Error
  • Failed deleting aa4401fb28816baa7e580bba383dbef7-cache-_system-aa3a7524db33eeb8d3f017dae52aeb10.php
  • Failed deleting index.html
  • Failed deleting index.html
  • Failed deleting aa4401fb28816baa7e580bba383dbef7-cache-com_templates-b55299c8c1e497551e1430e4f3b9ed73.php
  • Failed deleting aa4401fb28816baa7e580bba383dbef7-cache-mod_breadcrumbs-d9bfc2558034d8a663dc2706965e5efc.php
  • Failed deleting aa4401fb28816baa7e580bba383dbef7-cache-mod_custom-6a99481d7b6dd3acb853be579ae98e83.php
  • Failed deleting aa4401fb28816baa7e580bba383dbef7-cache-mod_roksprocket-5382816d94b51d06f970b036c9df3ebb.php
  • Failed deleting qr8481706b4e9ff7830f79aecc9f2c9dea.png
  • Failed deleting qr929eadd3bf9b9af3d1e753c7503a29bc.png
  • Failed deleting qra0645a16403fd862438741505e72ebaf.png

Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Amazon’s Advice on Security Scams is Actually Pretty Great

Amazon’s Advice on Security Scams is Actually Pretty Great

Amazon Prime subscribers were recently sent a communication from the online marketplace detailing popular scams and what can be done to protect against them. While we have our own set of best practices to share, we thought we would take a closer look at Amazon’s advice to see how it squares up against our own.

Amazon’s Recommended Practices

The communication sent out by Amazon focused mostly on services related to Amazon. For example, the communication mentions “Prime membership scams” and “Account suspension/Deletion scams.”

To be more precise, this email issued to Prime members describes what to expect from the various scams. For a Prime membership scam, users might encounter messages claiming further fees must be charged to an account in question, or users might have to log in to dispute charges or provide payment information (which, if you think about it, makes zero sense, right?).

According to the official company email: “Amazon will never ask you to provide payment information for products or services over the phone.” If Amazon ever needs you to take action, they recommend confirming through the official website or application and checking for legitimate communications sent through their secure Message Center.

Suspension and deletion scams are also covered in detail here. Amazon describes these attacks as those delivered via text, email, or phone call which attempt to convince users to log in or provide payment information under duress of a lost or suspended account.

According to Amazon’s communication, “Amazon will never ask you to disclose your password or verify sensitive information over the phone or on any website other than Amazon.com.” Again, they double down on any significant communications being sent directly to their secure Message Center, and they urge users to confirm identities before ever responding to these urgent or out-of-place messages.

Other Relevant Amazon-Related Security Tips

Amazon also offers the following advice for anyone who would like additional security information about their platform:

“1. Trust Amazon-owned channels.
Always go through the Amazon mobile app or website when seeking customer service, tech support, or when looking to make changes to your account.

2. Be wary of false urgency.
Scammers may try to create a sense of urgency to persuade you to do what they're asking. Be wary any time someone tries to convince you that you must act now.

3. Never pay over the phone.
Amazon will never ask you to provide payment information, including gift cards (or “verification cards,” as some scammers call them) for products or services over the phone.

4. Verify links first.
Legitimate Amazon websites contain "amazon.com" or "amazon.com/support." Go directly to our website when seeking help with Amazon devices/services, orders or to make changes to your account.”

Augment These Practices with Our Recommendations

Generally speaking, these practices check out perfectly fine, and they are in line with what we would recommend. However, we would like to provide our own perspectives on these recommendations:

  • If you have any reason to suspect illegitimate communications are afoot, you should use official channels of communication to either confirm or refute your feelings on the message. You should never respond to a message if you have any reason to believe it could be dangerous. We recommend manually finding the supposed sender’s contact information on the company’s website to verify it first, reaching out only through secure secondary methods.
  • If there is any urgent language used in the email, it’s worth being just a hair skeptical of it. Hackers love to use language like this to get users to take action before they think more carefully about it. If the user feels extra pushy in their message, then you should be extra careful.
  • You might make purchases or phone payments here and there, even with legitimate businesses, but no company is ever going to ask you to pay in gift cards.
  • Don’t click on links in any messages you suspect are fraudulent. Go to the website or your account through your normal methods first to see if there is anything to be concerned about.

