(707) 268-8850    Get SUPPORT

Network Management Services Blog

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

Delivering Value Through Managed IT Services
VoIP Delivers Benefits That a Traditional Phone Sy...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, August 19 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Privacy Business Computing Managed IT Services Malware Data Backup Hackers VoIP Backup Google Hosted Solutions Mobile Devices Outsourced IT Email Data Recovery Innovation IT Support Tech Term Microsoft Data Software Cloud Computing Hardware Internet Business Continuity Efficiency Communications Internet of Things BDR Saving Money IT Services Small Business Cybersecurity Ransomware Cybercrime Business Android Disaster Recovery User Tips Smartphones How To Alert Communication Artificial Intelligence Network Gadgets Server Computers Browser Managed IT Services Avoiding Downtime Smartphone Windows Managed IT Law Enforcement Mobile Device Management Social Engineering Two-factor Authentication Mobility Business Intelligence Passwords Data Security Data Protection Collaboration Productivity Router Business Management BYOD Vulnerability Money Miscellaneous Save Money Social Media Chrome Phishing Telephone Systems Productivity Computer Remote Monitoring Bandwidth Operating System Virtualization Windows 10 Identity Theft Redundancy Document Management Blockchain Proactive IT Budget IT Support Facebook VPN Applications Office 365 Connectivity Compliance Upgrade Managed Service Provider Word Private Cloud Spam Flexibility Firewall Windows 10 App Servers Data Storage Data Breach Solid State Drive CES Quick Tips Public Cloud Holiday Employer-Employee Relationship Content Filtering Wi-Fi Password Spam Blocking Business Owner Content Management Paperless Office Data storage Access Control Smart Tech Information Technology Work/Life Balance Apps Value Networking Data loss Comparison OneNote Credit Cards Bring Your Own Device Microsoft Office IT Management Analysis Hacking Big Data Windows 7 Website IT Plan Infrastructure Automation Physical Security Office Tips Government Update Workers Mobile Device Information Unsupported Software File Sharing Google Drive Cables Devices Current Events Digital Signature Machine Learning Enterprise Content Management Computer Care Settings Workplace Tips USB Humor Excel Workforce Smart Office Computing Infrastructure Root Cause Analysis Botnet Amazon Web Services Inventory Scam Managed Service Software Tips Mobile Computing Business Mangement Addiction webinar Files FENG Start Menu IoT Business Technology PDF Black Market Unified Communications Thought Leadership Knowledge Data Management Apple Flash Encryption YouTube Password Management Samsung Reputation Internet Exlporer Google Docs Augmented Reality Tip of the week Telecommuting Charger Emails Keyboard Meetings Travel Online Shopping Hybrid Cloud Gmail Cache Conferencing Mobile Wireless Technology Virtual Assistant Voice over Internet Protocol Theft Streaming Media Electronic Medical Records IBM Network Congestion Hard Drives iPhone Windows 10s Strategy NIST Safety Hosted Solution Customer End of Support Data Warehousing Authentication The Internet of Things Windows Server 2008 Remote Work Students Marketing Hacker Monitor History Evernote HBO Recycling Wireless Internet Legal Risk Management Professional Services Insurance Telephone System Education Multi-Factor Security Google Apps Content Filter IT Consultant Sync Cryptocurrency Recovery Internet exploMicrosoft Wireless Charging Nanotechnology Supercomputer Save Time Human Resources Healthcare Unified Threat Management Screen Mirroring Software as a Service Office Outlook Specifications eWaste Wire Cortana CrashOverride Tools Fraud Practices Emergency Trending Storage Leadership HaaS Audit Telephony Accountants Safe Mode SaaS Advertising Fiber-Optic MSP Regulations Staff Electronic Health Records HVAC Cleaning Netflix User Error Cast Relocation Frequently Asked Questions Millennials Criminal Sports Training HIPAA Colocation Downtime Amazon Hosted Computing Patch Management Lifestyle Password Manager Entertainment Hiring/Firing Health Computer Fan Skype Two Factor Authentication Remote Worker Automobile WiFi Worker Commute Fun Vendor Management Public Speaking Bluetooth Presentation Assessment Wiring Lithium-ion battery Instant Messaging Troubleshooting Transportation Proactive Video Games Administration Tech Support Books Television 5G Battery Techology Company Culture How to Benefits Remote Monitoring and Maintenance Search Webinar Remote Computing Experience Worker Public Computer Customer Relationship Management Content Managing Stress Competition Loyalty Smart Technology Line of Business IP Address IT solutions Scalability Music Users Rootkit Best Practice Politics Regulation Employer Employee Relationship Customer Service Audiobook Shadow IT Mobile Office Wearable Technology Virtual Reality Domains Twitter Computer Accessories Wireless