XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

Delivering Value Through Managed IT Services
VoIP Delivers Benefits That a Traditional Phone Sy...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 16 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Software Workplace Tips Managed Service Provider Business Computing Hackers Data Small Business Hosted Solutions Hardware Mobile Devices Productivity Google Mobile Office VoIP Email Gadgets Malware Quick Tips Network Security IT Support Network Efficiency Innovation Social Media Business Management IT Services Miscellaneous Business Continuity Smartphones Upgrade Server Business Virtualization Windows Communication Disaster Recovery Computer Communications Managed IT Services Microsoft Office User Tips Users Data Backup Passwords Browser Mobile Device Management Android Save Money Smartphone Marketing Holiday Ransomware Alert WiFi Data Recovery Mobile Computing Outsourced IT Tech Term Vendor Management Operating System Remote Monitoring Cybercrime Internet of Things Windows 10 Avoiding Downtime BDR Computers Bring Your Own Device Apple BYOD Cloud Computing Information Technology VPN Current Events Telephone Systems Best Practice History Chrome Automation Big Data Remote Computing Router IT Solutions Going Green Firewall The Internet of Things Artificial Intelligence Health Application Phone System Collaboration Spam Wireless Technology Hacking IT Consultant Social Engineering Cybersecurity Employer-Employee Relationship Facebook Trending Budget Money Proactive IT Lithium-ion Battery Bandwidth Managed IT Services Excel App Printer Office Business Managament Two-factor Authentication Mobility Windows 10 Fax Server Recovery iPhone Maintenance Windows 8 Content Filtering Business Intelligence Applications Networking How To Unified Threat Management Tutorials Managed IT Virus Phishing Sports Data Protection Value Customer Relationship Management Hard Drives Training Mouse Private Cloud Data Security Redundancy Antivirus Law Enforcement Office 365 Website Analytics Apps User Error Gmail Humor Outlook Productivity PowerPoint Analysis Search Tablet Network Congestion Twitter Blockchain Connectivity Word Document Management IT Support Streaming Media Risk Management Vulnerability Inbound Marketing Tech Support Identity Theft Save Time Data Management Scam Saving Time Office Tips Administration Encryption Compliance Mobile Device IT Management Social Networking Downtime Digital Payment Flexibility Computer Repair File Sharing Memory Entertainment Information Retail Google Drive Conferencing Settings IBM People Human Resources Data storage Spam Blocking Piracy Content Management Unsupported Software Samsung Administrator Infrastructure Biometrics Leadership Internet Exlporer Managed Service eWaste Paperless Office Webinar IT service Hacker Computer Accessories Update Online Currency PDF Point of Sale Safety Wi-Fi Recycling HaaS End of Support YouTube Education Government OneNote Comparison Virtual Assistant Social Windows 7 Statistics Meetings USB Robot Data Storage Skype Programming DDoS Data Breach Telephone System Touchscreen Solid State Drive Work/Life Balance Credit Cards Running Cable Black Market Augmented Reality Intranet Access Control Workers Wearable Technology Smart Tech Servers Wireless Physical Security Cleaning Password Fraud Video Surveillance CES Public Cloud IT Plan Best Available Instant Messaging SaaS Machine Learning Data loss Bluetooth Environment Tip of the week Amazon Patch Management Storage Software as a Service Cameras Hybrid Cloud Safe Mode Telecommuting Licensing Touchpad 360 Nanotechnology Emails Remote Worker Tools IaaS Computing Infrastructure HVAC Screen Mirroring Legal Practices Sync Cables Virtual Reality Relocation Electronic Medical Records PC Care WIndows 7 Scheduling Windows Server 2008 Amazon Web Services Monitor Addiction Windows 10s Virtual Private Network 3D Printer Server Shortcut Business Owner Accountants Business Technology Software Tips Remote Work User Wiring Help Desk eBay Password Manager Worker Commute Charger Enterprise Content Management Cast HIPAA Hosted Computing Proactive Telephony Unified Communications IT Security Bloatware Hiring/Firing Students Alerts Managing Stress Domains Online Shopping Print Server Science Reputation Cache Project Management Google Docs Staff nternet Crowdfunding Hosted Solution Devices GDPR Text Messaging Botnet Remote Support Business Mangement Internet exploMicrosoft Computer Care Password Management NarrowBand Keyboard Inventory Remote Monitoring and Maintenance Gaming Console Start Menu Theft Entrepreneur Healthcare Work Station Data Warehousing Specifications IoT Regulations Evernote Law Firm IT Tablets Customers Wireless Internet Audit Warranty Voice over Internet Protocol Digital Signature Company Culture Uninterrupted Power Supply Macro HBO Hiring/Firing Thought Leadership Netflix E-Commerce Travel Criminal Windows Media Player Virtual Desktop Advertising NIST Millennials LinkedIn Chromecast Line of Business Mobile Cortana Cost Management Distributed Denial of Service Files Electronic Health Records Root Cause Analysis Co-managed IT Supercomputer Wireless Charging Upgrades Analyitcs Wire Computer Fan Multi-Factor Security Strategy Net Neutrality Frequently Asked Questions Content Filter Camera Windows 8.1 Update Customer Service Notifications Cryptocurrency Workforce Consultant Laptop Authentication MSP Professional Services Google Apps Display Colocation Insurance Knowledge Webcam Flash Fiber-Optic Debate SharePoint Smart Office FENG Lifestyle Shadow IT Printers Assessment Rootkit Politics Transportation Television Troubleshooting Webinar Thank You Benefits Automobile Public Computer Battery IT solutions Video Games Congratulations Employer Employee Relationship CrashOverride Smart Technology Books Loyalty Scalability Experience Content Regulation Two Factor Authentication Emergency How to Music Worker Techology Audiobook

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name *
      • Number of Participants *
      • First Name *
      • Last Name *
      • Phone *
      • Yes, subscribe me to: