253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

Tip of the Week: Sync Your Inboxes with IMAP
VoIP Delivers Benefits That a Traditional Phone Sy...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, January 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Office 365 VoIP FCC User Tips Cybercrime Mobile Device Management Spam Blocking Saving Money Cloud Computing Servers Passwords Human Resources IT Management Cast Efficiency Business Intelligence Smart Tech Alert Sports Internet Exlporer Managing Stress Upgrade Private Cloud Collaboration Quick Tips Data Breach Unsupported Software Windows NIST Software Value Redundancy Encryption Data Backup Malware Workplace Tips Windows 7 Managed IT Services Computer Infrastructure Hosted Computing Windows 10 Botnet Email Update Automation Online Shopping Warranty Two-factor Authentication Identity Theft Cybersecurity Virtual Assistant Emergency Phishing Access Control Microsoft Office Operating System IBM Cryptocurrency Facebook Networking Productivity Mobile Device Money Skype Specifications HaaS Government Vulnerability Save Money IT Services Remote Worker Google Content Management Android Fraud Data Protection Holiday Employer-Employee Relationship Internet Managed IT Services Public Cloud Office Telephone System Avoiding Downtime Windows 10 Technology Augmented Reality Business Computing Flash Telephony Vendor Settings Internet of Things Hackers Cache Files Paperless Office Disaster Recovery Best Practices Google Drive Data Tech Term BYOD Entertainment CES Data Security Smartphone Scam Connectivity Password Telephone Systems Software as a Service Comparison Word Travel Artificial Intelligence How To HIPAA OneNote Network Security IT Plan Netflix Outlook Security Safety Bandwidth Credit Cards Smartphones Data Recovery Evernote Communications Start Menu IT Support Relocation Gadgets Cloud Voice over Internet Protocol Router Apple Hardware Downtime Data Storage Remote Monitoring Innovation Document Management Website The Internet of Things Screen Mirroring Electronic Medical Records Communication Business Management Social Computer Fan Keyboard Addiction Social Engineering Tip of the Week Wi-Fi WiFi Health Frequently Asked Questions Managed Service Hiring/Firing Privacy Search Engine Computers Outsourced IT Information Miscellaneous Business Hosted Solutions Blockchain VPN Chrome Server Apps Virtualization Browser Microsoft Spam Law Enforcement Current Events Applications Mobile Devices Google Docs Backup Machine Learning Software Tips Network App Social Media eWaste Managed IT Business Continuity Bring Your Own Device Ransomware BDR Small Business Productivity

Newsletter Sign Up