XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

Delivering Value Through Managed IT Services
VoIP Delivers Benefits That a Traditional Phone Sy...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, August 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Data Hackers Productivity Google Hosted Solutions Hardware Mobile Office Mobile Devices VoIP Gadgets Email Quick Tips Malware Network IT Support Efficiency Social Media Business Management Innovation Miscellaneous Business Continuity Network Security IT Services Smartphones Virtualization Upgrade Business Server Windows Disaster Recovery Communication Microsoft Office Managed IT Services Communications Users Computer Passwords User Tips Mobile Device Management Data Backup Android Smartphone Browser Marketing Holiday Save Money WiFi Alert Data Recovery Vendor Management Remote Monitoring Mobile Computing Windows 10 Tech Term Outsourced IT Ransomware Operating System Cybercrime Internet of Things Bring Your Own Device Apple BYOD BDR Computers Information Technology Avoiding Downtime Cloud Computing The Internet of Things Current Events History Best Practice Router Going Green Big Data Telephone Systems Chrome Remote Computing IT Solutions Automation VPN Social Engineering Artificial Intelligence Phone System Health Employer-Employee Relationship Wireless Technology IT Consultant Spam Application Collaboration Facebook Firewall Hacking Cybersecurity Trending Office Lithium-ion Battery Money Budget Excel Proactive IT App Managed IT Services Printer Bandwidth Networking iPhone Fax Server Maintenance Content Filtering Windows 8 Two-factor Authentication Mobility Recovery Business Intelligence How To Business Managament Virus Applications Customer Relationship Management Hard Drives Gmail Mouse Phishing Value Data Protection Managed IT Apps Antivirus Data Security User Error Private Cloud PowerPoint Unified Threat Management Humor Analytics Redundancy Outlook Law Enforcement Website Tutorials Office 365 Analysis Compliance Conferencing Productivity Flexibility Entertainment Inbound Marketing Tablet Windows 10 Connectivity Sports Search Retail Twitter Google Drive Blockchain Document Management Tech Support IT Support Administration Streaming Media Risk Management Word Vulnerability Mobile Device Social Networking Digital Payment Network Congestion Identity Theft Computer Repair Saving Time Data Management Save Time IT Management Downtime Office Tips File Sharing Memory CES Encryption Computer Accessories Best Available Black Market Data loss IT Plan Webinar Bluetooth Paperless Office Cleaning Password Spam Blocking Training People Wireless Physical Security Content Management Public Cloud Samsung Social Instant Messaging Unsupported Software Infrastructure SaaS Environment Online Currency Settings Update Recycling Touchscreen Point of Sale Data storage Human Resources Education Biometrics OneNote Comparison Scam Internet Exlporer IT service Statistics eWaste PDF Windows 7 Data Storage Hacker Programming HaaS End of Support Video Surveillance Skype Safety Wi-Fi Work/Life Balance Data Breach YouTube Access Control Government Augmented Reality Intranet Smart Tech Running Cable Meetings Wearable Technology Workers Robot Piracy Credit Cards IBM USB Machine Learning Administrator Leadership DDoS Solid State Drive Information Servers Display Advertising Safe Mode Windows Media Player 3D Virtual Desktop Frequently Asked Questions Fraud Storage Hiring/Firing Scheduling Knowledge HVAC Cost Management eBay Workforce Chromecast FENG Nanotechnology Professional Services Google Apps Debate Distributed Denial of Service Files Upgrades Analyitcs Lifestyle Patch Management Practices Managed Service Alerts Flash Fiber-Optic Software as a Service Help Desk Notifications 360 Emails Accountants Business Technology Customer Service Tip of the week Amazon Screen Mirroring Addiction Colocation Enterprise Content Management Text Messaging Telecommuting Laptop Electronic Medical Records Consultant Tools Students Gaming Console Shadow IT Windows 10s Hosted Computing Proactive Work Station Sync Cables SharePoint Business Owner Hybrid Cloud Virtual Assistant Cameras Windows Server 2008 Amazon Web Services Charger Cast Cache IaaS Computing Infrastructure HIPAA Password Management Software Tips Remote Work Touchpad Hiring/Firing Devices Licensing Password Manager IT Security Healthcare Virtual Reality Legal Inventory Remote Monitoring and Maintenance WIndows 7 Telephony Unified Communications Print Server Relocation Google Docs Staff Remote Support Hosted Solution IoT Telephone System Printer Server Shortcut Online Shopping nternet Macro Crowdfunding Monitor Computer Care Wireless Internet Keyboard NIST Worker Commute Co-managed IT Thought Leadership User Botnet Business Mangement Electronic Health Records Bloatware Data Warehousing Specifications Company Culture Audit Line of Business Managing Stress Domains Start Menu Theft Law Firm IT Webcam Science Voice over Internet Protocol Digital Signature Netflix Regulations Evernote Reputation Wire Criminal Internet exploMicrosoft Cryptocurrency HBO LinkedIn Root Cause Analysis Content Filter Travel Supercomputer Entrepreneur Millennials Net Neutrality NarrowBand Computer Fan Authentication MSP Mobile Cortana Tablets Multi-Factor Security Strategy Windows 8.1 Update Uninterrupted Power Supply Insurance PC Care Wireless Charging Customers Smart Office Music Worker Audiobook Scalability Remote Worker Assessment Rootkit Politics How to Wiring Thank You Techology Transportation Television Troubleshooting Webinar Congratulations Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Smart Technology Books Regulation Loyalty Experience Battery Content Video Games Two Factor Authentication Emergency

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *