ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Google Hackers Cloud Backup Microsoft Innovation Android Small Business Email Internet Network Security Business Cybercrime Software Ransomware Efficiency Malware Data Smartphones Hardware How To VoIP Data Backup Smartphone Windows Computers Mobile Devices Cybersecurity Cloud Computing Browser User Tips Chrome Mobile Device Management Productivity Social Engineering Business Management Business Continuity Managed IT Services Safety Money Phishing Bring Your Own Device Data Breach Spam Two-factor Authentication Law Enforcement Gadgets Data Security Upgrade Vulnerability Outsourced IT Bandwidth Data Protection Alert Telephone Systems Collaboration Managed IT Services Internet of Things Data Recovery Computer Communication Operating System Tech Term Social Media Windows 10 Server Network App Automation Disaster Recovery Word Save Money Passwords Router Gmail Government Spam Blocking Identity Theft BYOD Miscellaneous IT Services The Internet of Things Virtualization Hosted Solutions Redundancy Avoiding Downtime Comparison Cleaning Physical Security Artificial Intelligence Downtime BDR Remote Monitoring Private Cloud Google Drive Business Intelligence Windows 10 Update Wi-Fi Public Cloud Recovery Data Storage Quick Tips VPN CES Apps IT Management Communications Office 365 Saving Money OneNote IT Plan Internet Exlporer Data storage Unsupported Software Productivity Tip of the week Password Relocation Inventory Remote Work Employer-Employee Relationship Outlook Big Data Root Cause Analysis Software Tips HIPAA Electronic Medical Records Voice over Internet Protocol Windows Server 2008 Access Control Charger Workers Humor Managed IT YouTube User Error webinar Human Resources Windows 7 HaaS Windows 10s Authentication Computer Care Credit Cards Networking Infrastructure Botnet Meetings Reputation Conferencing Staff Hiring/Firing Multi-Factor Security Flash Apple Samsung Fraud Holiday IBM Password Manager Monitor Patch Management Travel End of Support Uninterrupted Power Supply HBO Customer Emails Trending Going Green Black Market Flexibility iPhone Solid State Drive Value Amazon Supercomputer Business Mangement Scam NarrowBand Internet exploMicrosoft Data Management Data loss Office Tips Hacking Digital Signature Marketing Sync Managed Service Provider Audit Amazon Web Services Budget Recycling Wireless Technology Advertising Screen Mirroring Encryption Specifications Automobile Legal Sports Computer Fan Online Shopping eWaste Cast Tech Support Netflix Accountants Work/Life Balance Keyboard Robot Telephony Health FENG Evernote Current Events Criminal Facebook Shadow IT IT Support Millennials Microsoft Office Laptop Skype Mobile Device Wireless Charging Knowledge Chromecast Hybrid Cloud Practices Workforce Touchpad Frequently Asked Questions Cortana Start Menu Files Network Congestion Content Management Google Docs PDF Excel Office Settings Hosted Computing Telecommuting Google Apps Tools History IT Consultant Blockchain Website DDoS Thank You Vendor Management Content Workplace Tips Computing Infrastructure Techology Congratulations Audiobook Books Instant Messaging Save Time Applications Entertainment Emergency Users Wireless IT Support Nanotechnology Employer Employee Relationship Virtual Reality Smart Tech Webinar Computer Accessories Worker Commute Mobility Connectivity Loyalty Risk Management Transportation Search IT solutions Bluetooth Politics Devices SaaS Benefits How to Best Practice Thought Leadership Firewall Worker Experience Wearable Technology Assessment Smart Technology WiFi Rootkit Music USB Video Games Remote Computing Television Two Factor Authentication Battery Training Public Computer Troubleshooting Scalability CrashOverride Education Information Technology