Security Information |
|
Top 10 tips for Safe Internet Shopping
Over 5 billion pounds was spent on online shopping in 2004. The Internet was the fastest growing retail sector last year, attracting one in four shoppers. The growth rate for the online market was 27.4 per cent, six times better than for the traditional retail market. This looks set to rise as more and more people look for more convenient ways of shopping. It's easy to search for a product and then purchase it - all at the click of a button and from the comfort of your home. You have a fun time shopping, browsing, reading and gathering information about products, and you don't have to take time out from your busy schedule to fight traffic, crowds and queues to buy the perfect gift for your recipient. But how can you ensure you are shopping safely? Brad Bagherian, Managing Director, at Elaborations Ltd, a web design company in Amersham, has put together the following tips for safe surfing: 1. Take your time Take your time when purchasing online since high pressure sales tactics, just like in the real world, often indicate possible frauds. Ensure the site is easy to use, designed well and looks professional. An amateur's site will often look cluttered. If you are in doubt, stop the transaction. You can stop the transaction anytime before pressing the Pay and / or Confirm button that sends your order off to the business. 2. Look for Contact Details You may think all online shops will have their contact details on their website. You might be surprised to find that some do not provide their details, no email address and no phone number. This is a sure red flag. Reputable online shops will always provide concise contact information, this includes a physical address and a phone number. If you are suspicious trust your gut feelings. Do not buy online if you are unsure that the shop is real. 3. Consider all costs before purchasing Shop around and compare prices before buying. When you calculate the cost of a product make sure that you take into account of the delivery charge and the VAT - these are often not included in the overall price. Also make sure what you're buying is not subject to any import restrictions. 4. Check the Returns Policy Most reputable online shops offer strong guarantees and stand behind their products. Check the Returns Policy before you proceed to the checkout. Things you should take particular note of are; what happens if the goods are damaged or faulty, who should pay the postage costs for the return of an unwanted item and how many days you have to return an unwanted item. Online shopping surpasses the physical shops in convenience, but there is a disadvantage of being unable to physically touch the products, so the greater the refund policy period the better. If there is no refund policy, the best advice is to stay away. Plus don't forget that under the Distance Selling Regulations, you do have a seven-day-cooling-off period in case you change your mind. For further information on Distance Selling Regulations see http://www.dti.gov.uk/ccp/topics1/ecomm.htm 5. Check Delivery Options Find out when they will be delivering and whether you can choose the delivery date and time. Make sure the address you provide for delivery will have someone available who can sign for the package when it arrives. Various delivery options may incur extra costs. For example, faster delivery, registered post and weekend delivery may cost extra. So if you don't want to be surprised when checking out, make sure you find out what their delivery terms are like. 6. Protect your Personal Information Avoid giving out personal information that is not strictly necessary for a successful purchase. Check the companies Privacy Policy (which is usually located at the bottom of the website) which tells you what they intend to do with your information. They should maintain your personal details in the strictest privacy and confidentiality according to the 1998 Data Protection Act. 7. Ensure the Transaction is Secure Check whether the website complies with the industry's security standards (SSL) which help prevent fraud and protect you by encrypting the personal information you send over the Internet during the transaction. This encryption means that a hacker will not be able to steal your credit card and personal information. You must ensure the following two measures are in place before you complete any transaction on the Internet Ensure a padlock image is present on the bottom right hand side of your browser Ensure the web address begins with "https" 8. Pay by Credit Card This will give you added protection because your credit card issuer becomes jointly responsible for the goods that you buy. So if there is a problem that the company won't resolve, the credit card company will assist you. While the problem is being investigated, you would not need to pay the credit card charge and if the company still doesn't deliver or they are a scam, you're in a much better position to claim your money back. 9. Keep a record of everything Once you have made an online purchase, you will receive an email confirmation and an order reference number. Print these out and keep a note of any reference numbers provided during the transaction. It would also be useful to print out the details of the product or service you ordered. If there was a special offer on at the time, print out the web page with the offer on it. This will include vital information such as the web address, date and time it was printed. If you can not print out the information, then save the page in a folder on your PC for reference. These may be relevant if a dispute arises. 10. Know Your Rights Online consumers have exactly the same rights as offline consumers. The goods should fit the product description and be as satisfactory as described online. If something goes wrong with your purchase, there are actions you can take with the shop, and your bank to fix the problem. For further information take a look at the Office of Fair Trading website. Brad Bagherian, Managing Director, at Elaborations Ltd comments: "As long as you have these tips in mind, you can shop on the Internet with your mind at ease. Most online shops and companies provide excellent value and discount prices because they do not have to cover the overheads of a physical business that will cost them insurance, employee pay, taxes and more. It's no surprise then that we are finding more and more businesses are taking their products and services to the web by setting up ecommerce sites." Brad Bagherian is the founder and MD of elaborations Ltd (http://www.elaborations.co.uk). elaborations is a London based Design Company specialising in website design and development, graphic design and Internet marketing.
