Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Wallet Users Need to Make Sure They Lock Their Card

b2ap3_thumbnail_your_google_wallet_400.jpgGoogle is much more than just a collection of desktop apps, a search engine, and a web browser. Google is a large company that’s continuously innovating with new and exciting technologies. One of these is Google Wallet, which allows for sharing cash and making money transfers online. What many users of Google Wallet forget is that, just like a debit or credit card, your Google Wallet card number can be stolen and used for fraudulent activity.

Google wallet allows the transfer of money directly between Google Wallet accounts and can send money directly to bank accounts. Of course, the easiest way to use your Google Wallet account is with the provided Google Wallet debit card. It works in the same way as any other debit or credit card, and can be used anyplace MasterCard is accepted. Of course, this makes it susceptible to the same scams that target other types of cards.

Banks are capable of resolving unauthorized and fraudulent transactions, and Google is no different. However, Google vows that they will reimburse 100 percent of unauthorized transactions. This helps you in the event that your card’s information has been stolen by fraudsters, but how can you prevent this from happening in the first place? By taking full advantage of the Google Wallet smartphone app (you can find it here for the iPhone), you can effectively limit how much damage is done to your account from card lifters.

The Google Wallet app is a great way to monitor your money transfers and protect your account from fraud. The smartphone app can send money on your Wallet card to a linked bank account, and you can view transactions and recurring transfers to your bank account right through the app, or on Wallet’s official website.

The best part of the Google Wallet app is its ability to completely shut down your card within a moment’s notice. If you think that your card has been targeted by fraudsters, you can easily lock or unlock your Google Wallet card by using the slider on the app’s balance screen. Doing so will also place a lock on your online Google Wallet account, which might be an issue if you have subscriptions regularly hitting it. Just make sure that you turn it on for these scheduled payments.

Another important part of using Google Wallet is understanding that hackers who have lifted your card numbers aren’t actually able to access your Wallet account. They only have access to the money that’s currently in your account. The reasoning for this is that they only have your card number, which has no bearing on how you access Google Wallet. This means that hackers don’t have access to your bank account numbers, and they can’t overdraw your debit card; meaning that they aren’t going to hit you with any overdraft fees. Basically, the only problem that you need to be aware of is the money within your account, and not to add money into it if you think it’s been compromised.

It’s a best practice to keep your Google Wallet card locked at all times when you don’t need to use it. Doing so keeps hackers from using it to their benefit. Monitoring the card’s activity is another great way to mitigate the damage done by fraudulent activity. As always, contacting Google about any fraudulent activity can lead to reimbursement, but it’s still your responsibility to keep tabs on your account and identify suspicious activity.

For more great tips and tricks, subscribe to Evolve IT’s blog.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 06 May 2026
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Hackers Cloud Privacy Email Productivity Business Malware Software Business Computing User Tips Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Google Computer Windows 10 IT Support Mobile Devices Innovation Smartphone Hardware Network Security Ransomware Gmail Facebook Operating System Microsoft Office Office Backup Apps The Internet of Things Business Continuity Social Media Disaster Recovery Communication Bandwidth Hacking WiFi Phishing App Money Mobile Device Management Mobile Computing Network communications Big Data Safety Managed Service Provider Unified Threat Management Outlook Quick Tips Smartphones Wireless Technology Android Firewall Apple Content Filtering Cybercrime Best Practice Website Alert Networking Data storage Data Windows Employer-Employee Relationship Experience History Two-factor Authentication Small Business Monitors Downtime BYOD Office 365 Passwords Streaming Media Help Desk Saving Money Micrsooft Visible Light Communication Analytics Disaster Lithium-ion battery Displays intranet Business Growth Data Management Robot Advertising Recovery End of Support Sports Social Networking Society Google Wallet Spam Public Speaking Virtualization Information Technology IP Address Running Cable Windows 8 Writing Internet of Things Hosted Solution Windows XP IT Services Government Documents Keyboard Artificial Intelligence Augmented Reality Tech Support Search Compliance User Drones Hard Drives Shortcut Social Remote Computing Printer DDoS Retail Browser Virtual Desktop Heating/Cooling Wireless Word Securty Unified Communications Document Management Managed IT services Encryption Law Enforcement SaaS VoIP Business Management Proactive IT Bluetooth Competition Cortana Network Congestion Presentation Entrepreneur Save Money Domains Automation Music Memory Hacker Laptop Cryptocurrency Deep Learning BDR Application IBM Google Docs Education Customer Service Vendor Management Holiday Cleaning Black Market YouTube Processors Office Tips LiFi Staffing Router
QR-Code