Female Rep2


 "Real People, Real Solutions"

Have IT Questions?
Call us now (888) 894-6411


Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

Delivering Value Through Managed IT Services
VoIP Delivers Benefits That a Traditional Phone Sy...

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Backup Hackers Network Security Malware Hosted Solutions Microsoft VoIP Google nonprofit bgc Software Email Mobile Devices roundup Alert Disaster Recovery Managed IT Services Data Outsourced IT Business Business Continuity Internet Innovation communications Windows 10 Hardware Smartphones Ransomware Tech Term IT Services Data Backup Saving Money Browser Managed IT Services Android Cybercrime Computers Server Small Business Computer Efficiency IT Support Cloud Computing Save Money Smartphone Business Management Productivity Data Recovery Internet of Things Network Windows User Tips BDR Passwords Office Managed IT Recovery Miscellaneous Mobile Device Management Cybersecurity Quick Tips IT Support Money Social Engineering Telephone Systems BYOD Social Media Vulnerability Productivity Gadgets Hacking Mobility Upgrade Law Enforcement Facebook Artificial Intelligence Work/Life Balance Virtualization Communication Phishing Collaboration Applications Microsoft Office Proactive IT Flexibility Budget Private Cloud Bandwidth Firewall Bring Your Own Device App How To Data Protection Router Wi-Fi Password Automation Office Tips Compliance Avoiding Downtime Holiday Office 365 Chrome Managed Service Provider Remote Monitoring Health VPN Two-factor Authentication Business Intelligence Remote Computing Word Google Drive Mobile Device Apps Information Technology Value History Black Market Operating System Safety Workplace Tips Connectivity Data Security Redundancy Data Breach HaaS Windows 10 Identity Theft The Internet of Things Patch Management Automobile OneNote Government Credit Cards PDF Blockchain Samsung Solid State Drive Computing Infrastructure Charger Marketing Scam Data Management USB Windows 7 Sports Keyboard Spam Electronic Medical Records Entertainment Unsupported Software Battery Content Filtering Physical Security Data Storage Website Infrastructure Paperless Office Mobile Computing Worker Business Owner Employer-Employee Relationship Spam Blocking Wireless Technology Emergency YouTube IT Management Big Data Document Management Information SaaS Hiring/Firing End of Support Cleaning Comparison Data storage CES Training Workers Legal IT Plan Servers Encryption Save Time Update HIPAA Content Management Computer Care Risk Management Evernote Vendor Management Best Practice Access Control Content Trending IBM Robot Gmail Networking Hosted Solution Flash Accountants MSP Screen Mirroring WiFi Assessment Cortana Search Wire Windows Server 2008 Computer Accessories Conferencing Customers Virtual Reality Virtual Assistant Laptop Relocation Thought Leadership Politics Chromecast Outlook Millennials IT Consultant Sync Wireless Charging Settings Authentication Audiobook Data Warehousing Lifestyle Supercomputer Files Recycling Enterprise Content Management File Sharing Cast Google Docs Television CrashOverride Google Apps How to Smart Office Fraud Bluetooth Netflix Human Resources Worker Commute Telephone System Touchpad Mobile Audit Humor Twitter Workforce Leadership Hacker Telephony Fiber-Optic Video Games Nanotechnology NarrowBand Transportation Current Events eWaste Password Management Practices Augmented Reality Public Computer Apple Troubleshooting Regulations Amazon Staff Regulation Professional Services Loyalty Computer Fan Scalability Addiction Experience Frequently Asked Questions Telecommuting Internet Exlporer Going Green Skype Cables Unified Threat Management Smart Tech Software Tips Benefits Knowledge Criminal Education NIST Rootkit Hosted Computing Remote Worker Voice over Internet Protocol iPhone Password Manager Machine Learning Amazon Web Services Techology Digital Signature Meetings Software as a Service FENG Cache Excel Remote Work Start Menu Unified Communications Windows 10s Smart Technology Network Congestion User Error Cryptocurrency Wireless Inventory Wiring Multi-Factor Security Downtime Business Mangement Shadow IT HVAC Books Online Shopping Managed Service Data loss Instant Messaging Wireless Internet Tip of the week Employer Employee Relationship webinar Reputation Advertising Users Safe Mode Tools Theft Public Cloud Hard Drives Devices HBO Specifications Two Factor Authentication Monitor Colocation Congratulations nonprofits Thank You