094 90 48200     Get SUPPORT

Aniar IT Services Blog

Aniar IT Services has been serving the Castlebar area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

Tip of the Week: Sync Your Inboxes with IMAP
VoIP Delivers Benefits That a Traditional Phone Sy...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 20 March 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Privacy Google Microsoft Email Best Practices Business Computing Hackers Android How To Small Business Data Backup VoIP Cloud Software Managed IT Services Hardware Chrome Innovation User Tips Cloud Computing Malware Communication Windows Vulnerability Backup Cybercrime Data Recovery Smartphones Spam Mobile Device Management Computers Data Security Cybersecurity Two-factor Authentication Network Security Efficiency Collaboration Browser Windows 10 Business Unsupported Software Update Smartphone Passwords Outsourced IT Bring Your Own Device Managed IT services Business Management Telephone Systems Data Protection Avoiding Downtime BYOD Phishing Social Engineering Office 365 Remote Monitoring Saving Money Comparison Internet of Things Artificial Intelligence CES Mobile Devices Data Storage Spam Blocking Business Continuity Business Intelligence Data VPN Operating System Communications Apps Redundancy IT Management App Word Ransomware Virtualization IT Plan OneNote Money Public Cloud Internet Managed IT Evernote Server Windows Server 2008 Trending Wi-Fi Recycling Human Resources BDR Data loss Computer Botnet Keyboard Cortana Software Tips Windows 7 Computer Care eWaste Staff Skype Telecommuting Alert Travel Charger IT Support Patch Management Microsoft Office Legal Start Menu Remote Work IT Services Solid State Drive Wireless Charging Downtime Website Criminal Digital Signature Identity Theft Screen Mirroring Audit Google Apps Settings Physical Security Flash Root Cause Analysis Google Docs PDF Law Enforcement Credit Cards Cast Workers HaaS Specifications Encryption Fraud HBO Scam Computer Fan Infrastructure Content Management Amazon Network Outlook FENG Government Password Blockchain Disaster Recovery The Internet of Things Gadgets Accountants Tools Amazon Web Services Frequently Asked Questions Voice over Internet Protocol Recovery Password Manager HIPAA Sync Work/Life Balance Meetings Big Data Windows 10s Holiday Employer-Employee Relationship Google Drive Excel Multi-Factor Security Business Mangement Electronic Medical Records Millennials Facebook Upgrade Private Cloud Social Media Value Online Shopping Tip of the week Router Gmail Data Management Telephony Workforce Presentation 5G CrashOverride Wireless Technology Managed Service Provider IBM Hacker Marketing Customer Relationship Management IP Address WiFi Customer Service Mobile Office Domains Hard Drives Public Speaking Hosted Solutions Lithium-ion battery Augmented Reality Emergency Tech Support Safety Productivity Budget Hiring/Firing Competition Fun Users Miscellaneous Wireless Search Windows 10