094 90 48200     Get SUPPORT

Aniar IT Services Blog

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

Tip of the Week: Sync Your Inboxes with IMAP
VoIP Delivers Benefits That a Traditional Phone Sy...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, December 12 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Tech Term Data Backup User Tips Google Cloud Business Computing Microsoft Email Data Recovery Innovation Network Security Hardware Data Hackers Malware Internet VoIP Cloud Computing Browser Workplace Tips Hosted Solutions Business Mobile Devices Android Communication Managed IT Services Artificial Intelligence Chrome How To Backup Smartphone Network Communications Smartphones IT Support Internet of Things IT Services Small Business Windows 10 Computers BDR Office 365 Cybersecurity Windows Saving Money Efficiency Outsourced IT Business Continuity Spam Information Collaboration Business Management Computer Word Software Cybercrime Applications Money Data Security Miscellaneous Server Data Protection Vulnerability Mobile Device Management Two-factor Authentication Managed Service Passwords Productivity Connectivity Ransomware Facebook Router Gadgets Infrastructure Human Resources Virtualization Law Enforcement Unsupported Software Content Management Telephony Keyboard Scam VPN Website Managed IT Data Storage Password Software as a Service Update Business Intelligence Upgrade Blockchain Social Media Spam Blocking Windows 7 Bring Your Own Device Managed IT services Operating System IT Management Virtual Assistant Redundancy Voice over Internet Protocol Holiday App Telephone Systems Identity Theft BYOD Social Engineering Mobile Device Paperless Office Avoiding Downtime Google Drive Save Money Phishing Sports Apps Comparison IT Plan CES Telephone System Remote Monitoring OneNote Google Docs Fraud Encryption Microsoft Office Settings Authentication HVAC Help Desk Tip of the week File Sharing Specifications Big Data Machine Learning Printer Public Cloud Cache Trending Practices eWaste Thought Leadership Cryptocurrency HaaS Amazon Mobile Computing Bandwidth Windows Server 2008 Computer Fan Staff Training Data loss YouTube Mouse HBO Software Tips Wireless Internet Charger Hosted Computing Botnet Telecommuting Legal Automation Safe Mode Amazon Web Services Accountants Smart Office Password Manager Nanotechnology Networking Shortcuts FENG Computer Care Remote Worker Cortana Alert Disaster Recovery Microchip Outlook Government HIPAA USB Skype Wireless Charging Inventory Camera Travel Remote Work Criminal Document Management Business Mangement Smart Tech Enterprise Content Management Patch Management Digital Signature Wi-Fi Wiring Tools Work/Life Balance Search Engine Frequently Asked Questions Solid State Drive Recovery Electronic Medical Records Wire Start Menu Meetings Google Apps Windows 10s Addiction Sync Downtime Multi-Factor Security Online Shopping Augmented Reality Gmail Password Management WiFi Credit Cards PDF Firewall Screen Mirroring Millennials Workers Access Control Servers Bing Excel Audit Physical Security Data Management MSP Employer-Employee Relationship Entertainment Warranty Private Cloud Root Cause Analysis Evernote Cleaning The Internet of Things Recycling Devices NIST Flash Unified Threat Management Value Cast Workforce Customer Relationship Management Competition IP Address Compliance Hard Drives Users Search Customer Service Mobile Office Regulation CrashOverride Domains Quick Tips Wireless Emergency Windows 10 Company Culture Twitter Managed Service Provider Public Speaking Mobility Presentation Managing Stress Lithium-ion battery Hiring/Firing Printers Tech Support Fun Wireless Technology 5G IBM Safety Productivity Marketing Hacker Budget