KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

In The Wake Of A Disaster, Beware Of Charity Scams

In The Wake Of A Disaster, Beware Of Charity Scams

Wanting to give donations in the wake of a disaster is admirable. However, with so many regions of the United States having been devastated by a natural disaster in recent weeks, there are dozens of illegitimate charities out there looking to take advantage of your generosity and compassion.

With resources like web pages and applications that allow donations to be collected via electronic payment, it’s easier than ever for fake charities and other bogus relief efforts to look, sound and feel legitimate. Here’s how to make sure that your donations are going to reach those in need.

  • Stick with Charities You Have Known About: There are people that begin purchasing URLs for hurricanes or storms as soon as the list of that season’s storm names are released by the NOAA. When in doubt, choose an organization that you’re familiar with if possible.
  • Evaluate Validity of Organizations: When you are trying to find a worthy charity or cause, you should always double check to make sure that they are who they say they are. These links are for a few websites that evaluate charities for legitimacy: Charity Navigator, Charity Watch, GuideStar, or the Better Business Bureau’s Wise Giving Alliance.
  • Don’t Click on Links: Beware of any unsolicited links or attachments because they might be malware. Hackers love natural disasters because it’s an ideal time to use malware to exploit those in need.

Would you like to donate to a disaster fund? FEMA has a website that tells you how you can volunteer and/or donate responsibly. The National Voluntary Organizations Active in Disaster is also a great resource to find out how you can help without being scammed!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Email Internet Business Computing Cloud malware hackers Google Network Security software Efficiency Data Backup Ransomware Business User Tips Microsoft Mobile Device Management IT Support Managed IT Services Computer Android Productivity IT Support Network Smartphone Small Business Windows Hosted Solutions Business Continuity Data Management Mobile Devices Operating System Windows 10 Money Cloud Computing Facebook Hardware Outsourced IT Unified Communications security cameras Social Media Disaster Recovery Internet of Things Gmail Business Management Passwords End of Support data breach Apple VoIP BDR Encryption Microsoft Office Outlook Antivirus Alert IT Management Phishing Data storage Bandwidth IT Services communications Upgrade Windows 10 security solutions WiFi Server Firewall YouTube IoT Best Practice Productivity Drones History Nextiva Scam Spam Customer Service Communication vulnerability Lunch and Learn Search IBM Data Recovery Innovation Google Maps Managed IT Services Politics Law Enforcement Robot cybersecurity Smartphones App Save Money Start Menu Saving Money SaaS Data Backup Information Technology Automation Artificial Intelligence Events Networking Word Big Data Event Marketing The Internet of Things Local Buzz Apps Google Wallet BYOD South Dakota Hard Drive Legal Vendors Flash Lawyers Virtual Machines IT Strategy Local Technology Monitors Workers Physical Security enterprise productivity software Emergency IoT Devices Business Security How To Sports Internet 101 Hosted Solution Tips and Tricks Community Involvement Collaboration Wireless Technology Settings IT Solutions Risk Creep Administration Sales Tax Displays Communications Samsung face LiFi Business Technology password manager LastPass Printing Time Management Internet Connected Devices Download Society Streaming Media Attorneys IT for Oil Companies Workplace Tips Disaster Laptop Phone System Tablets surveillance cameras Proactive IT Remote Monitoring Visible Light Communication Fast food user confidence Content Filtering Bluetooth Unified Threat Management Quick Tips healthcare Windows 8 Windows XP Managed Services Risk Management Office Tips Tablet Hardware as a Service Trend Micro Music Website Managed IT Compliance Safety AtomBombing tool Tech Support Kaseya Government Knowledge SOX Writing HaaS Google Play Store Advertising LastPass Browser Business Comunications appointment Press Release Information Security Printer Virtual Desktop communication device VPN Kaseya Connect Virtual Reality Tech Terms Sarbanes-Oxley Act Vendor Mangement Black Market Computer Care Touchscreen Office 365 Digital Email Security Document Management Webcam business owner Conference Access Control End User Testing botnet attack Retail Business Mangement Running Cable camera Chamber of Commerce Cryptocurrency Memory Websites Uninterrupted Power Supply Penetration Testing Microsoft Bookings Access Remote Computing communication solutions Patch Management News vulnerabilities Data Security botnet Cabling macbook Business Growth Cleaning Virtualization Hack identity theft Software as a Service Data Protection Network Congestion Phishing Scams booking process Deep Learning Spyware Hacking Redundancy Dell ’s Sonicwall Global Management System Audit DDoS attacks Microsoft Office 365 Google Drive Update Event media experience Virus Corporate Profile IT Consultation Solid State Drive Office Analytics Project Management Programming Social Password Maintenance Microsoft Office 365 features Telephony Worker DDoS Rebrand Mixer information Law IT Cloud Backup security precautions Gadgets Google Docs IT Assessment Vendor Management Cache File Sharing Education Managed Service Provider Rapid City Fortinet Experience VoIP Web Servers Applications security solution Users Unified Threat Management Phone Systen Notifications Documents Social Engineering Business Metrics end-of-support date holiday season CCTV Text Messaging PDF Rental Service Chromebook IT service Web Server UTM Computing Flexibility CrashOverride holidays Downloads Meetings Cortana Mobility Ordinary Computers Threat management Language Reliable Computing scammers Emails Twitter Tracking quantum computers Distributed Denial of Service Miscellaneous Scalability Marketing scams G Suite Supercomputer Processors Computer Malfunction Travel Employer-Employee Relationship Telephone Systems Sync Messenger IT Consultant Microchip network security professionals Private Cloud Health Banking In Internet of Things Books Training Playbook Motion Sickness Budget 3D Printing Reading Employer Employee Relationship Machine Learning Digital Payment Hiring/Firing breach methods Cost Management Bring Your Own Device Administrator Relocation Public Cloud Hacker Taxes Work/Life Balance base infrastructure Hacks Paperless Office Wi-Fi Automobile collaboration capabilities Holiday