(707) 268-8850    Get SUPPORT

Network Management Services Blog

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

Delivering Value Through Managed IT Services
VoIP Delivers Benefits That a Traditional Phone Sy...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, November 17 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Hosted Solutions Innovation Backup Mobile Devices VoIP Email Google Data Data Recovery Outsourced IT Tech Term IT Support Microsoft Software Internet of Things Saving Money Cloud Computing Internet IT Services Business Continuity Efficiency Communications BDR Hardware Communication Cybercrime Small Business Cybersecurity Ransomware Smartphones Business Server Disaster Recovery Android User Tips Artificial Intelligence Avoiding Downtime How To Save Money Managed IT Gadgets Network Browser Computers Managed IT Services Alert Smartphone Windows Windows 10 Applications Two-factor Authentication Data Security Data Protection Computer Passwords Vulnerability Productivity Workplace Tips Mobility Business Management Money Collaboration Miscellaneous Chrome Social Media Router Firewall Phishing Business Intelligence BYOD Mobile Device Management Social Engineering Law Enforcement Identity Theft Productivity Redundancy Blockchain Bandwidth Remote Monitoring Operating System Flexibility Virtualization Proactive IT IT Support Budget Telephone Systems Connectivity Office 365 Word VPN Upgrade Compliance Document Management Managed Service Provider Spam Private Cloud Facebook Wi-Fi Quick Tips Content Filtering Smart Tech Public Cloud Employer-Employee Relationship Data loss Office Tips Data storage OneNote Mobile Device Comparison Credit Cards Information Value IT Management Analysis Apps App Networking Windows 7 File Sharing Microsoft Office Solid State Drive Bring Your Own Device Infrastructure Managed Service IT Plan Holiday Unified Threat Management Big Data Hacking Password Update Website Business Owner Sports Information Technology Unsupported Software Virtual Assistant Physical Security Data Storage Work/Life Balance Automation Servers Training Workers CES Government Mobile Computing Settings Windows 10 Google Drive Encryption Spam Blocking Content Management Paperless Office Data Breach Access Control Computing Infrastructure Mobile Gmail Cache Humor webinar Theft Streaming Media Samsung Data Warehousing HaaS Voice over Internet Protocol Strategy Knowledge Windows 10s Files Charger Emails Augmented Reality Reputation Internet Exlporer Students Apple Windows Server 2008 Remote Work Evernote Safe Mode Authentication Wireless Technology Professional Services Recycling MSP Wireless Internet HBO HIPAA HVAC Insurance Conferencing Sync Google Apps Content Filter IBM Hybrid Cloud Multi-Factor Security Entertainment Electronic Medical Records Network Congestion Safety The Internet of Things Customer Screen Mirroring End of Support Software as a Service Human Resources Healthcare Marketing Hacker Hard Drives iPhone USB Wireless Charging Nanotechnology Monitor CrashOverride History Tools eWaste Remote Worker Wire Outlook Specifications Fraud Enterprise Content Management Practices Audit PDF Telephony Black Market Storage Trending Accountants IT Consultant Cast Internet exploMicrosoft Data Management Staff Electronic Health Records Supercomputer Regulations Fiber-Optic Business Technology Downtime Criminal Wiring Emergency Frequently Asked Questions Millennials Keyboard Amazon Password Management Hosted Computing Cortana Computer Fan Skype Password Manager SaaS Office Lifestyle Leadership Cables Devices Cleaning Netflix Advertising Digital Signature Machine Learning Hosted Solution Root Cause Analysis User Error Botnet Camera Smart Office Patch Management Excel Workforce Amazon Web Services NIST Inventory FENG Colocation Start Menu Education Business Mangement Addiction Relocation Software Tips Legal Risk Management IoT Unified Communications Telephone System Thought Leadership Computer Care Google Docs YouTube Current Events Hiring/Firing Health Flash Recovery Meetings Travel Save Time Scam Tip of the week Telecommuting Online Shopping Cryptocurrency Presentation Line of Business Assessment Fun Best Practice Politics Bluetooth Regulation Audiobook Company Culture Lithium-ion battery Shadow IT Transportation Wearable Technology 5G Administration Virtual Reality Books Television Tech Support Managing Stress Webinar Automobile Benefits Worker Commute Public Computer Search Worker Loyalty Customer Relationship Management Competition IT solutions Smart Technology IP Address Instant Messaging Troubleshooting Rootkit Users Video Games Battery Proactive Twitter Customer Service Employer Employee Relationship Techology WiFi Mobile Office How to Domains Remote Computing Experience Wireless Remote Monitoring and Maintenance Computer Accessories Content Two Factor Authentication Vendor Management Public Speaking Printers Scalability Music