(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 24 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Hackers Business Computing Productivity Microsoft Backup Hosted Solutions Malware Internet Google Mobile Devices Efficiency VoIP IT Support Business IT Services Email Network Security Miscellaneous Managed Service Provider Server Innovation Workplace Tips Network Disaster Recovery Data Business Continuity Software Windows Upgrade Business Management Hardware Mobile Device Management Communication Android Computer Virtualization Save Money Browser Smartphone Saving Money Managed IT Services User Tips Smartphones communications Microsoft Office Data Backup Holiday Computers BYOD Cybercrime WiFi Windows 10 Outsourced IT Cloud Computing Small Business Hacking Chrome Big Data Ransomware Social Media Remote Monitoring Operating System Mobile Computing Alert Apple VPN Managed IT Services Proactive IT Application Avoiding Downtime Data Recovery IT Solutions Budget Quick Tips Collaboration Internet of Things Information Technology Social Engineering Passwords Automation Marketing Employer-Employee Relationship The Internet of Things Office Health Mobility Bring Your Own Device Gadgets Recovery spam Cybersecurity Telephone Systems BDR Going Green Remote Computing Managed IT Vendor Management Redundancy Wireless Technology User Error IT Support iPhone Two-factor Authentication Data Protection Business Intelligence Save Time Firewall App Gmail Private Cloud Bandwidth Compliance How To Vulnerability Data Security Office 365 Antivirus Data Management Analytics PowerPoint Router Windows 10 Website Excel Phone System Tech Term Money Office Tips Content Filtering Downtime History Artificial Intelligence Tablet Lithium-ion battery Value Retail Memory Apps Search Phishing Identity Theft Mouse Document Management Networking Risk Management Cleaning Online Currency Network Congestion Credit Cards Trending Meetings HaaS Fax Server Printer Black Market Law Enforcement Solid State Drive Humor Statistics Current Events Productivity Data Storage Internet Exlporer Maintenance Workers Word Data storage Encryption Biometrics Comparison Business Owner Outlook eWaste OneNote Flexibility Hard Drives Intranet IT Management Mobile Device Work/Life Balance Facebook Administration IT Plan Entertainment Running Cable DDoS CES Physical Security Unsupported Software Unified Threat Management Robot Data loss Skype Public Cloud Mobile Office Environment IT Consultant Update Google Drive Customer Relationship Management Human Resources SaaS Best Available Training Saving Time People Safety HIPAA Programming Government Video Surveillance HBO Cameras Customer Service Inventory Cortana Mobile Keyboard Consultant Entrepreneur Digital Signature Education Multi-Factor Security Screen Mirroring Frequently Asked Questions Tech Support Printer Server Access Control Fraud Hacker Google Apps Professional Services Worker Commute Cost Management Strategy Piracy Computer Fan Lifestyle Cast Tip of the week Shadow IT Applications Authentication Print Server Amazon Science Infrastructure Tools User Wireless Files Streaming Media Password Instant Messaging Analysis Licensing FENG Samsung Windows Server 2008 Wi-Fi Shortcut Amazon Web Services Twitter Windows 8 Computer Repair Password Manager SharePoint Net Neutrality Colocation Accountants Electronic Medical Records Crowdfunding Windows 7 Sports Bluetooth Online Shopping Tablets Business Mangement Botnet Monitor Hosted Solution Computing Infrastructure Notifications Legal Specifications Data Warehousing Evernote Regulations YouTube USB Recycling Travel Reputation Wearable Technology Touchscreen End of Support Windows Media Player Social IoT Millennials Wireless Charging Servers NarrowBand Internet exploMicrosoft Criminal Customers Best Practice Social Networking Smart Tech Hiring/Firing Root Cause Analysis Workforce Fiber-Optic Flash Chromecast WIndows 7 Advertising Analyitcs Software as a Service Patch Management Insurance Telecommuting Cables Sync Laptop Managing Stress Settings Distributed Denial of Service Content Management Scam LinkedIn Charger Software Tips Virus Virtual Desktop Practices Remote Work Unified Communications Telephony Touchpad IT service Hybrid Cloud Virtual Reality Blockchain Debate Google Docs Relocation Computer Care Uninterrupted Power Supply Computer Accessories Hosted Computing Theft Start Menu Domains Company Culture IaaS PDF Bloatware Windows 8.1 Update Staff Spam Blocking Voice over Internet Protocol Audit Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Nanotechnology Users Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits