At Go Wholesale, we take your security very seriously and it is our top priority to protect your information. Go Wholesale utilizes a variety of safety features to process payments and ensure the protection of our customers.
We use the third-party payment processors, Stripe, Square, and Adyen to house all of our customer's payment card information, and Plaid and Adyen to house your bank account information. We do not hold any payment information on Faire servers, as they are stored securely with these processors. As a result, this sensitive information is encrypted on our site, so that we only have access to the last few digits of your card information. These processors are also used by some of the world's largest companies including Salesforce, Shopify, and Amazon.
In order to protect your information online, please read the internet security tips below.
Internet security tips
We know that you try to protect yourself from fraud on the internet. Phishing is the term used for internet theft scams involving phony websites, emails or other messages, allowing the attacker can gain access to your account and sensitive information.
The following information will help you identify and avoid internet scams and phishing attempts:
Know the warning signs
Understanding the warning signs will help you protect yourself against phishing. Keep an eye out for these signs when reading messages and reviewing websites:
- Overly general language: Although phishing can be well researched and tailored to you and your business, general language is a hallmark of phishing scams. Be wary of messages that seem to come from an organization you trust but that open with vague statements.
- Make sure your connection to a website uses https://: When you connect to any website where you could be asked to enter a username and password or other sensitive data, check that a lock icon appears beside the URL in your browser.
- URL's that don't look quite right: Phishing attempts can include URLs that appear legitimate if you don't look too closely. Many phishing attempts use URLs that have been deliberately chosen to resemble a URL that you're already familiar with. For example:
- Legitimate URL: example-wholesale.com/apparel/tops
- Phony URL: example-wholesale.com-apparel.net/tops
- Business messages from personal accounts: Attackers can gather enough information from your online presence to create a message that could plausibly come from a real contact.
- Misspellings, poor grammar, and style variations: Criminals don't take content style guides as seriously as professional web content writers. As well as typos and grammar errors, variations in the following categories within a single page can show that a website is fraudulent.
- Alarmist or overexcited tone: Watch for time-sensitive requests that try to scare you into acting without thinking.
- Open only attachments or links you expect: Don’t interact with attachments, links, or forms unless you are expecting them and know what they contain. Not only can they redirect you to a malicious site designed to steal your information, but they can also infect your device with malware.
- Be careful with public wi-fi: Public wi-fi is convenient when you're on the go, but it provides many different ways for criminals to gain access to your information. You can reduce your risks by taking steps to protect yourself and your data by:
- Verifying hotspot names: Before connecting, make sure that the hotspot you plan to use is legitimate. If you can't see the hotspot name posted in an obvious place, then ask an employee.
- Disable access points to your device: Public wi-fi networks are much less secure than private networks like the one at your home or office. Protect yourself by turning off file sharing within your network and enabling your firewall before connecting. Even with these precautions, it's still not a good idea to send or receive any sensitive content using a public wi-fi network.
If you feel you have received any phishing messages, please reach out to us at info@gowholesale.co.uk and we will help address your questions or concerns.
Comments
0 comments
Please sign in to leave a comment.