(707) 268-8850    Get SUPPORT

Network Management Services Blog

Network Management Services has been serving the Eureka area since 1995, providing IT Support including technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 21 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Cloud Technology Business Computing Network Security Best Practices Managed IT Services Privacy Hackers Backup VoIP Malware Google IT Support Data Backup Mobile Devices Email Outsourced IT Innovation Microsoft Software Business Continuity Hosted Solutions Small Business Business Saving Money Efficiency Communications Data Recovery Cloud Computing Hardware Disaster Recovery Ransomware Avoiding Downtime Cybercrime Server How To Cybersecurity Alert Android BDR Smartphones Data Computers Internet of Things User Tips Social Engineering Chrome Internet Communication Mobility Windows IT Services Managed IT Services Two-factor Authentication Managed IT Proactive IT Smartphone Telephone Systems Business Intelligence Money Business Management Budget Gadgets Windows 10 Browser BYOD Social Media Phishing Flexibility Passwords Data Security Artificial Intelligence Collaboration Remote Monitoring Private Cloud Compliance Vulnerability Law Enforcement Firewall Spam Save Money Mobile Device Management Operating System Bring Your Own Device Information Technology CES Employer-Employee Relationship Router Work/Life Balance OneNote Miscellaneous Upgrade IT Management Virtualization Identity Theft Windows 10 Data Breach IT Plan Credit Cards Word Wi-Fi Computer Bandwidth Unsupported Software Solid State Drive Network Spam Blocking Value Hacking Managed Service Provider Business Owner Holiday Physical Security Data Protection Document Management Quick Tips Government Redundancy Office 365 Google Drive Data storage Workers Public Cloud Office Tips Content Filtering Productivity App Data Storage Workforce Network Congestion Excel Black Market Electronic Medical Records Start Menu FENG Password Safety Fiber-Optic Apps Criminal The Internet of Things Google Docs Productivity Hiring/Firing Data Management Office Telecommuting IT Consultant Tip of the week Mobile Unified Threat Management Keyboard Automation Cables User Error Big Data Voice over Internet Protocol Data Warehousing Emergency Relocation Remote Work Leadership Windows Server 2008 Netflix Professional Services Health Unified Communications Content Management Multi-Factor Security Patch Management Humor Windows 7 Settings Tools Computer Care HaaS Files Theft Internet Exlporer Blockchain Reputation Trending Scam webinar Regulations Samsung Downtime Google Apps End of Support Customer Lifestyle Cortana Fraud Conferencing Servers Botnet Human Resources Root Cause Analysis Infrastructure Wireless Technology Internet exploMicrosoft IBM Mobile Computing Networking Software Tips Hacker VPN Amazon Marketing IT Support Flash Windows 10s Travel Staff Meetings Microsoft Office Password Manager Advertising Supercomputer Amazon Web Services SaaS Data loss Legal Hosted Solution Colocation Business Mangement Website Comparison HBO Recovery Save Time Training Facebook Risk Management Online Shopping Sync Software as a Service Screen Mirroring Computing Infrastructure Gmail Hard Drives Specifications Current Events Outlook Audit Monitor Apple Evernote Telephony Update Cast Mobile Device Recycling Hybrid Cloud Millennials Knowledge Frequently Asked Questions Charger Computer Fan HIPAA iPhone Wireless Charging Emails Skype eWaste History PDF Automobile Tech Support Webinar Public Computer Video Games Battery IT solutions Techology Competition Remote Computing Fun Education Employer Employee Relationship Users Cleaning Experience Scalability Applications Computer Accessories Content CrashOverride Music Wireless Search Virtual Reality Bluetooth Audiobook Wearable Technology Presentation Workplace Tips Transportation Worker Commute Entertainment USB 5G Instant Messaging Benefits Worker Loyalty Troubleshooting Customer Relationship Management How to Smart Technology Rootkit IP Address Digital Signature Customer Service Mobile Office Domains Best Practice Shadow IT Two Factor Authentication Vendor Management Politics Public Speaking Assessment Administration Lithium-ion battery WiFi Television Books Augmented Reality

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *