Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Amazon’s Advice on Security Scams is Actually Pretty Great

Amazon’s Advice on Security Scams is Actually Pretty Great

Amazon Prime subscribers were recently sent a communication from the online marketplace detailing popular scams and what can be done to protect against them. While we have our own set of best practices to share, we thought we would take a closer look at Amazon’s advice to see how it squares up against our own.

Amazon’s Recommended Practices

The communication sent out by Amazon focused mostly on services related to Amazon. For example, the communication mentions “Prime membership scams” and “Account suspension/Deletion scams.”

To be more precise, this email issued to Prime members describes what to expect from the various scams. For a Prime membership scam, users might encounter messages claiming further fees must be charged to an account in question, or users might have to log in to dispute charges or provide payment information (which, if you think about it, makes zero sense, right?).

According to the official company email: “Amazon will never ask you to provide payment information for products or services over the phone.” If Amazon ever needs you to take action, they recommend confirming through the official website or application and checking for legitimate communications sent through their secure Message Center.

Suspension and deletion scams are also covered in detail here. Amazon describes these attacks as those delivered via text, email, or phone call which attempt to convince users to log in or provide payment information under duress of a lost or suspended account.

According to Amazon’s communication, “Amazon will never ask you to disclose your password or verify sensitive information over the phone or on any website other than Amazon.com.” Again, they double down on any significant communications being sent directly to their secure Message Center, and they urge users to confirm identities before ever responding to these urgent or out-of-place messages.

Other Relevant Amazon-Related Security Tips

Amazon also offers the following advice for anyone who would like additional security information about their platform:

“1. Trust Amazon-owned channels.
Always go through the Amazon mobile app or website when seeking customer service, tech support, or when looking to make changes to your account.

2. Be wary of false urgency.
Scammers may try to create a sense of urgency to persuade you to do what they're asking. Be wary any time someone tries to convince you that you must act now.

3. Never pay over the phone.
Amazon will never ask you to provide payment information, including gift cards (or “verification cards,” as some scammers call them) for products or services over the phone.

4. Verify links first.
Legitimate Amazon websites contain "amazon.com" or "amazon.com/support." Go directly to our website when seeking help with Amazon devices/services, orders or to make changes to your account.”

Augment These Practices with Our Recommendations

Generally speaking, these practices check out perfectly fine, and they are in line with what we would recommend. However, we would like to provide our own perspectives on these recommendations:

  • If you have any reason to suspect illegitimate communications are afoot, you should use official channels of communication to either confirm or refute your feelings on the message. You should never respond to a message if you have any reason to believe it could be dangerous. We recommend manually finding the supposed sender’s contact information on the company’s website to verify it first, reaching out only through secure secondary methods.
  • If there is any urgent language used in the email, it’s worth being just a hair skeptical of it. Hackers love to use language like this to get users to take action before they think more carefully about it. If the user feels extra pushy in their message, then you should be extra careful.
  • You might make purchases or phone payments here and there, even with legitimate businesses, but no company is ever going to ask you to pay in gift cards.
  • Don’t click on links in any messages you suspect are fraudulent. Go to the website or your account through your normal methods first to see if there is anything to be concerned about.

Need More Info? Learn More with Us

Amazon has some great advice to keep in mind regarding account security, but we would like to also remind you that these types of attacks are not Amazon-exclusive. You can experience phishing attacks from any vector at any time, so be sure to keep your wits about you and your protections in place. They might just save you from a major headache in the future.

