Attend IT Blog

Attend IT Limited has been serving the Brentford area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Dissecting the Lessons from a Recent Amazon Scam Warning Email

Dissecting the Lessons from a Recent Amazon Scam Warning Email

Amazon Prime subscribers recently received an email from the online marketplace, warning them of the prevalence of scams that took advantage of their offerings and brand recognition. Let’s go through the advice that this email shared, and compare it to the best practices we recommend for avoiding scams.

What Did Amazon’s Email Have to Say?

As you may expect, this communication primarily focused on those scams that involved Amazon’s brand and services in some way. For instance, it directly referenced “Prime membership scams” and “Account suspension/Deletion scams.”

As the email put it, a Prime membership scam is composed of some communication that references some issue with your membership in the program or some additional fee that is required. In order to confirm or cancel this charge, of course, your payment information is needed.

In regards to these scams, the official statement shared in the company’s email is that “Amazon will never ask you to provide payment information for products or services over the phone.”  Instead, customers are directed to visit the official website/application to check for legitimate communications in the Message Center and manage their account status.

Account suspension/Deletion scams, meanwhile, are described as texts, emails, and phone calls that try to fool users into providing account access by convincing them to hand over their credentials or payment information.

Amazon’s official stance—again, from the aforementioned email—is that “Amazon will never ask you to disclose your password or verify sensitive information over the phone or on any website other than” Their advice is to authenticate any requests, specifically through the Message Center.

Amazon’s Other Recommended Tips (and Whether We Agree with Them)

Amazon’s alert also outlined a few pieces of advice. To quote the message:

“1. Trust Amazon-owned channels.
Always go through the Amazon mobile app or website when seeking customer service, tech support, or when looking to make changes to your account.

2. Be wary of false urgency.
Scammers may try to create a sense of urgency to persuade you to do what they're asking. Be wary any time someone tries to convince you that you must act now.

3. Never pay over the phone.
Amazon will never ask you to provide payment information, including gift cards (or “verification cards,” as some scammers call them) for products or services over the phone.

4. Verify links first.
Legitimate Amazon websites contain "" or "" Go directly to our website when seeking help with Amazon devices/services, orders or to make changes to your account.”

We Agree with These Measures

Overall, these line up with the best practices we’d recommend when dealing with any official-seeming communication to help prevent phishing:

  • When responding to a message, it is always better to turn to confirmed official channels, separately from that message. Don’t respond to a suspected phishing email directly—manually navigate to the company’s website, find the supposed sender’s contact information there, and reach out that way.
  • Keep an eye out for overly urgent language in the messages you receive. This is a common phishing tactic meant to get you acting first and thinking later. If a message of any kind pushes you to act immediately, it should be seen as a signal that something may not be right.
  • We can’t pretend that all requests for over-the-phone payments are going to be fraudulent, despite the fact that this is the case where Amazon is concerned. However, it is important to keep in mind that a legitimate business will never demand that you pay them in gift cards… particularly those associated with an opposing brand.
  • There are a lot of ways that a scammer can disguise a phishing link, so it is generally best to avoid clicking on any provided links and instead navigate to the legitimate website independently and proceed from there.

Scams Aren’t an Amazon-Specific Problem

Don’t get us wrong, we’re glad to see a business with the reach that Amazon has sharing cybersecurity practices and spreading awareness. However, it is important that these practices are applied to every email you receive at home and especially in the workplace, along with other assorted security measures and safeguards.

Attend IT Limited is here to assist the businesses of Brentford and West London with their information technology needs, including their cybersecurity and related concerns. Give us a call at 020 8626 4485 to learn more about what we can do.

Tip of the Week: How to Get People to Listen to Yo...
Enterprise Software Runs SMBs

Mobile? Grab this Article!

