Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

Tip of the Week: Sync Your Inboxes with IMAP
VoIP Delivers Benefits That a Traditional Phone Sy...
 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Hackers Microsoft Google Backup Software Business Computing Windows 10 Smartphones Business Malware Ransomware Hardware Network Security Hosted Solutions Productivity Small Business Email Computer Android Business Continuity Disaster Recovery Innovation Alert VoIP User Tips Internet Efficiency Data Upgrade Mobile Devices Social Engineering Law Enforcement Data Backup Windows Smartphone Telephone Systems Cybercrime Virtualization App Quick Tips How To Network Money Computers Operating System Server Chrome Collaboration Miscellaneous Social Media Browser Outsourced IT Office Cybersecurity Managed IT Services Managed IT Services Communications Mobile Device Management Router Data Recovery Business Management Password Office Tips Work/Life Balance Remote Computing Communication Spam Wi-Fi Health Artificial Intelligence Google Drive Passwords Automation Windows 10 Office 365 Data Breach Safety Cloud Computing Gadgets Bring Your Own Device Flexibility History Avoiding Downtime Unsupported Software Workplace Tips Automobile Private Cloud Mobility Hacking Saving Money Productivity Gmail Data Management Phishing Internet Exlporer Data storage Word Government Bandwidth Data Security Black Market Public Cloud Spam Blocking Physical Security Holiday IT Services Data Storage Microsoft Office The Internet of Things Two-factor Authentication End of Support HaaS Apps IT Management Facebook Downtime Marketing OneNote Recovery Best Practice Redundancy Samsung Audit Search Scam Managed Service Provider Employer-Employee Relationship Excel BDR Audiobook Tools Humor Current Events Screen Mirroring Uninterrupted Power Supply Comparison VPN Sync Amazon Keyboard Root Cause Analysis Website Computing Infrastructure Laptop Value Computer Fan How to Software Tips Tip of the week Telecommuting Entertainment Instant Messaging Chromecast Knowledge Cast Specifications Notifications Amazon Web Services Legal Experience DDoS Voice over Internet Protocol Applications Touchpad User Error Netflix Monitor Wireless FENG Remote Monitoring Going Green webinar BYOD Windows Server 2008 Remote Work Techology Managed IT Network Congestion Cleaning HBO Business Intelligence Internet of Things Hybrid Cloud Windows 10s Save Money Telephony Online Shopping Mobile Device Music Meetings Users IT Support Update Conferencing Lithium-ion battery Windows 7 Identity Theft Botnet Apple IT Consultant Tech Support Outlook Millennials PDF Vulnerability YouTube Skype Evernote Video Games Wearable Technology NarrowBand Multi-Factor Security Virtual Reality Internet exploMicrosoft IT Support Risk Management Reputation Battery Files Emails Flash Credit Cards Solid State Drive Travel Patch Management iPhone Leadership IT Plan Shadow IT Frequently Asked Questions Workforce Content Robot Information Technology Computer Care Start Menu Scalability USB Wireless Technology Relocation Networking Data loss Trending Worker Commute Advertising Settings Fraud Politics Customers Google Docs Education Encryption Sports Troubleshooting Rootkit Television Employer Employee Relationship IT solutions Transportation Big Data Training Public Computer Electronic Medical Records Computer Accessories Loyalty Benefits Thank You Books Vendor Management Save Time Bluetooth SaaS Firewall Congratulations Emergency Charger Hiring/Firing WiFi Smart Technology Worker Assessment CrashOverride Two Factor Authentication Webinar

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.