Most UK online holidaymakers ignore basic security measures, study reveals

UK web users are ignoring basic online fraud-prevention measures in their quest for the ultimate holiday bargain, research has revealed.

UK web users are ignoring basic online fraud-prevention measures in their quest for the ultimate holiday bargain,...

research has revealed.

One in three web users booking holidays online do not confirm the authenticity of travel providers, a study commissioned by Get Safe Online has revealed.

Some 22% of online holidaymakers do no check the web page is secure when entering payment details, the UK's national internet security awareness initiative said.

Tony Neate, managing director of GetSafeOnline, said fraudsters play on people's desire for a bargain holiday.

The research reveals that basic fraud-prevention measures are being overlooked and that many holiday makers are unaware of the most common scams.

More than two-thirds of respondents said they have never heard of holiday rental scams and 68% were unaware of bogus holiday sites.

In collaboration with the travel association ABTA, Get Safe Online has published a checklist to help UK web users book their last-minute getaways more securely.

Top online travel tips
If deals look too good to be true, take additional steps to verify the offer and if still in doubt, stay away.
Don’t fall for fake competition scams in which fraudsters send an e-mail claiming you have won part of a luxury holiday, but need to pay a small fee to secure it.
Find out if your holiday provider is a member of ABTA or comparable travel organisation.
Check authenticity of private villa rentals by speaking to the owner/agent directly by phone.
Get the full address, find it on Google maps, and ask for a full contract which should set out all the terms and conditions of the rental.



Enjoy the benefits of CW+ membership, learn more and join.

Read more



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: