With Christmas coming fast, this is a last ditch effort to enlighten, empower and protect online shoppers. The abridged source of the following information is from the National Cyber Alert System by US-CERT, a government organization.How do attackers target online shoppers? Targeting vulnerable computers – If you do not take steps to protect your computer from viruses or other malicious code, an attacker may be able to gain access to your computer and all of the information on it. Creating fraudulent sites and email messages – Unlike traditional shopping, where you know that a store is actually the store it claims to be, attackers can create malicious websites that appear to be legitimate or email messages that appear to have been sent from a legitimate source. Intercepting insecure transactions – If a vendor does not use encryption, an attacker may be able to intercept your information as it is being transmitted. How can you protect yourself? SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Use and maintain anti-virus software, a firewall, and anti-spyware software. Keep software, particularly your web browser, up to date – Install software updates so that attackers cannot take advantage of known problems or vulnerabilities. Evaluate your software’s settings – The default settings of most software enable all available functionality. Apply the highest level of security available that still gives you the functionality you need. Do business with reputable vendors – Before providing any personal or financial information, make sure that you are interacting with a reputable, established vendor. Take advantage of security features – Passwords and other security features add layers of protection if used appropriately Be wary of emails requesting information – Attackers may attempt to gather information by sending emails requesting that you confirm purchase or account information. Check privacy policies – Before providing personal or financial information, check the website’s privacy policy. Make sure your information is being encrypted – Many sites use SSL, or secure sockets layer, to encrypt information. Use a credit card – There are laws to limit your liability for fraudulent credit card charges, and you may not have the same level of protection for your debit card. Check your statements – Keep a record of your purchases and copies of confirmation pages, and compare them to your bank statements. If there is a discrepancy, report it immediately. Related content opinion Why all IT talent should be irreplaceable Forget the conventional wisdom about firing irreplaceable employees. Because if your employees aren’t irreplaceable, you’re doing something wrong. By Bob Lewis Oct 03, 2023 5 mins Hiring IT Skills Staff Management case study ConocoPhillips goes global with digital twins Initial forays into using digital twins across its major fields has inspired the multinational hydrocarbon exploration and production company to further adopt the technology across its entire portfolio. By Thor Olavsrud Oct 03, 2023 8 mins CIO Mining, Oil, and Gas Digital Transformation brandpost ST Engineering showcases applications of new technologies to stay ahead of disruption By Jane Chan Oct 03, 2023 7 mins Generative AI Digital Transformation Innovation news Nominations extended for CIO100 ASEAN Awards 2023 By Shirin Robert Oct 02, 2023 2 mins IDG Events IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe