(707) 268-8850    Get SUPPORT

Network Management Services Blog

Network Management Services has been serving the Eureka area since 1995, providing IT Support including technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 20 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Network Security Best Practices Business Computing Privacy Managed IT Services Hackers Backup VoIP Malware Hosted Solutions Data Backup Email Google IT Support Software Outsourced IT Mobile Devices Internet Business Continuity Microsoft Data Recovery Saving Money Cloud Computing Innovation Ransomware Cybercrime Efficiency Data Small Business Business Cybersecurity IT Services BDR Hardware Disaster Recovery Communications Android Internet of Things Server How To Managed IT Communication Computers Smartphones Avoiding Downtime Smartphone Browser Alert User Tips Chrome Law Enforcement Phishing Data Security Data Protection Vulnerability Windows Collaboration Tech Term Managed IT Services BYOD Social Engineering Business Intelligence Mobile Device Management Two-factor Authentication Mobility Business Management Artificial Intelligence Redundancy Save Money Passwords Operating System Bandwidth Money Remote Monitoring Compliance Spam Firewall Windows 10 Flexibility Productivity Network Identity Theft Proactive IT Budget Telephone Systems Gadgets VPN Virtualization Private Cloud Social Media Windows 10 Public Cloud Data Breach Wi-Fi Office Tips Computer Data loss Mobile Device Comparison App Managed Service Provider Spam Blocking Value Holiday Update Quick Tips Information Technology Office 365 Automation Data Storage Data storage Router Workers Smart Tech CES Content Filtering OneNote IT Management Solid State Drive Apps Productivity Hacking IT Plan Business Owner Bring Your Own Device Credit Cards Big Data Word Employer-Employee Relationship Physical Security Unsupported Software Document Management Miscellaneous Government Upgrade Work/Life Balance Infrastructure Google Drive Amazon Flash Save Time Facebook Patch Management Addiction Computing Infrastructure Encryption Password Manager Travel Meetings Computer Care Access Control Settings Amazon Web Services Scam Apple Strategy Business Mangement webinar HBO Cortana Samsung Hybrid Cloud Authentication Online Shopping Sync Wireless Technology iPhone IBM History Analysis Gmail Software as a Service Conferencing Screen Mirroring Outlook Black Market Hacker PDF Nanotechnology Marketing Specifications Evernote Telephony Networking Audit Microsoft Office Password Accountants Recycling IT Support Cast Windows 10s Frequently Asked Questions Connectivity Office Millennials Wireless Charging Skype Supercomputer Computer Fan Website User Error eWaste Excel SaaS Hosted Solution Devices Relocation Workforce Fiber-Optic Start Menu FENG Health Training Risk Management IoT Criminal Google Docs Hard Drives Tip of the week Monitor Applications Thought Leadership Humor Telecommuting Files Cables Mobile Current Events HaaS Internet Exlporer Reputation Voice over Internet Protocol Data Warehousing Windows Server 2008 Streaming Media Remote Work Unified Communications Professional Services Knowledge Charger End of Support HIPAA Insurance Content Management Customer Multi-Factor Security Emails Windows 7 Safety Content Filter The Internet of Things Human Resources Theft Tools Network Congestion Electronic Medical Records Hiring/Firing Internet exploMicrosoft Practices Blockchain Trending Regulations Storage Data Management Staff Google Apps IT Consultant Downtime Unified Threat Management Advertising Keyboard Hosted Computing Lifestyle Servers Emergency Fraud Colocation Digital Signature Botnet Leadership Root Cause Analysis Legal Recovery Cleaning Inventory Mobile Computing Netflix Software Tips Wireless Content Search Best Practice Computer Accessories Shadow IT Music Cache Presentation Administration Audiobook Bluetooth Wearable Technology 5G Transportation Wireless Internet Entertainment USB Benefits Worker Customer Relationship Management Video Games Battery Loyalty IP Address Troubleshooting Techology Smart Technology Rootkit Customer Service WiFi Remote Computing Education Mobile Office Domains Scalability Two Factor Authentication Public Speaking Vendor Management Politics Virtual Reality Assessment Lithium-ion battery Augmented Reality Workplace Tips Tech Support Worker Commute Television Books Automobile CrashOverride Instant Messaging Webinar Public Computer Competition Fun How to Users IT solutions Twitter Employer Employee Relationship Experience

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *