Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Wallet Users Need to Make Sure They Lock Their Card

b2ap3_thumbnail_your_google_wallet_400.jpgGoogle is much more than just a collection of desktop apps, a search engine, and a web browser. Google is a large company that’s continuously innovating with new and exciting technologies. One of these is Google Wallet, which allows for sharing cash and making money transfers online. What many users of Google Wallet forget is that, just like a debit or credit card, your Google Wallet card number can be stolen and used for fraudulent activity.

Google wallet allows the transfer of money directly between Google Wallet accounts and can send money directly to bank accounts. Of course, the easiest way to use your Google Wallet account is with the provided Google Wallet debit card. It works in the same way as any other debit or credit card, and can be used anyplace MasterCard is accepted. Of course, this makes it susceptible to the same scams that target other types of cards.

Banks are capable of resolving unauthorized and fraudulent transactions, and Google is no different. However, Google vows that they will reimburse 100 percent of unauthorized transactions. This helps you in the event that your card’s information has been stolen by fraudsters, but how can you prevent this from happening in the first place? By taking full advantage of the Google Wallet smartphone app (you can find it here for the iPhone), you can effectively limit how much damage is done to your account from card lifters.

The Google Wallet app is a great way to monitor your money transfers and protect your account from fraud. The smartphone app can send money on your Wallet card to a linked bank account, and you can view transactions and recurring transfers to your bank account right through the app, or on Wallet’s official website.

The best part of the Google Wallet app is its ability to completely shut down your card within a moment’s notice. If you think that your card has been targeted by fraudsters, you can easily lock or unlock your Google Wallet card by using the slider on the app’s balance screen. Doing so will also place a lock on your online Google Wallet account, which might be an issue if you have subscriptions regularly hitting it. Just make sure that you turn it on for these scheduled payments.

Another important part of using Google Wallet is understanding that hackers who have lifted your card numbers aren’t actually able to access your Wallet account. They only have access to the money that’s currently in your account. The reasoning for this is that they only have your card number, which has no bearing on how you access Google Wallet. This means that hackers don’t have access to your bank account numbers, and they can’t overdraw your debit card; meaning that they aren’t going to hit you with any overdraft fees. Basically, the only problem that you need to be aware of is the money within your account, and not to add money into it if you think it’s been compromised.

It’s a best practice to keep your Google Wallet card locked at all times when you don’t need to use it. Doing so keeps hackers from using it to their benefit. Monitoring the card’s activity is another great way to mitigate the damage done by fraudulent activity. As always, contacting Google about any fraudulent activity can lead to reimbursement, but it’s still your responsibility to keep tabs on your account and identify suspicious activity.

For more great tips and tricks, subscribe to Evolve IT’s blog.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Hackers Cloud Privacy Email Productivity Malware Business Software Business Computing User Tips Hosted Solutions Computer Microsoft Upgrade Efficiency Workplace Tips Google Windows 10 IT Support Mobile Devices Innovation Smartphone Network Security Ransomware Hardware Gmail Facebook Bandwidth Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Operating System Communication Hacking WiFi The Internet of Things Social Media Phishing Alert App Networking Data storage Mobile Computing communications Data Windows Big Data Safety Experience Unified Threat Management Quick Tips Mobile Device Management Money Network Firewall Managed Service Provider Content Filtering Cybercrime Outlook Website Wireless Technology Android Apple Employer-Employee Relationship Two-factor Authentication History Smartphones Best Practice Small Business Office 365 Network Congestion Retail Save Money Saving Money Music Analytics Lithium-ion battery intranet Managed IT services Cryptocurrency Laptop IBM Social Networking Google Docs Education Bluetooth Cleaning Holiday Public Speaking Virtualization Black Market YouTube IP Address Processors LiFi Staffing Office Tips Automation Memory BYOD Downtime Government Help Desk Keyboard Passwords Streaming Media Augmented Reality Visible Light Communication Search Disaster User Micrsooft Deep Learning BDR Hard Drives Shortcut Business Growth Data Management Remote Computing Advertising DDoS Recovery Robot Vendor Management Society Sports Heating/Cooling Word Google Wallet Spam Information Technology Running Cable Monitors Windows 8 Internet of Things Business Management IT Services Hosted Solution Windows XP Artificial Intelligence Documents Competition Displays Entrepreneur Tech Support Compliance Presentation Domains Drones Social End of Support Printer Browser Hacker Wireless Virtual Desktop Writing Unified Communications Securty Application Document Management Encryption Customer Service VoIP Law Enforcement SaaS Router Proactive IT Cortana
QR-Code