GTSS Blog

GTSS has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 16 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Hackers Microsoft Backup Google Software Business Computing Smartphones Windows 10 Business Malware Network Security Productivity Ransomware Hosted Solutions Hardware Disaster Recovery Small Business Computer Email Business Continuity Innovation Android VoIP Efficiency Internet Alert User Tips Data Mobile Devices Smartphone Telephone Systems Law Enforcement Cybercrime Data Backup Upgrade Windows Social Engineering Office Managed IT Services Cybersecurity Browser Quick Tips Server Collaboration Outsourced IT Money How To Virtualization Managed IT Services Miscellaneous Chrome Computers Communications Network Operating System App Social Media Windows 10 Password Passwords Cloud Computing History Data Recovery Router Gadgets Communication Automation Safety Bring Your Own Device Spam Flexibility Office Tips Remote Computing Mobile Device Management Work/Life Balance Data Breach Business Management Wi-Fi Artificial Intelligence Office 365 Health Google Drive IT Management Redundancy Avoiding Downtime Holiday OneNote IT Services Best Practice HaaS Unsupported Software Data storage Government Phishing Gmail Spam Blocking Data Management End of Support Productivity Bandwidth Automobile Mobility Data Security Marketing Black Market Microsoft Office Recovery Apps Word Private Cloud Hacking The Internet of Things Facebook Public Cloud Physical Security Two-factor Authentication Saving Money Internet Exlporer Data Storage Workplace Tips Downtime Experience Entertainment Trending Fraud Instant Messaging IT Consultant Files Laptop Lithium-ion battery Applications Information Technology Robot Relocation Chromecast Music Comparison Techology Amazon IT Plan Sync Leadership Touchpad Users Settings Humor Wearable Technology Specifications Amazon Web Services Employer-Employee Relationship Encryption Virtual Reality Remote Monitoring Sports USB Risk Management Business Intelligence Root Cause Analysis IT Support Online Shopping Software Tips Telephony User Error Uninterrupted Power Supply Worker Commute Update Wireless Monitor VPN Outlook Politics Millennials Evernote BYOD Search Skype webinar Notifications Windows 10s Frequently Asked Questions Apple Keyboard Workforce Meetings How to Start Menu Conferencing Internet exploMicrosoft Cleaning Save Money Google Docs Vulnerability Reputation Excel iPhone BDR Legal HBO Tools Emails Advertising Tech Support YouTube Website Solid State Drive Computer Care Customers Mobile Device Tip of the week Networking Managed Service Provider Going Green Telecommuting Data loss Shadow IT Voice over Internet Protocol Audit Samsung Video Games Windows Server 2008 Current Events Patch Management Remote Work Screen Mirroring Battery Managed IT NarrowBand Content Computer Fan Value Cast Scalability Windows 7 Knowledge Scam Identity Theft Education Botnet Netflix Hybrid Cloud Internet of Things Wireless Technology Audiobook Multi-Factor Security FENG Flash Network Congestion DDoS Credit Cards Computing Infrastructure Travel IT Support PDF SaaS Thank You Benefits Congratulations Firewall Worker Assessment CrashOverride Smart Technology Rootkit Television Two Factor Authentication Training Public Computer Troubleshooting WiFi Vendor Management Big Data Electronic Medical Records Charger Books Save Time Emergency Webinar Hiring/Firing IT solutions Employer Employee Relationship Computer Accessories Loyalty Transportation Bluetooth

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.