Stay safer when you shop online (part 2 of 3)

Last week we gave you three tips to help protect yourself when you shop online. Here are three more tips to help keep cybercriminals from ruining your holiday.

Never make online financial transactions on a public or shared computer. Public computers in libraries, internet cafés and copy shops are convenient, but not always safe. It’s fine to use them to browse for gifts, but make sure you use a secure computer whenever you enter your credit card information.

More information about using a public computer.

Give only enough information to make the purchase. Be wary if a merchant asks for additional information like bank account information, social security number, or other personal information. You could be on a fraudulent site.

More information about email and web scams.

Protect your credit card online. You don’t have to limit your shopping to the most popular retailers to stay safe online. You can use a third-party payment service like PayPal to shield your credit card number from online merchants.

More information about third-party payment services.

How do you protect yourself when you shop online? Let us know in the comment section below.

About the Author
Eve Blakemore

Group Manager, Trustworthy Computing

Eve Blakemore is a Group Manager for Trustworthy Computing who delivers consumer guidance around the latest trends in security and privacy. Eve joined Microsoft in 1998 and has worked in corporate and field roles with Microsoft Learning, US Public Sector, Read more »

Join the conversation

  1. Anonymous

    I never shop online with anything but a reloadable credit card because I can control the amount that's on it and because it is not connected to my savings or checking accounts.  At least if someone gets the number, they can only access the amount of money that I have loaded on it.

  2. Anonymous

    use a dedicated credit card with a low credit limit.  Easy to spot fraudulent use on the statement and even if there is, it can't exceed the credit limit without being exposed to security.

Comments are closed.