Need More Info? Learn More with Us

Amazon has some great advice to keep in mind regarding account security, but we would like to also remind you that these types of attacks are not Amazon-exclusive. You can experience phishing attacks from any vector at any time, so be sure to keep your wits about you and your protections in place. They might just save you from a major headache in the future.

Voyage Technology can help your business shore up any potential problems with its security. To learn more, call us today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 20 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade AI Smartphones Disaster Recovery Data Recovery VoIP Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Automation Artificial Intelligence Information Facebook Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Managed Service Provider Remote Work Compliance Outsourced IT Spam IT Support Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Blockchain Bandwidth Windows 10 Virtualization Apps Two-factor Authentication Mobile Office Vendor Data Security Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking App Computing Conferencing Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing HIPAA Applications How To WiFi BDR Operating System Virtual Private Network Risk Management Healthcare Computers Health Website Office Tips Analytics Augmented Reality Retail Storage Password Router Bring Your Own Device Managed IT Services Big Data 2FA Help Desk Remote Monitoring Vulnerability End of Support Excel Vendor Management Cybercrime Physical Security Remote Workers Customer Service Telephone Display Printer Paperless Office Infrastructure Cooperation Free Resource Project Management Windows 7 Document Management Microsoft 365 Solutions Firewall Scam Data loss The Internet of Things Windows 11 Going Green Patch Management Monitoring Social Save Money Video Conferencing Settings Printing Managed Services Provider Wireless Content Filtering Professional Services Saving Time Virtual Machines IT Management Customer Relationship Management VPN YouTube Meetings Managed IT Service Cryptocurrency Hacking Downloads Presentation Computer Repair iPhone Licensing Virtual Desktop Wireless Technology Vulnerabilities Data storage Entertainment LiFi Data Privacy Outlook Images 101 Machine Learning Mobility Money Telephone System Multi-Factor Authentication Cost Management Word Humor Maintenance Antivirus Sports Mouse Employees Integration Safety User Tip Administration Modem Mobile Security Processor Holidays Data Storage Robot Smart Technology Supply Chain Alt Codes Addiction IBM Language Employer/Employee Relationships Outsourcing Management PCI DSS Downtime Unified Threat Management Chatbots Navigation Distributed Denial of Service Workplace Unified Threat Management Gig Economy Hosted Solution Screen Reader Typing Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Regulations Compliance Identity Network Congestion Evernote Paperless Knowledge Co-managed IT Google Drive User Error Bookmark Smart Tech Memes Competition Download Net Neutrality Alerts SQL Server Technology Care Financial Data Point of Sale History 5G Business Communications Experience Break Fix Scams Google Docs Browsers Smartwatch Unified Communications Connectivity IT Bitcoin Network Management Upload Procurement Running Cable Tech Support Azure Hybrid Work User Google Wallet Social Network Telework Cyber security Monitors Multi-Factor Security Tech Human Resources IoT Communitications Dark Web Cables CES Windows 8 Trends Supply Chain Management IP Address Laptop Websites Google Calendar Term Google Apps Drones Customer Resource management FinTech Regulations Star Wars IT Assessment Electronic Medical Records Microsoft Excel IT Maintenance SharePoint Data Analysis Gamification Flexibility Halloween Staff Value Business Intelligence Recovery Legislation Shortcuts Lenovo Organization Social Networking Hard Drives Writing Smart Devices Domains Virtual Reality Ransmoware Fileless Malware Digital Security Cameras Hacks Server Management Content Remote Working Scary Stories Private Cloud Wearable Technology Memory Vendors Fun Comparison Google Play Be Proactive Superfish Health IT Identity Theft Motherboard Data Breach Refrigeration Deep Learning Assessment Electronic Health Records Public Speaking Twitter Permissions Workforce Directions Videos Lithium-ion battery Error Wasting Time Threats Social Engineering Specifications Security Cameras Workplace Strategies Entrepreneur Education Trend Micro Internet Exlporer Software as a Service Remote Computing Fraud Meta Microchip Mobile Computing Username Managing Costs Amazon Search Black Friday SSID Tablet eCommerce Undo Best Practice Database Surveillance Alert Virtual Assistant Outsource IT Managed IT Buisness File Sharing IT Technicians Virtual Machine Environment Dark Data Media How To Cyber Monday Medical IT Legal Proxy Server Reviews IT solutions Cookies Business Growth Tactics Development Notifications Hotspot Transportation Small Businesses Travel Mirgation Hypervisor Displays Application Cortana PowerPoint Techology Shopping Google Maps Nanotechnology Optimization

Blog Archive