Qr Code

Tag Cloud

Technology Security Business Computing Productivity Network Security Cloud Best Practices Tip of the Week Business Data Backup Managed IT Services Data Recovery Hackers Data communications IT Support IT Services Disaster Recovery VoIP Privacy Hosted Solutions Software Mobile Devices Innovation Backup Small Business Cybersecurity Malware Saving Money Efficiency Email Internet Business Continuity Phishing Collaboration Computer Hardware Cloud Computing Business Management Outsourced IT BDR User Tips Smartphones Automation Microsoft Productivity Ransomware Information Technology Internet of Things IT Support Workplace Strategy Compliance Quick Tips Users Upgrade Risk Management Smartphone Server Communication Workplace Tips Artificial Intelligence Employee-Employer Relationship Managed IT Spam Wi-Fi Managed IT services Mobile Device Management Mobility Budget Meetings Network Covid-19 Managed Service Provider Save Money BYOD Human Resources Training Networking Remote Google Mobile Device Windows 7 Avoiding Downtime Document Management Gadgets Wireless Printing Remote Workers Passwords Android Help Desk Instant Messaging Firewall Information MSP Content Filtering History Video Conferencing Windows 10 Router VPN Hosted Solution Data Management Microsoft Office Time Management Remote Computing Virtual Private Network Chrome Cost Management Password Managed Service Project Management Remote Work Computers Value Employer-Employee Relationship Personal Information Business Technology Laptop Marketing Recovery Saving Time Customer Relationship Management Maintenance Data Breach Government Data Security AI Machine Learning Telephone Systems Redundancy Managed Services Encryption Wireless Internet Tech Term Voice over Internet Protocol Hacker Current Events Mobile Computing Paperless Office Manufacturing Audit End of Support Social Media Telephony Big Data Backup and Disaster Recovery Hard Drives Office Mobile Office Monitoring Automobile IT Service Printer Devices Solid State Drive Printers Hybrid Cloud Conferencing Software as a Service IoT Hiring/Firing Online Storage Work/Life Balance Commerce Phone System Social Engineering File Sharing Financial Technology E-Commerce Hacking Upgrades Employer/Employee Relationships Administration Apple Connectivity Videoconferencing Application Unified Communications Regulations Compliance Business Intelligence Copiers Wireless Technology Entertainment Samsung PDF Disaster RMM Office 365 WPA3 Leadership Storage Regulations intranet Dark Web Payment Cards Save Time Smart Technology Evernote Wasting Money Cost Colocation User Error Streaming Media Streaming Battery Two-factor Authentication Remote Monitoring App Going Paperless Voiceover Internet Protocol Money HIPAA How To Black Market Electronic Medical Records Windows 11 Word File Storage Virtualization Analytics Transportation Paperless Solutions Outsource IT Amazon Outsourcing Data Loss Content Filter Vulnerability Regulation Payroll SaaS Managed IT Service Business Telephone Flexibility Company Culture Bitcoin Microsoft Outlook Azure Gamification OneNote e-waste Fiber Optics iPhone Proactive IT Private Cloud Bandwidth Troubleshooting Windows 10 Cybercrime Shadow IT Going Green Blockchain Telephone Nanotechnology Mobile Computing Applications Professional Services Analysis Workers Virtual Assistant Data Protection Files Workstations Customer Service Cybersecurty Operating System Data Storage Smartwatch Computer Repair Facebook Finance SMB Active Directory Proactive Cabling Windows Server 2008 Antivirus Vendor Management Chromebook Development CRM Advertising Lifestyle Microsoft 365 Break/Fix Window 10 Travel Alexa for Business Remote Working Management The Internet of Things Copier Downtime Inventory Management Update Spyware Vendor Infrastructure Windows Server Education Cleaning Browser Students Utility Computing PCI DSS Employees Windows Legal Holiday Smart Tech Keyboard Virtual Reality Robot Legislation eSignature Gmail Wasting Time Workstation Augmented Reality 5G Social Tablets Mobile Security Microsoft Word Reviews Print Virtual Desktop Net Neutrality Computer Fan Work Threats WannaCry Cast Investment Communitications Humor Tech Support Hard Disk Drive Shortcut Security Cameras Processor Worker Gifts Data Theft Keyboard Shortcuts Business Strategy Workplace Strategies OneDrive Search Micrsosoft Best Practice Comparison PowerPoint Language Accessory Telework Medical IT NFL Identity Database Music Display Scams Miscellaneous Licensing Consultant SSD ROI Hosted Desktop How To Fraud Testing Excel Benchmarks Sabotage Digital Signage Apps Specifications Peripheral Television Audits CrashOverride eCommerce Relocation Computer Accessories Data Privacy eWaste Emails Biometrics IT Solutions Sports Google Assistant IT budget Co-Managed Services Computer Care Authentication Employee Managed Services Provider Law Enforcement HBO Windows Server 2008 R2 Smart Devices Edge Camera Computer Tips Point of Sale Credit Cards Financial Policy Print Management PC Webinar WIndows Server 2008 Text Messaging Safety Sales Virus Access Control Solutions Supply Chain Video Games Windows Ink Hard Drive Device Security Cortana Proactive Management Twitter Unsupported Software Internet Service Provider Windows 8.1 Facebook Privacy Reputation Identity Theft Touchscreen Innovations Remote Management Politics Charger Google Docs Ciminal Projects iOS Sync Google Drive FAQ Bring Your Own Device WiFi Procedure Healthcare Scalability IT solutions Patch Management Office Tips Managing Stress Emergency Retail Memory Admin YouTube Health Google Maps USB Books Computer Forensics Identities Hyperlink Root Cause Analysis Voice Worker Commute Scam Alert App store Updates IT Management Telephone System Experience Microsoft Excel 2FA Myths HaaS Adobe Wireless Charging Unified Threat Management Organization Screen Mirroring Server Maintenance Inventory Internet Exlporer Windows 10s Outlook Websites Settings Environment Holidays