Voyage Technology can help your business shore up any potential problems with its security. To learn more, call us today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 31 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Holiday Artificial Intelligence Automation Facebook Miscellaneous Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Blockchain Bandwidth Business Technology Windows 10 Virtualization Wi-Fi Apps Two-factor Authentication Vendor Mobile Office Data Security Managed Services Employer-Employee Relationship BYOD Chrome Budget Tip of the week Mobile Device Management Apple Gmail App Networking WiFi Voice over Internet Protocol Information Technology HIPAA Office 365 Physical Security Applications Hacker Avoiding Downtime Access Control Marketing Conferencing Managed IT Services How To BDR Computing Risk Management Healthcare Router Analytics Computers Office Tips Virtual Private Network Augmented Reality Health Storage Website Password Help Desk Bring Your Own Device Retail 2FA Operating System Big Data Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Free Resource Customer Service Project Management Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Monitoring Document Management Firewall Managed IT Service Windows 11 Telephone Scam Going Green Data loss The Internet of Things Excel Cooperation Cybercrime Social Remote Workers Robot Cryptocurrency Telephone System Cost Management iPhone Customer Relationship Management Virtual Desktop Vulnerabilities Data storage LiFi IT Management Meetings Data Privacy VPN Hacking Outlook Presentation Images 101 Modem User Tip Money Processor Multi-Factor Authentication Computer Repair Mobile Security Mobility Humor Wireless Technology Sports Smart Technology Mouse Employees Integration Word Machine Learning Saving Time Administration Maintenance Holidays Downloads Antivirus Data Storage Safety Licensing Supply Chain Settings Video Conferencing Entertainment Wireless Managed Services Provider Printing Content Filtering Virtual Machines Professional Services YouTube Travel Social Networking SQL Server Technology Care Legislation IBM Net Neutrality Techology Fileless Malware Financial Data Google Maps 5G History Business Communications Google Docs Unified Communications Smartwatch Content Experience IT Wearable Technology Scams Procurement Unified Threat Management Motherboard Azure Hybrid Work Comparison Bitcoin Health IT Running Cable Google Wallet Unified Threat Management Directions Telework Assessment Cyber security Permissions Tech Human Resources Cables Competition CES Communitications Laptop Supply Chain Management Network Congestion Specifications Windows 8 Drones User Error Microchip FinTech Internet Exlporer Fraud Term Google Apps IT Maintenance Username IT Assessment Halloween Flexibility Point of Sale Value Business Intelligence Black Friday User Organization Database Shortcuts Ransmoware Digital Security Cameras Network Management Smart Devices Tech Support IT Technicians Scary Stories Remote Working Cookies Memory Vendors Monitors Cyber Monday IP Address Hacks Proxy Server Tactics Fun Data Breach Hotspot Google Play Be Proactive Workforce Deep Learning Videos Electronic Health Records Websites Mirgation Nanotechnology Wasting Time Threats Recovery SharePoint Hard Drives Education Addiction Trend Micro Electronic Medical Records Language Security Cameras Workplace Strategies Meta Domains Management Software as a Service Chatbots Screen Reader Managing Costs Amazon Writing Distributed Denial of Service Mobile Computing Lenovo Refrigeration Service Level Agreement Search eCommerce Virtual Reality Computing Infrastructure SSID Virtual Assistant Outsource IT Public Speaking Best Practice Server Management Surveillance Private Cloud Identity Superfish Bookmark Buisness Identity Theft Smart Tech Virtual Machine Environment Media Lithium-ion battery Legal IT solutions Reviews Download Entrepreneur Twitter Alerts Medical IT Error Transportation Small Businesses Business Growth Development Browsers Connectivity Hypervisor Displays Social Engineering Break Fix Undo Shopping Upload Cortana Optimization Remote Computing PowerPoint Employer/Employee Relationships Outsourcing Multi-Factor Security Alt Codes Social Network Downtime PCI DSS Tablet IoT Dark Web Navigation Hosted Solution Gig Economy Trends Alert Workplace File Sharing Regulations Teamwork Hiring/Firing Dark Data Google Calendar Typing Managed IT Customer Resource management Internet Service Provider Data Analysis Application Regulations Compliance Star Wars How To Microsoft Excel Evernote Paperless Google Drive Gamification Knowledge Memes Notifications Staff Co-managed IT

Blog Archive