ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Holiday Shopping Looking Different this Year

Holiday Shopping Looking Different this Year

2020’s holiday season is going to be much like the rest of 2020: distanced. Most people are taking precautions and therefore have put the kibosh on much of their holiday shopping trips, choosing instead to do a majority of their shopping online. By avoiding one risk, people take on others. Today, we thought we’d outline some of the problems people may experience when shopping online and what to do to reduce your risk.

Protect Your Identity

You would just go into a store and start announcing where you live and how much money you have in your checking account to strangers who are shopping alongside you, right? Well, no matter where you do commerce, information is changing hands; and, unfortunately, by choosing to shop online you are at greater risk of encountering scams. 

The first thing you should consider, if you haven’t already, is what form of payment you are going to use. Security professionals suggest using a credit card, not a debit card, when purchasing goods and services online if you can help it. There are also payment services like PayPal and Venmo that you can use. Credit cards offer better protection from financial theft, and a lot less liability if something were to go wrong. Credit card companies will have better fraud protection and they will make good faster than your bank will.

You will also want to only shop on sites that you trust. They should offer secure file transfer so that your financial and personal information is protected. Check for “https” or a lock icon in the address bar to ensure that your transactions are being processed securely. Even so, you will also want to not give over unnecessary information. The main problem with shopping online is that you are coerced into giving over more information than you would otherwise. This is an ongoing issue that consumer rights groups are lobbying lawmakers to address. Until they do, it’s on you to keep your data private and protected.

Get the Timing Right

A lot of people have had a rough year. This means that many people are going to be finishing their Christmas shopping up later than usual. This causes several problems, especially this year. Some of the stores are having supply chain problems and will be slow to process purchases. You may not be able to get certain products and others will be on backorder. It’s just the way things go this year. 

Secondly, once the process starts it will likely take a little longer to ship than you would expect. Companies have had to make a lot of hard decisions in 2020, and some of them include not hiring the extra help they typically have around the holidays. Less people means slower movement. Everyone is doing their best, but a lot of the speed and convenience we’ve come to know won’t be available for 2020.

Lastly, shipping and mail companies are going to be slammed with online orders more this year than ever before. This means delivery times will be variable. If you want your gifts to arrive so you can put them under the tree, you will want to give companies more time than you typically would. 

Avoid All the Scams

The holidays are usually the busiest time of year for scammers, but with 10 months of altered existence, it has been open season for the majority of 2020. You will want to understand the best practices of doing business online to avoid any potential nightmare situations down the road. Here is a brief list:

Build Strong Passwords - You will want to have complex and well-considered passwords; and, you will want to use multi-factor authentication on as many accounts as you can. This won’t make you immune to hackers, but it will go a long way toward securing the juncture points where these tech-savvy scammers will infiltrate and corrupt. Also, don’t use the same password on multiple sites and accounts.

Understanding Phishing - You will need to be vigilant when going through your emails and other messages. A message that seems benign could be a major problem if clicked on. You will also want to avoid downloading attachments from messages unless you are certain who the sender is. A good rule is to verify before clicking on anything from anyone, especially right now. This time of year people are inundated with forms and questions and they’ll give over information that they typically wouldn’t, just out of fatigue. You need to be deliberate about online transactions.

Don’t use “Free” Wi-Fi - A lot of people like to use outside Wi-Fi to save money on their wireless bill. This seems reasonable before you consider that hackers prey on these wireless accounts and can siphon information and even money off your mobile device if you don’t have the security in place to protect yourself.

