Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 26 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Technology Best Practices Cloud Business computing Google Software Network Security Microsoft Malware Hackers Backup Internet Windows 10 Business Email Android Smartphones Alert Data Small Business Browser Business Continuity Innovation Hosted Solutions Managed IT Services Hardware Office VoIP Ransomware Computers Disaster Recovery Business Management Smartphone Law Enforcement Cybercrime Computer Productivity Outsourced IT Cloud Computing User Tips Efficiency Chrome Collaboration Cybersecurity Tech Term Virtualization Mobile Devices IT Services Data Backup Telephone Systems Communications Productivity How To Password Social Media Quick Tips Windows Artificial Intelligence Work/Life Balance Money Social Engineering Communication Miscellaneous Managed IT Services Router App Passwords Health Private Cloud Hacking Holiday Phishing Internet of Things Wi-Fi Data Breach Google Drive HaaS IT Support Vulnerability Apps Spam Two-factor Authentication Mobile Device Management Bring Your Own Device Facebook Office 365 Data Recovery Data Security Network Automation Saving Money Office Tips Data Protection Upgrade Windows 10 IT Management Employer-Employee Relationship Remote Computing Government Spam Blocking VPN Gadgets IT Plan Public Cloud Operating System Marketing Word Automobile Website Unsupported Software CES Managed IT Data Management History Workplace Tips Worker Big Data Samsung Bandwidth BYOD Flexibility Identity Theft PDF Battery Value Infrastructure Electronic Medical Records Server Mobility Redundancy Managed Service Provider Microsoft Office Avoiding Downtime Legal Charger Comparison Keyboard Patch Management Applications Remote Monitoring Cleaning End of Support Scam Mobile Device Computer Care Business Intelligence Data Storage Update OneNote Entertainment Criminal Computer Accessories Workforce Excel USB Black Market Devices Wireless Charging Tools Firewall Scalability Techology Bluetooth Google Docs Accountants BDR Tip of the week Troubleshooting Thought Leadership Cortana Smart Technology Downtime Files webinar Telecommuting Hybrid Cloud Windows Server 2008 Windows 10s Safety Google Apps Two Factor Authentication Root Cause Analysis Voice over Internet Protocol Software Tips Risk Management Conferencing Content Management Practices Remote Work Windows 7 Apple Addiction Workers Botnet Politics Emails Instant Messaging Blockchain Rootkit Hosted Computing Flash Books iPhone Solid State Drive Networking Cache Travel Meetings Training Multi-Factor Security User Error Relocation HIPAA Inventory Credit Cards Audit Education Loyalty Current Events Wireless Internet Password Manager Save Money Monitor Vendor Management Trending Physical Security IT solutions Human Resources SaaS Access Control Fraud Information Technology Sync Emergency Computer Fan Computing Infrastructure Data loss Knowledge Business Mangement Save Time Internet Exlporer Humor IT Support Staff Authentication Amazon The Internet of Things Screen Mirroring Network Congestion Best Practice Gmail Data storage Specifications HBO Experience Assessment Nanotechnology Amazon Web Services Telephony FENG Users Cast Content IT Consultant Recycling Recovery Hiring/Firing Internet exploMicrosoft Outlook Music Settings Search Digital Signature Television Smart Tech Online Shopping Skype Transportation Virtual Reality Audiobook Leadership Video Games eWaste Employer Employee Relationship Millennials Advertising Frequently Asked Questions Wearable Technology How to Encryption Public Computer Connectivity Evernote Wireless Start Menu Benefits Worker Commute WiFi CrashOverride Twitter Webinar Wire Sports Thank You Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.
Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...