Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Shop Safe While Online With These 3 Common-Sense Tactics

Tip of the Week: Shop Safe While Online With These 3 Common-Sense Tactics

It seems that you can find absolutely anything while shopping online, but unfortunately, this also includes cyber threats. No deal is worth the risk of a hacking attack, but some best practices can help you stay safe while searching for that great bargain.

Stick to What You Know
When making an online transaction, well-known websites can safely be considered to be more secure than the smaller, never-heard-of-it sites that a search engine may bring up, or than the opportunities search engines present to buy the item directly from the search. Large retailers, like Amazon, Walmart, and other recognizable brands have a large incentive to protect their customers from financially-motivated cyber crimes like identity theft, and so they are more likely to have considerable capital invested in their customers’ data security. The smaller sites don’t have nearly the resources or the public-opinion-driven incentive, and may even rip you off.

However, be careful that the web address is spelled properly and is using the correct domain in the URL. Hackers will generate these sites to trick their victims into falling for a phishing scam. The “great deal” they just tried to snag may ultimately allow the site to snag their credentials and financial information.

Look for the Padlock
The next time you visit a website that asks for your credit card information, check the URL again, but this time, check to see that it begins with HTTPS. HTTPS signifies that the usual HTTP, or Hypertext Transfer Protocol, has added security (hence the added S) thanks to an added secure sockets layer of encryption. There should also be a padlock icon displayed in your address bar.

These are indications that the site has been encrypted in order to safely process payment information. Sites with just HTTP and without the lock are inherently more susceptible to have their information hijacked during transit, including the information a customer inputs. Naturally, these sites should be avoided.

Be Mindful When Mobile
Many people are known to visit a store only to determine if an item is indeed the one that they want before ordering it online. Be wary if you are connected to a public Wi-Fi when doing your online shopping. Due to their high susceptibility to cyber attack, your activity while connected to these digital minefields should be limited at most, and should never include anything that involves sensitive personal or financial information.

If your online shopping ‘trip’ is informed by these tips, you should be able to remain safe and sound while you make your purchases.

What’s on your wish list this holiday season? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 28 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Smartphone Data Backup Android AI Upgrade Disaster Recovery Data Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Information Holiday Facebook Automation Miscellaneous Cloud Computing Covid-19 Training Gadgets Server Managed Service Provider Remote Work Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Blockchain Bandwidth Windows 10 Virtualization Business Technology Wi-Fi Two-factor Authentication Data Security Mobile Office Vendor Apps Chrome Mobile Device Management BYOD Budget Gmail Apple WiFi App Tip of the week Managed Services Employer-Employee Relationship Voice over Internet Protocol Networking How To BDR Avoiding Downtime Office 365 Marketing HIPAA Applications Access Control Conferencing Computing Information Technology Hacker Analytics Website Office Tips Augmented Reality Router Storage Password Virtual Private Network Bring Your Own Device Health 2FA Help Desk Big Data Operating System Retail Healthcare Risk Management Computers Managed IT Services Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Firewall Physical Security Display Printer The Internet of Things Paperless Office Windows 11 Infrastructure Monitoring Social Going Green Excel Document Management Remote Workers Cybercrime Telephone Scam Customer Service Data loss Data Privacy Virtual Desktop LiFi Wireless Technology Data storage Images 101 Telephone System Multi-Factor Authentication Robot Mobility Outlook Cost Management Money Word Humor IT Management VPN Employees Meetings Sports Integration Mouse User Tip Modem Processor Safety Computer Repair Mobile Security Administration Holidays Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Settings Professional Services Printing Wireless Content Filtering Customer Relationship Management Managed IT Service Maintenance YouTube Antivirus Downloads Cryptocurrency iPhone Licensing Hacking Presentation Entertainment Vulnerabilities Alert Google Wallet Trends Supply Chain Management Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Data Analysis Windows 8 IP Address Star Wars IT Assessment Laptop How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Drones Gamification Flexibility Organization Travel Social Networking Legislation Shortcuts Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Halloween Recovery Ransmoware Wearable Technology Memory Vendors Content Remote Working Hard Drives Health IT Domains Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Unified Threat Management Directions Videos Hacks Assessment Electronic Health Records Scary Stories Permissions Workforce Wasting Time Threats Fun Refrigeration Deep Learning Public Speaking Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Lithium-ion battery Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Entrepreneur Username Education Point of Sale eCommerce Black Friday SSID Mobile Computing Database Surveillance Virtual Assistant Outsource IT Undo Tech Support IT Technicians Virtual Machine Environment Search Media Network Management Proxy Server Reviews Best Practice Cookies Monitors Cyber Monday Medical IT Tactics Development Buisness Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Legal IT solutions Shopping Business Growth Nanotechnology Optimization PowerPoint SharePoint Addiction Application Electronic Medical Records Language Employer/Employee Relationships Outsourcing Chatbots Cortana Navigation Management PCI DSS Lenovo Gig Economy Alt Codes IBM Screen Reader Writing Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Downtime Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Hosted Solution Private Cloud Identity Evernote Paperless Server Management Regulations Compliance Superfish Bookmark Typing Identity Theft Smart Tech Memes Co-managed IT Download Net Neutrality Twitter Alerts SQL Server Technology Care Financial Data Competition Error History Knowledge Business Communications Google Drive Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work 5G Upload Procurement Social Network Telework Unified Communications Cyber security Experience Multi-Factor Security Tech Human Resources Google Docs CES Bitcoin Tablet IoT Communitications Running Cable User Dark Web Cables

Blog Archive