(707) 268-8850    Get SUPPORT

Network Management Services Blog

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

Delivering Value Through Managed IT Services
VoIP Delivers Benefits That a Traditional Phone Sy...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, February 16 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Mobile Devices VoIP Hosted Solutions Innovation Backup Email Google Tech Term Data Recovery Data Outsourced IT IT Support Internet Microsoft Internet of Things Software Cloud Computing Saving Money IT Services Business Continuity Efficiency BDR Communications Hardware Cybercrime Communication Small Business Ransomware Cybersecurity Smartphones Business Server Disaster Recovery User Tips Android Artificial Intelligence Avoiding Downtime Managed IT Services Save Money Managed IT Network Gadgets Browser Computers How To Alert Smartphone Windows Data Security Data Protection Windows 10 Business Management Two-factor Authentication Applications Computer Passwords Vulnerability Chrome Firewall Productivity Workplace Tips Phishing Mobility Money Miscellaneous Collaboration Social Media Router Business Intelligence Mobile Device Management BYOD Social Engineering Law Enforcement Facebook Redundancy Remote Monitoring Virtualization Operating System Compliance Flexibility Identity Theft Telephone Systems Budget Blockchain Word VPN Office 365 Productivity Bandwidth Upgrade Managed Service Provider Document Management Proactive IT Private Cloud Connectivity Spam IT Support Quick Tips Managed Service Employer-Employee Relationship Wi-Fi Unified Threat Management Public Cloud Data loss CES Comparison Data storage OneNote Office Tips Encryption Mobile Device Virtual Assistant IT Management Content Management Paperless Office Apps Training Workers Windows 7 Access Control Smart Tech App Microsoft Office Settings Solid State Drive IT Plan Holiday Hacking Data Breach Update Password Credit Cards Big Data Content Filtering Unsupported Software Analysis Website Business Owner Automation Servers Physical Security Information Technology Data Storage Work/Life Balance Government Mobile Computing Value Information Infrastructure File Sharing Spam Blocking Google Drive Networking Windows 10 Bring Your Own Device Sports Computing Infrastructure Mobile Humor Password Manager IT Consultant Save Time Files Digital Signature Machine Learning Business Technology Windows 10s Cables Devices Supercomputer Data Warehousing Voice over Internet Protocol Smart Office HaaS Password Management Windows Server 2008 Remote Work Reputation Internet Exlporer Amazon Web Services Inventory Emergency Wiring Apple HBO IoT Augmented Reality SaaS Professional Services Business Mangement Addiction Leadership YouTube Wireless Technology Cleaning Netflix HIPAA Sync Hybrid Cloud Unified Communications Thought Leadership Multi-Factor Security Safety Entertainment NIST Customer End of Support Online Shopping IBM Patch Management Camera Screen Mirroring Software as a Service Hard Drives iPhone Outlook Specifications Monitor History The Internet of Things USB CrashOverride Tools Gmail Cache Marketing Hacker Trending Strategy Computer Care Telephone System Audit Telephony Theft Streaming Media Current Events Students Cryptocurrency Regulations Internet exploMicrosoft Evernote Authentication Scam PDF Black Market Cast Data Management Frequently Asked Questions Millennials Insurance Downtime Recycling Wireless Internet webinar Lifestyle Cortana Samsung Keyboard Computer Fan Skype Office Google Apps Content Filter Knowledge Human Resources Healthcare Charger Emails Safe Mode Advertising Wireless Charging Nanotechnology Conferencing HVAC Excel Workforce User Error Fraud Practices Hosted Solution MSP Root Cause Analysis Botnet eWaste Wire Software Tips Colocation Accountants FENG Start Menu Relocation Storage Electronic Medical Records Network Congestion Hiring/Firing Health Staff Electronic Health Records Legal Risk Management Flash Fiber-Optic Education Google Docs Enterprise Content Management Tip of the week Telecommuting Amazon Hosted Computing Recovery Remote Worker Meetings Travel Criminal Public Speaking Loyalty Scalability Music Fun Twitter Presentation IT solutions Best Practice Politics Smart Technology Lithium-ion battery Rootkit Audiobook Shadow IT Administration Wearable Technology Proactive Employer Employee Relationship 5G Tech Support Virtual Reality Automobile Remote Monitoring and Maintenance Search Computer Accessories Company Culture Two Factor Authentication Worker Commute Competition Vendor Management Customer Relationship Management Printers Assessment Instant Messaging Troubleshooting Line of Business IP Address Bluetooth Managing Stress Video Games Regulation Users Customer Service Transportation Battery WiFi Techology Books Television How to Mobile Office Domains Remote Computing Experience Wireless Webinar Benefits Worker Content Public Computer