Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Amazon’s Advice on Security Scams is Actually Pretty Great

Amazon’s Advice on Security Scams is Actually Pretty Great

Amazon Prime subscribers were recently sent a communication from the online marketplace detailing popular scams and what can be done to protect against them. While we have our own set of best practices to share, we thought we would take a closer look at Amazon’s advice to see how it squares up against our own.

Amazon’s Recommended Practices

The communication sent out by Amazon focused mostly on services related to Amazon. For example, the communication mentions “Prime membership scams” and “Account suspension/Deletion scams.”

To be more precise, this email issued to Prime members describes what to expect from the various scams. For a Prime membership scam, users might encounter messages claiming further fees must be charged to an account in question, or users might have to log in to dispute charges or provide payment information (which, if you think about it, makes zero sense, right?).

According to the official company email: “Amazon will never ask you to provide payment information for products or services over the phone.” If Amazon ever needs you to take action, they recommend confirming through the official website or application and checking for legitimate communications sent through their secure Message Center.

Suspension and deletion scams are also covered in detail here. Amazon describes these attacks as those delivered via text, email, or phone call which attempt to convince users to log in or provide payment information under duress of a lost or suspended account.

According to Amazon’s communication, “Amazon will never ask you to disclose your password or verify sensitive information over the phone or on any website other than Amazon.com.” Again, they double down on any significant communications being sent directly to their secure Message Center, and they urge users to confirm identities before ever responding to these urgent or out-of-place messages.

Other Relevant Amazon-Related Security Tips

Amazon also offers the following advice for anyone who would like additional security information about their platform:

“1. Trust Amazon-owned channels.
Always go through the Amazon mobile app or website when seeking customer service, tech support, or when looking to make changes to your account.

2. Be wary of false urgency.
Scammers may try to create a sense of urgency to persuade you to do what they're asking. Be wary any time someone tries to convince you that you must act now.

3. Never pay over the phone.
Amazon will never ask you to provide payment information, including gift cards (or “verification cards,” as some scammers call them) for products or services over the phone.

4. Verify links first.
Legitimate Amazon websites contain "amazon.com" or "amazon.com/support." Go directly to our website when seeking help with Amazon devices/services, orders or to make changes to your account.”

Augment These Practices with Our Recommendations

Generally speaking, these practices check out perfectly fine, and they are in line with what we would recommend. However, we would like to provide our own perspectives on these recommendations:

  • If you have any reason to suspect illegitimate communications are afoot, you should use official channels of communication to either confirm or refute your feelings on the message. You should never respond to a message if you have any reason to believe it could be dangerous. We recommend manually finding the supposed sender’s contact information on the company’s website to verify it first, reaching out only through secure secondary methods.
  • If there is any urgent language used in the email, it’s worth being just a hair skeptical of it. Hackers love to use language like this to get users to take action before they think more carefully about it. If the user feels extra pushy in their message, then you should be extra careful.
  • You might make purchases or phone payments here and there, even with legitimate businesses, but no company is ever going to ask you to pay in gift cards.
  • Don’t click on links in any messages you suspect are fraudulent. Go to the website or your account through your normal methods first to see if there is anything to be concerned about.

Need More Info? Learn More with Us

Amazon has some great advice to keep in mind regarding account security, but we would like to also remind you that these types of attacks are not Amazon-exclusive. You can experience phishing attacks from any vector at any time, so be sure to keep your wits about you and your protections in place. They might just save you from a major headache in the future.

