Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Wallet Users Need to Make Sure They Lock Their Card

b2ap3_thumbnail_your_google_wallet_400.jpgGoogle is much more than just a collection of desktop apps, a search engine, and a web browser. Google is a large company that’s continuously innovating with new and exciting technologies. One of these is Google Wallet, which allows for sharing cash and making money transfers online. What many users of Google Wallet forget is that, just like a debit or credit card, your Google Wallet card number can be stolen and used for fraudulent activity.

Google wallet allows the transfer of money directly between Google Wallet accounts and can send money directly to bank accounts. Of course, the easiest way to use your Google Wallet account is with the provided Google Wallet debit card. It works in the same way as any other debit or credit card, and can be used anyplace MasterCard is accepted. Of course, this makes it susceptible to the same scams that target other types of cards.

Banks are capable of resolving unauthorized and fraudulent transactions, and Google is no different. However, Google vows that they will reimburse 100 percent of unauthorized transactions. This helps you in the event that your card’s information has been stolen by fraudsters, but how can you prevent this from happening in the first place? By taking full advantage of the Google Wallet smartphone app (you can find it here for the iPhone), you can effectively limit how much damage is done to your account from card lifters.

The Google Wallet app is a great way to monitor your money transfers and protect your account from fraud. The smartphone app can send money on your Wallet card to a linked bank account, and you can view transactions and recurring transfers to your bank account right through the app, or on Wallet’s official website.

The best part of the Google Wallet app is its ability to completely shut down your card within a moment’s notice. If you think that your card has been targeted by fraudsters, you can easily lock or unlock your Google Wallet card by using the slider on the app’s balance screen. Doing so will also place a lock on your online Google Wallet account, which might be an issue if you have subscriptions regularly hitting it. Just make sure that you turn it on for these scheduled payments.

Another important part of using Google Wallet is understanding that hackers who have lifted your card numbers aren’t actually able to access your Wallet account. They only have access to the money that’s currently in your account. The reasoning for this is that they only have your card number, which has no bearing on how you access Google Wallet. This means that hackers don’t have access to your bank account numbers, and they can’t overdraw your debit card; meaning that they aren’t going to hit you with any overdraft fees. Basically, the only problem that you need to be aware of is the money within your account, and not to add money into it if you think it’s been compromised.

It’s a best practice to keep your Google Wallet card locked at all times when you don’t need to use it. Doing so keeps hackers from using it to their benefit. Monitoring the card’s activity is another great way to mitigate the damage done by fraudulent activity. As always, contacting Google about any fraudulent activity can lead to reimbursement, but it’s still your responsibility to keep tabs on your account and identify suspicious activity.

For more great tips and tricks, subscribe to Evolve IT’s blog.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 26 November 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Hackers Cloud Privacy Email Productivity Business Malware Software Business Computing User Tips Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Computer Google Windows 10 IT Support Mobile Devices Innovation Smartphone Hardware Network Security Ransomware Gmail Facebook Operating System Microsoft Office Office Backup The Internet of Things Apps Social Media Business Continuity Bandwidth Disaster Recovery Communication Hacking WiFi Phishing Mobile Device Management Money App Network Mobile Computing Big Data Managed Service Provider communications Outlook Safety Unified Threat Management Quick Tips Wireless Technology Android Apple Smartphones Firewall Content Filtering Best Practice Cybercrime Alert Website Networking Data storage Windows Data Experience Employer-Employee Relationship Two-factor Authentication History Small Business Micrsooft Visible Light Communication Office 365 Disaster Data Management Analytics Monitors Saving Money Business Growth Robot Advertising Lithium-ion battery Recovery intranet Society Sports Spam Displays Google Wallet Social Networking Information Technology Running Cable Public Speaking Windows 8 Internet of Things Windows XP IP Address End of Support IT Services Virtualization Hosted Solution Artificial Intelligence Documents Government Tech Support Compliance Augmented Reality Writing Keyboard Drones Social Search User Hard Drives Printer Browser Virtual Desktop Remote Computing Wireless Shortcut Unified Communications DDoS Securty Encryption Heating/Cooling Word Document Management Law Enforcement SaaS Retail VoIP Cortana Business Management Proactive IT Network Congestion Managed IT services Save Money Competition Presentation Entrepreneur Music Domains Bluetooth Cryptocurrency Laptop Hacker Automation IBM Google Docs Education Memory Cleaning Holiday Application YouTube Customer Service Deep Learning Processors Black Market Office Tips LiFi BDR Staffing BYOD Downtime Streaming Media Vendor Management Help Desk Router Passwords
QR-Code