. Unfortunately, cyber scammers are paying attention and routinely amplify their tactics this time of year. Scammers are using phishing tactics to target shoppers looking for those hard-to-find gifts.

It’s easy to get caught up in the excitement and click “complete purchase” without verifying if the offer is legitimate. Once your personal and payment information falls into the wrong hands, the consequences can be costly and stressful.

As you make your online purchases, stay vigilant by following these simple six cyber tips.

  1. Shop with reputable retailers: Stick to well-known brands and verified sellers. Beware of new or unfamiliar websites offering steep discounts on high-demand items, as these are often fronts for scams.
  2. Verify website security and authenticity: Only shop on secure websites with URLs that start with HTTPS, not HTTP. Cyber criminals often create phony websites to collect you credit card and personal information.
  3. Be wary of deals that seem too good to be true: Learn how to spot a scam and identify deals that are too good to be true.
  4. Use strong, unique passwords and enable multi-factor authentication (MFA): Protect your online shopping accounts with complex passwords and activate MFA wherever possible. This extra layer of security helps prevent unauthorized access even if your password is compromised.
  5. Don’t shop on public Wi-Fi: Public Wi-Fi can be a hotspot for cybercriminals to intercept your data. Use a trusted VPN if you must shop on the go, or wait until you’re on a secure, private network.
  6. Check your bank accounts for fraud after your holiday shopping: Regularly review your bank and credit card statements for unauthorized transactions. Many banks offer real-time alerts for suspicious activity—enable these to catch fraud early.

Don’t let a cyber scam ruin your holiday spirit! Contact a member of our executive risk team for more tips and cyber security protocols.

Related insights