ct logo wslogan

2 minutes reading time (419 words)

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Business Computing Cloud Hackers Backup Microsoft Malware Innovation Email Internet Tech Term Android Mobile Devices Data Network Security Cybercrime Small Business VoIP Data Backup Hardware Windows Business Software Efficiency Ransomware Cloud Computing Smartphones Browser Smartphone User Tips Internet of Things Computers How To Business Management Cybersecurity Managed IT Services Collaboration Automation Computer Money Artificial Intelligence Router Business Continuity Productivity Mobile Device Management Chrome Law Enforcement Social Engineering Data Recovery Communication Communications Hosted Solutions Upgrade Network Vulnerability Office 365 Two-factor Authentication Outsourced IT App Connectivity Disaster Recovery Managed IT Services Save Money Bring Your Own Device Safety Gadgets Phishing BDR Operating System Data Breach Spam Social Media Word Bandwidth Data Protection Alert Saving Money Server Windows 10 Telephone Systems Data Security Internet Exlporer IT Management Update Windows 7 OneNote Infrastructure Data storage IT Plan Cleaning CES Physical Security Passwords Sports Password Private Cloud Gmail Unsupported Software Government Redundancy Downtime Content Management Google Drive YouTube Avoiding Downtime Windows 10 Recovery Public Cloud Comparison Spam Blocking Website Blockchain Facebook Virtualization The Internet of Things VPN Applications Productivity Miscellaneous BYOD Wi-Fi Quick Tips Microsoft Office Data Storage IT Services Networking Remote Monitoring IT Support Identity Theft Managed IT Paperless Office Business Intelligence Apps Samsung Telephony Evernote Internet exploMicrosoft Cache Knowledge Human Resources Office Data Management NarrowBand Digital Signature Virtual Assistant History Office Tips IBM Criminal Hacking Marketing Enterprise Content Management Credit Cards Black Market DDoS Inventory Botnet Flexibility Machine Learning HBO Emails Millennials Managed Service Provider Telephone System Value Skype Solid State Drive Wireless Charging Advertising Wireless Internet Network Congestion Multi-Factor Security Staff Relocation Wireless Technology Encryption Hiring/Firing Devices Supercomputer Data loss Password Management Flash Settings Fraud Access Control Travel Password Manager Frequently Asked Questions Workforce Accountants Start Menu Audit Cortana Outlook Wire IT Consultant Trending Patch Management Amazon Automobile User Error Tech Support Thought Leadership Budget Google Docs Screen Mirroring Workplace Tips USB NIST Authentication Root Cause Analysis Business Mangement Legal Excel Telecommuting Health Tools Computer Fan Google Apps Humor Smart Office Software Tips Scam Charger Sync Amazon Web Services Robot Work/Life Balance Shadow IT Cast Cryptocurrency Nanotechnology Recycling Reputation Keyboard Servers Tip of the week Netflix Remote Work Chromecast Practices FENG Employer-Employee Relationship HaaS Entertainment Hybrid Cloud Document Management webinar Specifications Laptop Apple Computer Care Windows 10s Online Shopping End of Support Addiction Current Events Voice over Internet Protocol HIPAA Big Data Safe Mode Uninterrupted Power Supply Going Green Smart Tech Meetings eWaste Mobile Device Customer HVAC Windows Server 2008 Files Electronic Medical Records Hosted Computing Workers Monitor Holiday PDF Conferencing Touchpad iPhone Books Virtual Reality Save Time Video Games Music Rootkit Television Information Technology Battery Firewall Thank You Emergency Worker Commute WiFi Scalability Wearable Technology Training Public Computer CrashOverride Mobility Risk Management Company Culture Webinar Education Smart Technology Loyalty Content Congratulations Search Employer Employee Relationship Vendor Management Politics Managing Stress Bluetooth IT solutions Computing Infrastructure Two Factor Authentication SaaS Techology Audiobook How to Computer Accessories Twitter Instant Messaging Troubleshooting Best Practice Wireless Transportation Experience Remote Computing Worker Users Assessment IT Support Benefits