ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Hackers Backup Business Computing Microsoft Cloud Small Business Business Smartphones Email Innovation Hardware Android Cybercrime Ransomware Efficiency VoIP Software Windows Malware Data How To Data Backup User Tips Productivity Business Management Cybersecurity Managed IT Services Social Engineering Internet Business Continuity Mobile Devices Chrome Computers Network Security Bring Your Own Device Mobile Device Management App Gadgets Upgrade Money Cloud Computing Telephone Systems Windows 10 Smartphone Law Enforcement Computer Two-factor Authentication Outsourced IT Alert Collaboration Managed IT Services Data Breach Spam Browser Data Recovery Server Automation Communication Operating System Disaster Recovery Safety Social Media Office 365 Communications BDR Miscellaneous The Internet of Things Hosted Solutions Router Bandwidth Data Storage Government Word IT Management OneNote Downtime Unsupported Software Windows 10 Recovery Phishing Spam Blocking Redundancy Quick Tips Artificial Intelligence Physical Security Avoiding Downtime Saving Money Private Cloud Data Security Network Google Drive Internet Exlporer Vulnerability Public Cloud Data storage Wi-Fi Save Money Passwords Update Gmail Audit Files Millennials Budget Wireless Charging Skype Humor YouTube Screen Mirroring Office Frequently Asked Questions Computer Fan History Workforce Virtualization Cortana Start Menu Cast Password Netflix Relocation Google Docs Excel FENG Telecommuting Current Events Google Apps Tools Monitor Going Green Uninterrupted Power Supply IT Support Website Tip of the week Black Market User Error Remote Work Knowledge Employer-Employee Relationship NarrowBand Office Tips HaaS Voice over Internet Protocol Windows Server 2008 Internet of Things IT Services Identity Theft Network Congestion Workers Reputation Managed IT Wireless Technology IT Plan Holiday Cleaning Settings Apple Windows 7 Sports End of Support Credit Cards IT Consultant Infrastructure Customer Productivity Botnet Tech Support Flexibility iPhone Multi-Factor Security Fraud Flash Robot Root Cause Analysis Internet exploMicrosoft Software Tips Marketing Password Manager Hacking Travel Laptop Shadow IT Managed Service Provider Charger Trending Amazon Advertising BYOD webinar Chromecast Automobile Touchpad Windows 10s Computer Care Comparison Networking Amazon Web Services Sync Meetings Work/Life Balance Conferencing Hiring/Firing Keyboard Health Samsung Specifications IBM Online Shopping Patch Management Microsoft Office HBO DDoS Facebook Emails Remote Monitoring Solid State Drive Value Business Intelligence Hybrid Cloud Supercomputer Evernote Scam Telephony Outlook Apps Data loss Webinar Computer Accessories Music Video Games Congratulations Loyalty PDF Transportation Battery IT solutions Bluetooth WiFi Scalability SaaS Information Technology Benefits Education Content Workplace Tips Firewall Computing Infrastructure Audiobook Techology Worker Wearable Technology Instant Messaging Assessment Data Management Smart Technology Applications Entertainment Rootkit USB Television Wireless Two Factor Authentication Users IT Support Training Troubleshooting CrashOverride Public Computer Virtual Reality Vendor Management Big Data Electronic Medical Records Worker Commute Risk Management Mobility Books VPN Search Business Mangement Save Time Politics Legal Emergency Remote Computing How to Recycling Best Practice eWaste Employer Employee Relationship Experience Mobile Device Thank You