KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

In The Wake Of A Disaster, Beware Of Charity Scams

In The Wake Of A Disaster, Beware Of Charity Scams

Wanting to give donations in the wake of a disaster is admirable. However, with so many regions of the United States having been devastated by a natural disaster in recent weeks, there are dozens of illegitimate charities out there looking to take advantage of your generosity and compassion.

With resources like web pages and applications that allow donations to be collected via electronic payment, it’s easier than ever for fake charities and other bogus relief efforts to look, sound and feel legitimate. Here’s how to make sure that your donations are going to reach those in need.

  • Stick with Charities You Have Known About: There are people that begin purchasing URLs for hurricanes or storms as soon as the list of that season’s storm names are released by the NOAA. When in doubt, choose an organization that you’re familiar with if possible.
  • Evaluate Validity of Organizations: When you are trying to find a worthy charity or cause, you should always double check to make sure that they are who they say they are. These links are for a few websites that evaluate charities for legitimacy: Charity Navigator, Charity Watch, GuideStar, or the Better Business Bureau’s Wise Giving Alliance.
  • Don’t Click on Links: Beware of any unsolicited links or attachments because they might be malware. Hackers love natural disasters because it’s an ideal time to use malware to exploit those in need.

Would you like to donate to a disaster fund? FEMA has a website that tells you how you can volunteer and/or donate responsibly. The National Voluntary Organizations Active in Disaster is also a great resource to find out how you can help without being scammed!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 16 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices hackers Privacy Technology Email Internet malware Business Computing Cloud Google Network Security software Ransomware User Tips Efficiency Business Backup Data Microsoft Computer IT Support Mobile Device Management cybersecurity IT Support VoIP Network Gmail Money Android Facebook Hardware Smartphone Managed IT Services Small Business Windows Hosted Solutions Productivity Data Management Cloud Computing Operating System IT Management Business Continuity Mobile Devices Artificial Intelligence Phishing Microsoft Office communications Windows 10 Windows 10 Outlook Unified Communications Social Media IT Services Internet of Things Antivirus Data storage Passwords Communication Update Upgrade security cameras Business Management Encryption Disaster Recovery Outsourced IT Alert End of Support data breach Apple Bandwidth Smartphones Nextiva BDR Scam WiFi Lunch and Learn Data Recovery YouTube Start Menu Automation Best Practice Hard Drive Cost Management News Data Backup security solutions Events Access Control Google Wallet Word Spam Firewall Patch Management Event Marketing Google Docs Local Buzz Legal Productivity Browser South Dakota Save Money Project Management Analytics Document Management SaaS Saving Money Drones Information Technology Collaboration History Politics IoT Networking Server App vulnerability Remote Monitoring Office 365 Big Data The Internet of Things Innovation Apps Customer Service Managed IT Services Law Enforcement BYOD Search Gadgets IBM Robot Google Maps Hardware as a Service business owner Retail Google Calendar Kaseya Connect DDoS attacks Information Security Sports Computer Care Memory Event Sarbanes-Oxley Act Wireless Technology Knowledge Solid State Drive HaaS communication solutions Business Growth Business Communications LiFi Conference Business Comunications Email Security vulnerabilities DDoS Running Cable Virtualization security precautions Press Release Chamber of Commerce identity theft Mixer Network Congestion End User Testing VPN Society Tech Terms Streaming Media Uninterrupted Power Supply Vendor Mangement Deep Learning Microsoft Office 365 Comparison Visible Light Communication Touchscreen Dell ’s Sonicwall Global Management System Cabling Digital media experience Vendors Windows 8 Windows XP Data Protection Business Mangement Office Password Social Engineering Penetration Testing Microsoft Office 365 features Specifications Website How To Websites Compliance Access information Community Involvement Vendor Management Tech Support Data Security Corporate Profile face Phishing Scams Television Advertising Programming Software as a Service Redundancy Worker Spyware Rebrand Flash Download Monitors Printer Audit Virtual Desktop Cloud Backup Google Drive enterprise productivity software surveillance cameras File Sharing IT Consultation Hosted Solution Mouse Rapid City Content Filtering Virus Web Servers Applications Settings healthcare Displays Maintenance Virtual Machines Telephony Local Technology Trend Micro Workers password manager LastPass AtomBombing IT Assessment Physical Security SharePoint IoT Devices Managed IT Law IT Cryptocurrency Distributed Denial of Service Managed Service Provider Internet 101 Cache Tips and Tricks tool Workplace Tips Proactive IT Fortinet Risk Creep VoIP Sales Tax Fast food Google Play Store Samsung user confidence IT Strategy Bluetooth appointment Quick Tips IT Security Lawyers Cleaning Emergency Internet Connected Devices Office Tips Music Hacking Business Security IT for Oil Companies Tablets Administration Safety Freedom of Information Laptop IT Solutions Webcam Business Technology Communications Writing Printing Risk Management botnet attack Time Management Mobility Government camera LastPass Microsoft Bookings Fake News Social Tablet Attorneys Disaster Budget Phone System communication device Remote Computing Black Market Downloads Education Kaseya botnet Unified Threat Management Virtual Reality macbook Experience booking process Microsoft Excel SOX Hack Managed Services Machine Learning Users Supercomputer Hiring/Firing Health Bring Your Own Device Banking Relocation Administrator IT Consultant Hacker network security professionals 3D Printing base infrastructure Training Hacks Playbook Automobile Holiday security solution Unified Threat Management Employer Employee Relationship Work/Life Balance Notifications breach methods Business Metrics Digital Payment end-of-support date holiday season Marketing Public Cloud Wi-Fi Rental Service Taxes collaboration capabilities Chromebook UTM Flexibility holidays Paperless Office Documents Cortana Threat management Reliable Computing scammers Text Messaging PDF Twitter Scalability Computing scams CCTV G Suite Computer Malfunction Travel Phone Systen Language Processors Web Server Employer-Employee Relationship IT service Messenger Sync Private Cloud Meetings Miscellaneous Microchip Ordinary Computers Books CrashOverride Emails In Internet of Things Motion Sickness quantum computers Tracking Telephone Systems Reading