The holidays may look the same, but it will certainly feel different as people distance themselves from one another rather than coming together. Do you plan on doing your shopping online this year? Do you have any other tips that would help people not be victims of identity theft and data loss this holiday season? Leave them in the comments and return to our blog regularly for more great tips and tricks.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Windows 10 Facebook Disaster Recovery Passwords Holiday Covid-19 IT Support Apps Browser Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Internet of Things Managed Service Provider Data Management Remote Work Government Saving Money Operating System Workplace Strategy Artificial Intelligence Networking Windows Managed IT services Gadgets Mobile Device Management Information Server Bandwidth WiFi Encryption App Virtualization Blockchain Business Technology Spam Remote Employee/Employer Relationship Apple Information Technology Gmail Office Two-factor Authentication Budget History Office 365 Health Conferencing Analytics Access Control Cybercrime Data Security Big Data BDR Wi-Fi Training Hacker Remote Computing Cost Management Voice over Internet Protocol Compliance Vendor Patch Management Document Management Remote Monitoring Help Desk Save Money Hacking IT Management Employer-Employee Relationship Retail BYOD Alert Money Computing Hiring/Firing Customer Service Vendor Management Unified Threat Management Hard Drive Outlook Firewall Password Mobile Office Applications Augmented Reality Word Managed Services Legal IBM Vulnerabilities Website Project Management Data storage Search... Best Practice Data loss Scam Robot VPN Sports User Social SaaS DDoS Update Data Breach Remote Workers Twitter iPhone Windows 7 Chrome Education Cortana Free Resource Law Enforcement Paperless Office Content Filtering End of Support Antivirus Printer Monitoring Maintenance How To Router Mobile Computing Healthcare Windows 11 Marketing The Internet of Things YouTube Travel Virtual Reality Websites Running Cable Social Engineering Cryptocurrency Meetings Mobility Black Market Storage Laptop Cleaning Google Maps Downtime Politics Settings Cooperation Machine Learning Safety Video Conferencing Virtual Machines Virtual Desktop Solid State Drive HIPAA Experience Computer Repair Virtual Assistant Tech Terms Professional Services Chromebook Managed IT Drones Digital Automobile Disaster Processor Taxes Managed Services Provider How To Virtual Private Network Microchip Flexibility Lithium-ion battery PowerPoint Current Events Physical Security Multi-factor Authentication Administration Identity Theft Solutions Hack Processors Presentation Notifications Unified Communications Specifications Saving Time Integration IT Consultant Images 101 Display Google Docs Start Menu Computer Care Downloads Bluetooth Computers Bitcoin Distributed Denial of Service Customer Relationship Management Co-Managed IT Vulnerability Office Tips Telephone Entertainment Employees Private Cloud Memory Wireless Technology Software as a Service Avoiding Downtime Data Protection eWaste Holidays Excel Motion Sickness Mobile Technology Heating/Cooling Security Cameras Virtual Machine Environment Trends Optimization Google Drive Social Networking Customer Resource management Devices Windows XP Reviews Comparison 2FA Banking Cables Fileless Malware Teamwork Google Wallet Tip of the week Company Culture Troubleshooting Data Storage Messenger Knowledge Hypervisor Deep Learning Corporate Profile Gamification Telephony Telephone System Medical IT Employer Employee Relationship Regulations Shopping Television Paperless Business Metrics Point of Sale Directions SQL Server Hosted Solution Cabling Backup and Disaster Recovery G Suite Desktop PCI DSS Books Licensing Tablet Content Humor Language Shortcuts VoIP Electronic Medical Records Society Tracking Accountants Gig Economy Mouse Business Communications Staffing Internet Service Provider Azure Database Visible Light Communication Web Server Business Owner Regulations Compliance Reading IP Address Managed IT Service Monitors Memes Be Proactive Health IT Windows 8 Digital Payment Equifax SharePoint Human Resources Net Neutrality Worker Tactics Hard Drive Disposal Advertising Financial Data Relocation Displays Access Username IT Work/Life Balance Workplace Strategies Time Management Tech Support Public Cloud Startup Freedom of Information Risk Management Google Apps Recovery Competition Navigation Addiction email scam Mobile Security Inbound Marketing Telework Audit Spyware Communitications Entrepreneur User Tip Microsoft 365 File Sharing Legislation News LiFi Smartwatch In Internet of Things Documents Procurement Hacks Redundancy Application Evernote Network Congestion Network Management FinTech Reliable Computing Writing Cache Business Intelligence IT Assessment Smart Technology Unified Threat Management Proxy Server Workers Emails Electronic Payment Fake News CES Computing Infrastructure Securty Supply Chain Management Value Service Level Agreement Management CCTV Device security Organization Scalability Printing Domains Cyber security Smart Devices Text Messaging Touchscreen Proactive IT Wireless Headphones Microsoft Excel Administrator Phone System Business Cards Remote Working Bring Your Own Device Emergency Tech Going Green Computer Malfunction Vendor Mangement Error AI Trend Micro Electronic Health Records Supply Chain Bookmark Transportation Music Samsung Digital Security Cameras Webcam Piracy Public Speaking Term Wasting Time Uninterrupted Power Supply Download Business Mangement Modem HTML Streaming Media Computer Accessories eCommerce Surveillance Workplace Keyboard Browsers Tablets Nanotechnology Videos Botnet Software License Rental Service Hard Drives Google Play Managing Costs Micrsooft Upload intranet Social Network SSID Supercomputer Google Calendar Flash Media Wireless Development Telephone Systems Scams Virus Shortcut Data Analysis Employer/Employee Relationships Business Growth Screen Reader

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?