(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Mobile Devices Efficiency VoIP Business IT Support Email Miscellaneous IT Services Managed Service Provider Server Workplace Tips Disaster Recovery Business Continuity Network Data Windows Innovation Upgrade Hardware Business Management Software Network Security Communication Computer Save Money Saving Money Android Mobile Device Management Smartphones Microsoft Office User Tips Managed IT Services Virtualization Browser Smartphone communications Holiday Windows 10 WiFi Outsourced IT Hacking Chrome BYOD Small Business Social Media Operating System Data Backup Mobile Computing Computers Cybercrime Alert Apple Application Proactive IT Remote Monitoring Avoiding Downtime IT Solutions Ransomware Quick Tips Big Data Social Engineering Information Technology Managed IT Services Employer-Employee Relationship Automation Passwords Marketing Office The Internet of Things Budget Collaboration Mobility Health Bring Your Own Device VPN Recovery Gadgets Telephone Systems spam Data Recovery Going Green Remote Computing User Error Vendor Management How To iPhone Managed IT Cloud Computing App Save Time Firewall BDR Bandwidth Compliance Cybersecurity Two-factor Authentication Wireless Technology Vulnerability Risk Management Antivirus PowerPoint Office Tips Website Excel Phone System Content Filtering Money IT Support Downtime Lithium-ion battery Analytics Gmail Router History Tablet Private Cloud Value Windows 10 Retail Memory Artificial Intelligence Search Mouse Redundancy Networking Office 365 Internet of Things Document Management Public Cloud Internet Exlporer Identity Theft Data Security Humor Data storage Online Currency Phishing Biometrics Statistics Credit Cards Printer Hard Drives Outlook Current Events Facebook Flexibility Maintenance Data Storage Law Enforcement Solid State Drive DDoS Word Administration Physical Security Robot Business Intelligence Entertainment Environment Running Cable Google Drive Workers Intranet Skype Unified Threat Management SaaS Business Owner Mobile Office IT Management Customer Relationship Management Safety OneNote Government Best Available Meetings HaaS Work/Life Balance People Apps IT Consultant Fax Server Unsupported Software Programming Network Congestion Black Market Data Management Trending Saving Time Company Culture Streaming Media Google Docs Instant Messaging Piracy Windows 8.1 Update Shortcut Scam Worker Commute Charger Start Menu Windows 8 Theft SharePoint Encryption User Voice over Internet Protocol Audit Hybrid Cloud Licensing Sports HBO Bluetooth Computer Care Mobile Tablets Samsung Monitor Cortana eWaste Notifications Multi-Factor Security HIPAA Twitter Screen Mirroring YouTube Spam Blocking Fraud Frequently Asked Questions USB Print Server Professional Services Crowdfunding Reputation Google Apps Wearable Technology Lifestyle Social Keyboard Cast NarrowBand Amazon Tip of the week Infrastructure Tools Customers Net Neutrality Best Practice Computer Repair Data Protection Social Networking Windows Server 2008 Chromecast Computer Fan Amazon Web Services Windows Media Player Password Manager Analyitcs Applications Comparison Files Windows 7 Password Hiring/Firing Laptop FENG Online Shopping Settings Productivity Distributed Denial of Service WIndows 7 Botnet Wi-Fi Touchscreen Specifications Virtual Desktop Data Warehousing Colocation Regulations Human Resources Touchpad Evernote IT service Managing Stress Travel Virtual Reality Relocation Uninterrupted Power Supply Millennials Training Hosted Solution Computing Infrastructure Servers LinkedIn Wireless Charging Domains Virus IaaS Bloatware Cleaning Workforce Customer Service IT Plan End of Support Debate Flash Mobile Device Fiber-Optic Computer Accessories Software as a Service Entrepreneur Tech Support Telecommuting Internet exploMicrosoft Sync Hacker Video Surveillance Root Cause Analysis Cables Cameras Consultant Update Cost Management Shadow IT Remote Work Patch Management Software Tips Advertising Education Printer Server Telephony Science Data loss Unified Communications Wireless Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar PDF Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Users Two Factor Authentication Assessment Music Business Mangement Television Troubleshooting Techology Electronic Medical Records Recycling Public Computer Legal Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Rootkit Video Games