GTSS has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Best Practices Technology Cloud Hackers Microsoft Backup Google Business Computing Software Smartphones Windows 10 Malware Business Ransomware Hosted Solutions Hardware Network Security Productivity Business Continuity Innovation Android Disaster Recovery Small Business Email Computer Alert User Tips Data VoIP Internet Efficiency Upgrade Windows Social Engineering Mobile Devices Telephone Systems Smartphone Cybercrime Data Backup Law Enforcement Miscellaneous Computers Network Communications Operating System Managed IT Services Cybersecurity App Social Media Office Browser How To Server Quick Tips Collaboration Outsourced IT Virtualization Money Chrome Managed IT Services Business Management Work/Life Balance Wi-Fi Artificial Intelligence Data Recovery Office 365 Communication Windows 10 Health Cloud Computing Google Drive Passwords Password History Gadgets Router Automation Spam Safety Bring Your Own Device Office Tips Data Breach Remote Computing Flexibility Mobile Device Management Automobile Mobility Marketing Redundancy Black Market Avoiding Downtime Recovery Microsoft Office The Internet of Things Private Cloud Apps Facebook Hacking Data Storage Public Cloud Saving Money Internet Exlporer Physical Security IT Management OneNote Workplace Tips Downtime Unsupported Software Holiday Phishing IT Services Best Practice Spam Blocking HaaS Word Productivity Data storage Gmail Government Data Security Data Management Two-factor Authentication Bandwidth End of Support Computer Care Cleaning Credit Cards Flash Solid State Drive Data loss Keyboard Networking Save Money Apple Travel Trending How to Internet exploMicrosoft Samsung Tech Support Fraud Reputation Audit Screen Mirroring Current Events YouTube Legal Patch Management iPhone Advertising Comparison Going Green Value Shadow IT Amazon Customers Sync Computer Fan Cast Knowledge Mobile Device Scam Managed Service Provider Specifications Netflix Amazon Web Services FENG Network Congestion NarrowBand Video Games Remote Monitoring Business Intelligence IT Support Battery Content Online Shopping Experience Telephony IT Consultant Wireless Technology Scalability Update Hybrid Cloud Millennials Internet of Things Outlook Education DDoS Audiobook Evernote Music Skype IT Plan Leadership PDF Workforce Frequently Asked Questions Settings Laptop Computing Infrastructure Entertainment Wearable Technology Lithium-ion battery Start Menu Employer-Employee Relationship Chromecast Instant Messaging Files Google Docs Information Technology BDR Robot Excel Touchpad Applications Techology USB Relocation Tools Root Cause Analysis Software Tips Website Telecommuting Tip of the week Users Sports Encryption Humor BYOD webinar Voice over Internet Protocol Uninterrupted Power Supply Remote Work Windows Server 2008 Windows 10s Virtual Reality Risk Management VPN IT Support Managed IT Meetings Conferencing User Error Wireless Identity Theft Monitor Windows 7 Vulnerability Worker Commute Politics Notifications Botnet HBO Emails Search Multi-Factor Security Emergency Webinar Hiring/Firing IT solutions Employer Employee Relationship Computer Accessories Loyalty Transportation Bluetooth SaaS Benefits Firewall WiFi Thank You Worker Assessment CrashOverride Smart Technology Congratulations Rootkit Television Two Factor Authentication Training Public Computer Troubleshooting Vendor Management Big Data Electronic Medical Records Charger Books Save Time

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.