XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 24 February 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Microsoft Privacy Internet Cloud Saving Money Backup Software Best Practices Managed Service Provider Workplace Tips Small Business Business Computing Mobile Office Hackers Google Hardware Productivity Hosted Solutions Mobile Devices Data VoIP Quick Tips Gadgets Email IT Support Malware Efficiency Social Media Network Business Management Business Continuity Business Server Smartphones Miscellaneous Innovation Virtualization Upgrade IT Services Windows Disaster Recovery Communication Network Security Users Microsoft Office Computer Communications Managed IT Services Mobile Device Management User Tips Passwords Marketing Android Holiday Browser WiFi Vendor Management Smartphone Save Money Alert Mobile Computing Windows 10 Operating System Remote Monitoring Data Backup Avoiding Downtime Bring Your Own Device Apple Information Technology Computers IT Solutions Ransomware Chrome The Internet of Things Cybercrime Outsourced IT Current Events Best Practice Going Green Remote Computing Telephone Systems BYOD History Application Firewall Trending Phone System Wireless Technology Social Engineering IT Consultant Employer-Employee Relationship Big Data Spam Hacking Health Printer Lithium-ion Battery Router Office Cloud Computing Proactive IT Data Recovery Budget App VPN Collaboration BDR Automation Excel iPhone Business Managament Managed IT Services Content Filtering Fax Server Maintenance Recovery Facebook Bandwidth Money Cybersecurity How To Windows 8 Two-factor Authentication Mobility Internet of Things Business Intelligence Analytics User Error Customer Relationship Management Humor Tutorials Mouse Virus Gmail Antivirus Unified Threat Management PowerPoint Hard Drives Outlook Artificial Intelligence Private Cloud Networking Value Memory Phishing Save Time Tablet Office Tips Inbound Marketing Website Data Management Compliance Risk Management Flexibility Apps Digital Payment Computer Repair Downtime Network Congestion Google Drive Saving Time Windows 10 Managed IT Search Conferencing Redundancy Office 365 Data Security Law Enforcement Administration Social Networking Retail Tech Support SaaS Spam Blocking Administrator Scam Piracy Leadership Intranet Data storage People Internet Exlporer Data Protection Computer Accessories Work/Life Balance HaaS Word Vulnerability End of Support Bluetooth Comparison Data Storage Webinar Statistics Sports Touchscreen Workers CES Online Currency Twitter Point of Sale Skype Settings IT Management Wireless Human Resources Physical Security Public Cloud Biometrics IT service IT Plan Hacker Best Available Wearable Technology Unsupported Software eWaste Samsung PDF Robot OneNote Wi-Fi Safety Meetings Training Social Government Data Breach Identity Theft DDoS Solid State Drive Entertainment Productivity Mobile Device Programming Document Management Black Market Credit Cards Recycling Streaming Media Environment Running Cable Video Surveillance IBM Professional Services Virtual Reality Colocation Macro Law Firm IT Shadow IT Lifestyle Shortcut Screen Mirroring Printer Server Hiring/Firing Tip of the week User Scheduling Password Manager Amazon Augmented Reality IaaS Tools Bloatware Windows 10s Hosted Solution Computing Infrastructure Charger Legal Cast 3D Windows Server 2008 USB IT Support Business Mangement Windows 8.1 Update Monitor Amazon Web Services Entrepreneur Computer Care YouTube Windows 7 Hiring/Firing Criminal Reputation Online Shopping Botnet Cost Management Audit Internet exploMicrosoft Wireless Charging NarrowBand Specifications Data Warehousing Regulations Help Desk Customers Evernote Advertising Encryption Travel Instant Messaging Computer Fan Patch Management Fiber-Optic IT Security Chromecast Millennials Servers Webcam Content Management LinkedIn nternet Notifications FENG WIndows 7 Cables Laptop Workforce SharePoint Flash Emails HIPAA Blockchain Company Culture Co-managed IT Hybrid Cloud Software as a Service Worker Commute Managing Stress Debate Unified Communications Touchpad Telecommuting Domains PC Care Sync Science Keyboard Staff Net Neutrality Relocation File Sharing Update eBay Theft Display Remote Work Alerts Software Tips Telephony Tablets Gaming Console Digital Signature Google Docs Text Messaging Virtual Desktop Windows Media Player Education Cortana Work Station Start Menu Analyitcs Netflix Upgrades Crowdfunding Uninterrupted Power Supply Voice over Internet Protocol Customer Service Root Cause Analysis HBO Consultant Supercomputer Google Apps Distributed Denial of Service Mobile 360 Files Password Print Server Cleaning Multi-Factor Security Data loss Cameras Electronic Medical Records Frequently Asked Questions Knowledge Licensing Business Owner Infrastructure Fraud Remote Support Troubleshooting Rootkit Techology Automobile Books Content Emergency Loyalty Video Games Audiobook Scalability Politics Transportation Assessment How to Benefits Television Webinar Smart Technology Public Computer IT solutions Experience CrashOverride Two Factor Authentication Employer Employee Relationship Battery Music Applications Thank You Worker Congratulations

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *