Holiday Online Safety Tips

The holiday shopping season is a prime opportunity for bad actors to take advantage of unsuspecting shoppers through fake websites, malicious links, and even fake charities. Their goal is simple: get your personal and financial information to compromise your data, deploy malicious software, steal your identity, and take your money. But with some simple actions, you can stay safe while you shop and plan for the holidays online.

 

We are sharing the following information from the Cybersecurity and Infrastructure Security Agency (CISA) to help you stay safe online this holiday season. 

IconDescription automatically generatedCheck your devices: Before making any online purchases, make sure the device you’re using to shop online is up-to-date. Next, take a look at your accounts and ask, do they each have strong passwords? And even better, if multi-factor authentication is available, are you using it? Multi-factor authentication (or two-factor authentication), uses multiple pieces of information to verify your identity. Even if an attacker obtains your password, they may not be able to access your account if it’s protected by this multiple step verification process.

IconDescription automatically generatedShop through trusted sources: Think about how you’re searching online. How are you finding the deals? Are you clicking on links in emails or ensuring you’re on the correct vendor’s website? Are you clicking on ads on webpages? You wouldn’t go into a store with boarded up windows and without signage – the same rules apply online. If it looks suspicious, something’s probably not right.

IconDescription automatically generatedUse safe methods for purchasing: If you’re going to make that purchase, what information are you handing over? Make sure you understand how your information will be stored and used.

Visit CISA.gov/shop-safely for more tips on how to have a safe and successful online shopping experience this holiday season. 

 

Always report any suspicious activity on your work device to the Technology Department.  We have a protocol in place to secure and investigate any threat that is reported. 

 

Tip 1Tip 2Tip 3