MORE RESOURCES: Opinion | Banning TikTok Won’t Solve Your Data-Security Problem The Wall Street Journal He’s a Security Guard at the Met. Now His Work Is Showing There. The New York Times Why does Trump want Greenland and the Panama Canal so badly? One reason may surprise you - USA TODAY Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data ABC News Remarks at a UN Security Council Briefing on Nonproliferation and the Democratic People’s Republic of Korea United States Mission to the United Nations Sweet Security Partners with Illustria to Offer Proactive Open-Source Supply Chain Risk Management GlobeNewswire Krebs on Security – In-depth security news and investigation Krebs on Security One week later: New Orleans debates security, memorial grows, more chemicals found FOX 8 Local First New in 2025: Counties Should Prepare Now for the Upcoming HIPAA Security Rule Update National Association of Counties Special ops forces seek to manage digital footprints, achieve ‘security through obscurity’ DefenseScoop Pope to celebrate Jubilees for Communications, security forces Vatican News - English White House program to certify the security of IoT devices goes live Cybersecurity Dive U.S. citizen denied entry into Poland after security staff object to handwritten notes in passport ABC News Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations Stowaways on planes and inside landing gear raise worries about aviation security The Associated Press Brillion Achieves SOC 2 Type 2 Compliance, Reinforcing Commitment to Data Security and Privacy Business Wire Opinion | Biden’s ‘security’ concern about TikTok and U.S. Steel is doubly specious The Washington Post New Orleans Homeland Security criticized during terror attack probe WDSU New Orleans Border security is national security Foundation for Defense of Democracies Tidal Cyber Acquires Zero-Shot Security to Enhance Threat Intelligence Mapping Capabilities Business Wire The Rio Treaty's Security Pact and Unintended Consequences of Threatening Canada, Greenland, and Panama Just Security Swimlane Hero helps solve complex security operations problems Help Net Security Security guard catches DJ molesting 12-year-old boy at California mall, officials say Sacramento Bee UN aviation agency confirms recruitment database security breach BleepingComputer Who is Acronis’ New Chief Information Security Officer? Cyber Magazine AITX's RAD-R Welcomes Steve Danelon as President, Strengthening Leadership for Residential Security Solutions GlobeNewswire Fort Smith Public Schools to integrate AI gun detection software in security cameras Northwest Arkansas Democrat-Gazette Orange Bowl pep rally security includes surveillance cams, law enforcement on the ground - CBS Miami Security Industry Association Welcomes New Perimeter Security Subcommittee Leaders Security Sales & Integration BreachLock Unveils Unified Security Testing Platform for PTaaS, ASM, Continuous Pentesting, and Red Teaming PR Newswire Update on former Vigo County Security Annex demolition MyWabashValley.com Alois Brunner, the Nazi ‘butcher’ who trained Syrian security Al Jazeera English Marine Corps bases take increased security posture The Island News – Beaufort, SC When It Comes to Security, Europe Is Whistling Past the Graveyard World Politics Review Synology Launches ActiveProtect: Simplifying Enterprise Data Protection with Unmatched Security, and Scalability Business Wire Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data The Associated Press Security and Sanctions in Post-Assad Syria The National Interest Online Security consultant denied profiteering in defamation case against CNN WMBB - mypanhandle.com 2025 Security Industry Predictions: Jon Adams, Vice President of Sales, DMP Security Sales & Integration Eric Trager tapped for Mideast slot on Trump’s National Security Council The Times of Israel Can Washington handle two weeks of high-security pomp along with a heavy burst of snow? The Associated Press Washington Township Police to launch security risk assessment program for businesses Bellefontaine Examiner New Orleans hires consultant to review security after Bourbon Street attack. See who has the job. NOLA.com New Orleans attack prompts tighter security in D.C. ahead of inauguration, Carter funeral The Chicago Cusader Newark Airport makes list of Top 10 craziest security catches New Jersey 101.5 FM Base steps up security measures following terrorist attacks Mountain Home News |
RELATED ARTICLES
How To Give Away Your Personal Information Identity Theft and Your Personal Information--------------------------------------------Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. With the Rise of Internet Crimes, Users are Turning to High-Tech "PI's" for Solutions High-tech private investigators are becoming the answer for many Internet users who have been victimized online. The use of e-mail by that unethical element lurking in cyberspace rings all too common these days. Click Here To Defeat Evil Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:"A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it. Types Of Computer Infections Computer infections can be broken up into 4 main categories which are explained in detail below:VirusesComputer Viruses are small pieces of software that attach themselves to real programs. An example would be a virus that attaches itself onto windows explorer. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. Instant Messaging - Expressway for Identity Theft, Trojan Horses, Viruses, and Worms Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line.John Sakoda of IMlogic CTO and Vice President of Products stated that,"IM viruses and worms are growing exponentially. Spyware Programs Are Out To Get You! The average computer is packed with hidden software that can secretly spy on online habits.The US net provider EarthLink said it uncovered an average of 28 spyware programs on each PC scanned during the first three months of the year. How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer If you use the internet, you have probably been infected with a virus, trojan or spyware. According to the SANS Internet Storm Center, the average unprotected PC is infected within 20 minutes of normal internet usage. 3 Pervasive Phishing Scams Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. Spyware Attacks! Windows Safe Mode is No Longer Safe Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware. Password Security and Safety There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment. Dont Get Hacked - A Guide to Protecting Your Business from Thieves You've seen it in the news - 40 million credit cards exposed!With all the news about web sites being hacked and cyberthieves stealing credit card numbers and other personal data,it's no wonder that some shoppers are still hesitant to providepayment information online. You don't have to be. Eliminate Adware and Spyware Everyone should eliminate spyware and adware from your hard drive for your computer privacy protection. Spyware and adware programs also slow down the speed of your computer by cluttering your hard drive with annoying programs. How To Prevent Spyware Attacking Your Computer Spyware is software or hardware installed on a computerwithout a user's knowledge. It gathers information andreports it back to its source. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. Blogs as Safe Haven for Cybercriminals? To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms.. Identity Theft - Dont Blame The Internet Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries. How To Be Your Own Secret Service Agency So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. Reporting Internet Scams When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams. |
home | site map |
© 2006 |