Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

Tip of the Week: Sync Your Inboxes with IMAP
VoIP Delivers Benefits That a Traditional Phone Sy...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, December 15 2018

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Best Practices Technology Cloud Hackers Microsoft Backup Google Business Computing Software Windows 10 Smartphones Malware Business Productivity Hosted Solutions Ransomware Hardware Network Security Business Continuity Disaster Recovery Innovation Small Business Android Email Computer VoIP User Tips Alert Internet Efficiency Data Law Enforcement Smartphone Telephone Systems Upgrade Windows Cybercrime Social Engineering Mobile Devices Data Backup Browser Communications Managed IT Services Server How To Miscellaneous Social Media App Office Virtualization Network Operating System Chrome Quick Tips Money Cybersecurity Managed IT Services Collaboration Computers Outsourced IT Health Data Recovery Automation Google Drive Communication Flexibility Gadgets Safety Spam Password Bring Your Own Device Work/Life Balance History Office Tips Windows 10 Router Wi-Fi Mobile Device Management Artificial Intelligence Remote Computing Data Breach Cloud Computing Business Management Office 365 Passwords Physical Security Unsupported Software End of Support Word The Internet of Things Data Security Recovery Best Practice Downtime Phishing Spam Blocking Workplace Tips Automobile Mobility Marketing Two-factor Authentication Productivity Gmail Data Storage Saving Money Internet Exlporer Data Management Bandwidth Holiday Microsoft Office Private Cloud IT Services IT Management Hacking Redundancy HaaS OneNote Data storage Apps Facebook Black Market Public Cloud Avoiding Downtime Government Touchpad User Error Tools Lithium-ion battery Video Games Wearable Technology Networking Data loss Comparison Virtual Reality Settings Sync Amazon Tech Support IT Support Risk Management Monitor Wireless Website Battery Going Green Content Samsung Audit Internet of Things Hybrid Cloud YouTube Patch Management Employer-Employee Relationship Tip of the week Telecommuting Scalability USB Current Events Screen Mirroring Specifications Worker Commute Amazon Web Services Shadow IT Politics Root Cause Analysis Voice over Internet Protocol Education Remote Work Audiobook Value Computer Fan PDF Remote Monitoring Search Scam Software Tips Apple Windows Server 2008 Internet exploMicrosoft Managed IT Encryption Sports Knowledge Cast NarrowBand HBO Business Intelligence Telephony Online Shopping Keyboard Reputation Computing Infrastructure Netflix Files Windows 7 Identity Theft Uninterrupted Power Supply Entertainment FENG Robot Information Technology Update How to webinar BYOD iPhone Windows 10s Advertising Botnet VPN Instant Messaging Network Congestion Wireless Technology Relocation Outlook Millennials Skype Evernote Legal Experience Meetings Customers Multi-Factor Security Applications IT Support Flash Credit Cards Techology Conferencing Managed Service Provider Vulnerability Travel Notifications IT Consultant Humor Frequently Asked Questions Workforce DDoS Start Menu Mobile Device Music Trending Users Laptop Fraud Cleaning Google Docs Emails Computer Care Solid State Drive Save Money Leadership IT Plan Chromecast Excel BDR Regulation Hiring/Firing Worker Assessment CrashOverride Congratulations Smart Technology Webinar Rootkit Television Two Factor Authentication Employer Employee Relationship IT solutions Training Troubleshooting Public Computer Computer Accessories Loyalty Transportation Vendor Management Big Data Electronic Medical Records Bluetooth SaaS WiFi Benefits Charger Books Compliance Save Time Thank You Firewall Emergency

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.