• In the first half of 2022, attacks increased 44% over the same date in 2021, according to Check Point Software's Mid Year Report.
  • On shopping dates such as Amazon Prime Day, attacks increase even more, reaching peaks of more than 35% compared to the average.

DUBAI, UAE – Christmas is always a special time for millions of people around the world. This happy season has a tradition of giving heart-felt gifts as a token of affection and love, as well as spending more time with loved ones who are rarely seen.

But it is also a special season for cybercriminals, as they take advantage of these shopping days to intensify their phishing attacks, ransomware, and even dropping malware into emails. During this time of frenzied shopping for the perfect or last minute Christmas gifts, cyberattacks are intensified. According to Check Point Software, on Amazon's Prime Day, for example, attacks related to the US company increased by 37% compared to the average for June. The strategies range from the creation of web pages that simulate those of another company, through phishing emails, impersonations, to ransomware attacks.

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading global cybersecurity specialist provider, wants to raise awareness among online gift shoppers to be cautious at all times and take the necessary precautions.

According to Check Point Software’s Brand Phishing Report Q3 2022, Phishing is also a major player in Internet scams, and in the last quarter, DHL, the parcel delivery company, was the most impersonated company setting up shoppers for cybercrime. At a time when eCommerce is stronger than ever, it is necessary to be especially careful with messages from such invitations for amazing offers

In order for people to be able to shop securely and without any mishaps, Check Point Software wants to provide some tips for a safe and secure shopping experience:

  1. Always buy from an authentic and reliable source: always look for the link in the search engine you use, never click on links sent to you by e-mail or text message, as they are potentially dangerous because many cybercriminals try to phish through these channels.
  2. Be aware of similar domains: cybercriminals will always try to make the domains they create for the pages they imitate look as similar as possible to the original, but they will always have some spelling mistakes or the domain name will be misspelled, so by paying close attention to such spellings, we will be able to avoid future problems.
  3. Offers that seem too good to be true will always be too good to be true: if an offer is too good to be true, it is probably a scam, even more so at this time of the year when there are usually no big discounts. Do not get carried away by surprisingly low prices.
  4. Always look for the lock: secure Internet sites have the letters HTTPS at the beginning of the domain, as opposed to those that are not, which have HTTP without the final "s". HTTPS sites are those that comply with international security standards.
  5. Have endpoint security solutions in place: it is necessary to have them for the email as well as for websites when we surf the Internet, since they can prevent the spread of such malware to the rest of the equipment or computers.
  6. Always be on the lookout for password reset emails: companies will never ask you to reset your password unless you have requested it yourself, so if you receive an email asking you to change your password, the best thing to do is to go to the company's website and change your password from there.

"We all want to have a smooth Christmas, buy gifts for ourselves and our family and friends and have a peaceful vacation, but cybercriminals do not take vacations and that is why you have to be very cautious, even more so at this time of year," says Ram Narayanan, Country Manager at Check Point Software Technologies, Middle East. "Cyberattacks, as our reports point out, continue to increase, especially more so around such special holiday seasons such as Christmas. Both ransomware and phishing are the order of the day for companies and individuals, so no one is exempt from danger."

-Ends-

Follow Check Point via:
Twitter: https://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: https://blog.checkpoint.com 
YouTube: https://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies 

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (https://www.checkpoint.com/) is a leading provider of cyber security solutions to corporate enterprises and governments globally.  Check Point Infinity´s portfolio of solutions protects enterprises and public organisations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises  four core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.