XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

Delivering Value Through Managed IT Services
VoIP Delivers Benefits That a Traditional Phone Sy...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 17 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Software Workplace Tips Business Computing Managed Service Provider Hosted Solutions Data Hackers Small Business Google Hardware Mobile Devices Productivity VoIP Mobile Office Malware Email Gadgets Quick Tips Network Security Efficiency Network IT Support Innovation IT Services Social Media Business Business Management Business Continuity Miscellaneous Server Smartphones Upgrade Communication Virtualization Windows User Tips Disaster Recovery Communications Data Backup Computer Managed IT Services Microsoft Office Smartphone Users Mobile Device Management Passwords Browser Data Recovery Holiday Android Save Money WiFi Marketing Outsourced IT Tech Term Ransomware Alert Mobile Computing Cybercrime Internet of Things Vendor Management BDR Operating System Chrome Cloud Computing Remote Monitoring Router Windows 10 Information Technology Computers Avoiding Downtime Automation Bring Your Own Device Apple BYOD Artificial Intelligence Telephone Systems Current Events Cybersecurity VPN History Best Practice Spam Big Data Remote Computing Firewall IT Solutions Going Green The Internet of Things Managed IT Services Health Application Collaboration Hacking Phone System Social Engineering Wireless Technology Printer Employer-Employee Relationship Facebook IT Consultant Trending Money Bandwidth Excel Proactive IT Productivity App Lithium-ion Battery Windows 10 Office Mobility Budget Unified Threat Management Fax Server Recovery Maintenance Windows 8 How To Office 365 Applications iPhone Mouse Business Intelligence Networking Phishing Content Filtering IT Support Mobile Device Two-factor Authentication Business Managament Private Cloud PowerPoint Sports Redundancy Value Data Protection Law Enforcement Blockchain Word Encryption Customer Relationship Management Access Control Training Hard Drives Website Antivirus Data Security User Error Google Drive Information Gmail Analytics Humor Managed IT Outlook Settings Apps Tutorials Virus Software as a Service Network Congestion Hacker Search Tablet Data Management Administrator Twitter Document Management Save Time Streaming Media Risk Management Tech Support Scam Office Tips Inbound Marketing Identity Theft Social Saving Time Compliance Machine Learning Voice over Internet Protocol Flexibility Analysis Entertainment Downtime Administration IT Management Managed Service Retail Vulnerability Servers File Sharing Memory Digital Payment Human Resources Social Networking Connectivity Wi-Fi Conferencing Computer Repair IT service Work/Life Balance Data Breach YouTube Webinar Government People Content Management Meetings Samsung Virtual Assistant Infrastructure Piracy Help Desk Workers Unsupported Software IBM Online Currency Leadership DDoS Solid State Drive Update Recycling Point of Sale Telephone System Education Computer Accessories USB Black Market Robot Data loss Statistics Comparison Telephony Cleaning Password Google Docs Spam Blocking Wireless Physical Security Windows 7 Smart Tech Botnet Programming Skype Public Cloud SaaS Augmented Reality Intranet Running Cable Wearable Technology Touchscreen Data storage Credit Cards Instant Messaging OneNote Internet Exlporer Paperless Office Environment eWaste PDF CES Display Fraud Best Available Data Storage Bluetooth Video Surveillance Keyboard Safety IT Plan Biometrics HaaS End of Support Hosted Computing WIndows 7 Proactive Lifestyle Students Virtual Reality Bing Audit Flash Fiber-Optic Cache Project Management Netflix Reputation Tip of the week Amazon Webcam Printer Server Shortcut Tools Devices User GDPR Telecommuting Worker Commute Password Management Root Cause Analysis Internet exploMicrosoft Inventory Managing Stress Remote Monitoring and Maintenance Domains Supercomputer NarrowBand Healthcare Bloatware Shortcuts Computer Fan Sync Cables Uninterrupted Power Supply PC Care Wireless Internet Science Warranty Customers Windows Server 2008 Amazon Web Services IoT Password Manager IT Security 3D Thought Leadership E-Commerce Software Tips Remote Work Scheduling NIST Advertising eBay Line of Business Knowledge Chromecast Electronic Health Records Entrepreneur eCommerce FENG Distributed Denial of Service Files Unified Communications Print Server Staff Remote Support Alerts Wire Tablets Microchip Patch Management Online Shopping nternet Crowdfunding Business Mangement Hiring/Firing Content Filter Camera 360 Emails Windows Media Player Cryptocurrency Virtual Desktop Macro Screen Mirroring Notifications Law Firm IT Text Messaging Authentication MSP Laptop Data Warehousing Specifications Company Culture Cost Management Vendor Co-managed IT Electronic Medical Records Colocation Start Menu Theft Business Owner Shadow IT Digital Signature Work Station Upgrades Smart Office Analyitcs Windows 10s SharePoint Regulations Evernote Gaming Console Insurance Hybrid Cloud Travel Criminal Storage HBO LinkedIn Safe Mode Customer Service Charger Cast Nanotechnology Consultant Remote Worker HIPAA Touchpad Millennials Net Neutrality HVAC Security Cameras Hiring/Firing IaaS Computing Infrastructure Mobile Cortana Legal Multi-Factor Security Strategy Windows 8.1 Update Search Engine Relocation Wireless Charging Practices Addiction Virtual Private Network Hosted Solution Monitor Frequently Asked Questions Accountants Cameras Business Technology Computer Care Debate Licensing Wiring Workforce Enterprise Content Management Professional Services Google Apps Smart Technology Books Loyalty Experience Battery Thank You Content Video Games Two Factor Authentication Smartwatch Emergency Music Worker Congratulations Audiobook Scalability Assessment Regulation Rootkit Politics How to Television Techology Utility Computing Transportation Printers Troubleshooting Webinar Automobile Public Computer Benefits IT solutions Employee/Employer Relationship Employer Employee Relationship CrashOverride

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *