XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 27 May 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Hackers Hosted Solutions Google Mobile Office Productivity Data Hardware Mobile Devices VoIP Quick Tips Gadgets Email Malware IT Support Efficiency Network Social Media Business Management Business Continuity Smartphones IT Services Server Business Virtualization Network Security Miscellaneous Innovation Upgrade Windows Disaster Recovery Communication Microsoft Office Managed IT Services Users Mobile Device Management Computer Communications User Tips Android Passwords Smartphone Browser Marketing WiFi Alert Holiday Data Backup Vendor Management Save Money Cybercrime Operating System Remote Monitoring Windows 10 Mobile Computing Ransomware Information Technology Avoiding Downtime Bring Your Own Device Apple Computers BYOD Best Practice History Outsourced IT Telephone Systems Cloud Computing VPN Data Recovery Big Data Remote Computing IT Solutions The Internet of Things Current Events Chrome Going Green Hacking Automation Social Engineering Spam Employer-Employee Relationship Firewall Phone System Internet of Things Wireless Technology Trending IT Consultant Health Router Application Collaboration BDR Bandwidth Excel Cybersecurity Proactive IT App Printer Office Lithium-ion Battery Budget Windows 8 Tech Term Money How To Business Intelligence iPhone Facebook Two-factor Authentication Mobility Business Managament Content Filtering Artificial Intelligence Recovery Fax Server Maintenance Managed IT Services Value Data Security Private Cloud Website PowerPoint Unified Threat Management Redundancy Networking Law Enforcement Gmail User Error Antivirus Customer Relationship Management Humor Hard Drives Outlook Analytics Mouse Phishing Tutorials Virus Data Protection Managed IT Apps Tablet Computer Repair Search Save Time Tech Support Identity Theft Twitter Office Tips Data Management Streaming Media Risk Management Compliance Flexibility Office 365 Productivity Saving Time Retail Windows 10 Inbound Marketing Downtime Memory Google Drive Network Congestion Conferencing Vulnerability Administration Mobile Device Social Networking Digital Payment HaaS End of Support Robot Safety Wi-Fi Sports Video Surveillance Work/Life Balance Data Breach Online Currency Government Workers Point of Sale Meetings Recycling Document Management IBM Scam Piracy Leadership Statistics Administrator Credit Cards DDoS Solid State Drive Data loss IT Management Encryption Skype Entertainment Black Market Programming Computer Accessories Smart Tech Spam Blocking CES Environment Cleaning Running Cable Settings IT Plan Wireless Physical Security Intranet Training Public Cloud Social Wearable Technology Human Resources SaaS Biometrics Infrastructure IT service Unsupported Software Hacker Best Available OneNote Webinar Data storage Touchscreen Update Bluetooth Word Internet Exlporer People Data Storage eWaste PDF Samsung Comparison Windows 7 Online Shopping Cache Audit Google Docs Staff USB Devices Netflix Entrepreneur Botnet Business Mangement YouTube Tablets Start Menu Theft Webcam Root Cause Analysis Data Warehousing Specifications Reputation Inventory Regulations Evernote Internet exploMicrosoft Wireless Internet Computer Fan Windows Media Player Virtual Desktop Voice over Internet Protocol Digital Signature IT Security Education IoT Supercomputer Hiring/Firing Thought Leadership Cost Management Travel Criminal NarrowBand Print Server Macro HBO Upgrades Analyitcs Mobile Cortana Uninterrupted Power Supply nternet Crowdfunding Co-managed IT Millennials Customers Remote Support PC Care Access Control Servers Wireless Charging Advertising Scheduling FENG Customer Service Multi-Factor Security Strategy Applications 3D Knowledge Files Company Culture Content Filter Patch Management Instant Messaging Chromecast Law Firm IT eBay Consultant Frequently Asked Questions Fraud Distributed Denial of Service 360 Emails Professional Services Google Apps Password Screen Mirroring Workforce Augmented Reality Alerts Authentication Flash Fiber-Optic Notifications LinkedIn Electronic Medical Records Cameras Lifestyle Insurance Colocation Net Neutrality Storage Windows 10s Software as a Service Content Management Laptop Text Messaging Analysis Business Owner Licensing Tip of the week Amazon Nanotechnology Virtual Reality Tools Shadow IT File Sharing Gaming Console Charger Cast WIndows 7 Telecommuting SharePoint Windows 8.1 Update Work Station Sync Cables Hybrid Cloud Hiring/Firing Printer Server Shortcut Display Practices HIPAA IT Support Amazon Web Services IaaS Computing Infrastructure Addiction Worker Commute Blockchain Touchpad Debate Accountants User Windows Server 2008 Connectivity Hosted Solution Bloatware Help Desk Password Manager Legal Computer Care Managing Stress Domains Software Tips Remote Work Relocation Science Telephony Unified Communications Monitor Hosted Computing Keyboard Smart Technology Books Loyalty Congratulations Experience Two Factor Authentication Battery Content Emergency Video Games Music Worker Wire Audiobook Scalability Assessment Rootkit Politics Transportation How to Television Troubleshooting Webinar Techology Benefits Automobile Public Computer IT solutions Thank You Employer Employee Relationship CrashOverride

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *