Watch out for E-Skimming Schemes this Holiday Season


October 24, 2019

The silly season is almost upon us. Mobs of people will soon line up for the chance to fight each other to the death, all for the season’s hottest item at your local big-box retailer.

We live a charmed life, no?

Okay, okay, I kid. If you’re anything like me the thought of shopping at a physical retail store makes you sick to your stomach. God bless the internet and online shopping, right? You can shop from the comfort of your own home and not worry about being crushed!

Online shopping might not be all it’s cracked up to be. Especially now, hackers are using e-skimming to snoop near online shopping carts to steal credit and debit card information.

The FBI released a statement on Tuesday warning small and medium-sized businesses and government agencies that take credit card payments online to watch out for e-skimming schemes this holiday season.

E-skimming is when cyber criminals inject malicious code onto a website, giving them access to sensitive and valuable PCI information. Hackers can use a variety of tricks to get in, but phishing and going through a trusted third-party vendor seem to be the most popular.

The FBI recommends the following:

  • Update and patch all systems with the latest security software. Anti-virus and anti-malware need to be up-to-date and firewalls strong
  • Change default login credentials on all systems
  • Educate employees about safe cyber practices. Most importantly, do not click on links or unexpected attachments in the message
  • Segregate and segment network systems to limit how easily cybercriminals can move from one system to another

All great advice.

Like our blog? Subscribe using the CTA in the upper right-hand corner of this page. Feel like sharing your thoughts with us? Use the comment section below.

Don’t forget to follow us on LinkedIn and Twitter


Carl Keyser is the Content Manager at Integris.

Keep reading

Strong Cybersecurity Postures: How to Unleash their Power

Strong Cybersecurity Postures: How to Unleash their Power

In the vast digital landscape where virtual dragons and sneaky trolls roam a strong cybersecurity posture has never been more important. Imagine a band of modern-day knights led by our protagonist, Alex. Armed with a trusty laptop and a cup of coffee, Alex navigates...

How to Spot a Phishing Attack in 2023

How to Spot a Phishing Attack in 2023

In 2023 cyber threats lurk behind every tree trunk in today's digital jungle, and cybersecurity awareness is more critical than ever. Among the craftiest of these threats are phishing attacks. Phishing attacks are cunningly engineered with social manipulation at their...

How to Choose an IT Consultant in Boulder, CO

Regardless of industry size or type, Boulder IT consultants play a massive role in the way companies in the Boulder area do business. While most companies may have their own in-house IT department, many of these departments are small and cannot handle all the...