Voyage Technology can help your business shore up any potential problems with its security. To learn more, call us today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 30 December 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Hackers Innovation Cloud Network Security Internet Hardware Efficiency IT Support User Tips Malware Privacy Email Phishing Workplace Tips Google Computer IT Services Collaboration Users Mobile Device Hosted Solutions Quick Tips Ransomware Cybersecurity Microsoft Workplace Strategy Small Business Data Backup Communication Smartphone Android Saving Money Business Management Smartphones VoIP communications Mobile Devices Passwords Backup Data Recovery Managed IT Services Managed Service Social Media Microsoft Office Upgrade Browser Disaster Recovery Network Tech Term Internet of Things Remote Automation Facebook Artificial Intelligence Cloud Computing Covid-19 Server Managed Service Provider Windows Miscellaneous Gadgets Remote Work Productivity Information Outsourced IT Current Events Encryption Holiday Spam Employee/Employer Relationship Windows 10 AI Government Office Compliance Data Management Business Continuity Wi-Fi Training Windows 10 Business Technology Blockchain Virtualization Bandwidth Data Security Mobile Office Two-factor Authentication Apps App Managed Services Voice over Internet Protocol Mobile Device Management Gmail Chrome Budget Vendor Employer-Employee Relationship Apple Networking BDR Hacker Avoiding Downtime BYOD Computing Conferencing Information Technology Access Control Office 365 Tip of the week WiFi Applications How To Computers Help Desk Operating System Website Marketing Virtual Private Network Risk Management Healthcare Health Office Tips Analytics Augmented Reality Retail Big Data Storage Password HIPAA Router Bring Your Own Device Managed IT Services Customer Service Going Green Patch Management Monitoring Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Remote Workers Telephone Display Printer Firewall Windows 11 Paperless Office Infrastructure Cooperation Free Resource 2FA Project Management Windows 7 IT Support Excel Document Management The Internet of Things Microsoft 365 Solutions Social Scam Data loss Holidays Hacking Data Storage Robot Presentation Smart Technology Settings Video Conferencing Printing Wireless Managed Services Provider Wireless Technology Professional Services Saving Time Content Filtering Virtual Machines IT Management VPN YouTube Meetings Managed IT Service Physical Security Cryptocurrency Word Downloads iPhone Computer Repair Licensing Virtual Desktop Vulnerabilities Data storage LiFi Entertainment Supply Chain Safety Outlook Images 101 Machine Learning Mobility Money Telephone System Multi-Factor Authentication Cost Management Humor Maintenance Antivirus Sports Mouse Employees Integration Customer Relationship Management Administration User Tip Modem Mobile Security Data Privacy Processor Cyber Monday Medical IT IT Maintenance Legal IT solutions Proxy Server Reviews How To Cookies Notifications Tactics Development Hotspot Transportation Business Intelligence Business Growth Shortcuts Travel Mirgation Hypervisor PowerPoint User Ransmoware Techology Google Maps Shopping Cortana Nanotechnology Optimization Addiction Language Employer/Employee Relationships Vendors Alt Codes Be Proactive Downtime Unified Threat Management Management PCI DSS Chatbots Navigation IP Address Distributed Denial of Service Workforce Unified Threat Management Hosted Solution Gig Economy Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Threats Typing Workplace Strategies Regulations Compliance Network Congestion Identity Evernote Recovery Meta Google Drive User Error Bookmark Knowledge Smart Tech Memes Download Net Neutrality Alerts SQL Server Hard Drives Amazon Point of Sale Financial Data 5G History Domains Connectivity IT Break Fix Outsource IT Google Docs Unified Communications Browsers Smartwatch Experience Bitcoin Network Management Running Cable Tech Support Upload Procurement Azure Refrigeration Environment Media Multi-Factor Security Tech Google Wallet Social Network Telework Monitors Cyber security Public Speaking IoT Communitications Lithium-ion battery Dark Web Small Businesses CES Windows 8 Laptop Websites Trends Supply Chain Management Displays Entrepreneur Google Calendar Term Drones Customer Resource management FinTech Regulations Electronic Medical Records Star Wars IT Assessment Microsoft Excel Outsourcing SharePoint Data Analysis Halloween Gamification Flexibility Staff Value Undo Legislation Workplace Lenovo Organization Writing Social Networking Virtual Reality Smart Devices Hiring/Firing Fileless Malware Digital Security Cameras Hacks Server Management Scary Stories Private Cloud Content Remote Working Wearable Technology Memory Paperless Comparison Google Play Co-managed IT Superfish Identity Theft Health IT Fun Motherboard Data Breach Twitter Assessment Electronic Health Records Permissions Application Technology Care Deep Learning Directions Videos Business Communications Error Wasting Time IBM Specifications Security Cameras Scams Education Social Engineering Trend Micro Remote Computing Internet Exlporer Software as a Service Fraud Hybrid Work Microchip Human Resources Mobile Computing Username Managing Costs Black Friday SSID Cables Tablet Search eCommerce Alert Database Surveillance Virtual Assistant Best Practice Google Apps Managed IT Buisness File Sharing Dark Data IT Technicians Virtual Machine Competition

Blog Archive