Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

Tip of the Week: Sync Your Inboxes with IMAP
VoIP Delivers Benefits That a Traditional Phone Sy...


Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Tag Cloud

Tip of the Week Security Privacy Best Practices Technology Cloud Hackers Microsoft Backup Google Software Business Computing Windows 10 Smartphones Business Malware Hardware Network Security Ransomware Productivity Hosted Solutions Email Computer Android Business Continuity Innovation Small Business Disaster Recovery Data VoIP User Tips Internet Efficiency Alert Windows Cybercrime Data Backup Mobile Devices Smartphone Telephone Systems Law Enforcement Upgrade Social Engineering Managed IT Services Chrome Communications Cybersecurity Managed IT Services App Quick Tips Browser Money Computers How To Virtualization Server Collaboration Network Outsourced IT Social Media Miscellaneous Operating System Office Remote Computing Bring Your Own Device Windows 10 Flexibility Passwords History Data Breach Mobile Device Management Cloud Computing Router Data Recovery Communication Password Business Management Work/Life Balance Gadgets Wi-Fi Health Artificial Intelligence Google Drive Automation Spam Office 365 Office Tips Safety Redundancy Marketing Avoiding Downtime IT Management Workplace Tips OneNote Automobile Mobility Data Security Productivity Private Cloud Word Hacking Recovery Data storage Best Practice Unsupported Software Government Black Market Public Cloud Physical Security Two-factor Authentication Holiday IT Services Microsoft Office Phishing The Internet of Things Spam Blocking Apps End of Support HaaS Saving Money Gmail Facebook Data Management Internet Exlporer Downtime Bandwidth Data Storage Google Docs IT Support DDoS Patch Management Files Fraud Notifications Meetings Content Reputation Conferencing Scalability USB iPhone Excel BDR Worker Commute Robot Information Technology Politics Wireless Technology Relocation Comparison Vulnerability Cleaning Education Advertising Tools IT Consultant Website Search Scam Sync Amazon Save Money Audiobook Customers Emails Managed Service Provider Tip of the week Telecommuting Lithium-ion battery Keyboard Humor Specifications Computer Care Solid State Drive Tech Support Computing Infrastructure Leadership IT Plan Voice over Internet Protocol Settings How to Laptop Amazon Web Services Networking Data loss YouTube Entertainment Instant Messaging Windows Server 2008 Remote Work Remote Monitoring Legal Experience Chromecast HBO Business Intelligence Samsung Audit Shadow IT Applications Managed IT Employer-Employee Relationship Touchpad User Error Telephony Online Shopping Current Events Screen Mirroring Techology Going Green Windows 7 Identity Theft Encryption Root Cause Analysis Sports Monitor Wireless Update Software Tips Mobile Device Music Outlook Millennials Value Computer Fan Users Internet of Things Hybrid Cloud Botnet Multi-Factor Security Uninterrupted Power Supply Skype Evernote Knowledge Cast Netflix Flash Credit Cards VPN webinar BYOD Video Games Wearable Technology Apple Frequently Asked Questions Workforce FENG Virtual Reality PDF Travel IT Support Risk Management NarrowBand Trending Windows 10s Battery Internet exploMicrosoft Start Menu Network Congestion Bluetooth SaaS Charger Two Factor Authentication Regulation Thank You Troubleshooting Congratulations Worker Transportation Webinar Big Data Assessment CrashOverride Electronic Medical Records Rootkit Benefits Employer Employee Relationship IT solutions Books Television Save Time Training Firewall Computer Accessories Emergency Public Computer WiFi Loyalty Hiring/Firing Vendor Management Smart Technology Compliance

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.