Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

Delivering Value Through Managed IT Services
VoIP Delivers Benefits That a Traditional Phone Sy...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, July 21 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Hackers Network Security Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Mobile Devices Disaster Recovery Microsoft Productivity Software Email Business Continuity Business Internet Innovation Outsourced IT Data Data Backup Cybercrime Efficiency communications Smartphones Ransomware Windows 10 IT Support Computer Cloud Computing IT Services Browser Data Recovery Hardware Android BDR Internet of Things Office Telephone Systems Computers Server Windows Business Management Saving Money Alert Tech Term Upgrade Cybersecurity User Tips Mobile Device Management Small Business Smartphone Virtualization Network Quick Tips Managed IT BYOD Social Engineering Microsoft Office Collaboration Save Money Chrome Law Enforcement Workplace Tips Password Private Cloud Bandwidth Hacking Mobility Facebook Work/Life Balance Router Office Tips Managed Service Provider Avoiding Downtime Holiday Communication Productivity Office 365 Money Social Media How To Miscellaneous Passwords App Recovery Artificial Intelligence Firewall Information Technology Health Redundancy VPN Flexibility Wi-Fi Business Intelligence Data Management Bring Your Own Device Operating System Two-factor Authentication Gmail Proactive IT Applications Data Protection Phishing Remote Monitoring HaaS Data Security Automation Budget Vulnerability Value Managed IT Services Document Management Risk Management Employer-Employee Relationship Gadgets Identity Theft Blockchain Black Market Apps Windows 10 Compliance Google Drive Mobile Device Word Cleaning Data Breach SaaS User Error Marketing Big Data Entertainment Spam Connectivity Safety IT Support Business Owner Public Cloud Keyboard Scam Remote Computing Wireless Technology CES Website Smart Tech Data Storage Workers Save Time DDoS PDF Content Management Worker Automobile Computing Infrastructure USB Physical Security Meetings Mobile Computing Wireless Windows 7 Credit Cards Legal Apple Battery IT Management Training eWaste Downtime OneNote Education IT Plan History Settings Content Filtering Access Control Unsupported Software Servers Infrastructure Charger Best Practice Streaming Media Data storage Networking Shadow IT Electronic Medical Records Comparison Government End of Support Solid State Drive Encryption Analysis Internet Exlporer YouTube Hiring/Firing Spam Blocking Computer Care HIPAA Wearable Technology Data loss The Internet of Things Paperless Office Samsung Patch Management Update Sports Frequently Asked Questions Wireless Charging NarrowBand Computer Accessories Workforce Devices IT solutions Students Skype Criminal How to Safe Mode Google Docs IoT Reputation Cast Excel Fiber-Optic Bluetooth Telecommuting Thought Leadership Files Techology Healthcare Hybrid Cloud Start Menu Audit Loyalty Experience Transportation File Sharing Antivirus Customer Tip of the week Cables Chromecast Remote Work Content Filter Colocation Electronic Health Records Mobile Computer Fan Music Knowledge Benefits Business Technology Voice over Internet Protocol Insurance WiFi Windows Server 2008 Unified Communications Distributed Denial of Service Storage Machine Learning Professional Services FENG Assessment Uninterrupted Power Supply Network Congestion Smart Technology Virtual Assistant Multi-Factor Security Practices Data Warehousing hacker Theft Emails Rootkit Tools Human Resources Television Troubleshooting Telephone System Trending Hosted Computing Regulations Cortana Content Mouse Fraud Addiction Staff Public Computer Hosted Solution IT Consultant Two Factor Authentication Lifestyle Inventory Google Apps Going Green Vendor Management Audiobook Amazon Cache Lithium-ion battery HVAC Environment Botnet Digital Signature Robot Tech Support Leadership Running Cable Relocation Laptop Netflix Politics Hard Drives Amazon Web Services Wireless Internet Video Games Enterprise Content Management Travel Strategy Root Cause Analysis IaaS Users Authentication Software Tips SharePoint Flash Password Manager Touchpad Unified Threat Management Online Shopping Wire Scalability Password Management Outlook IBM Books webinar Virtual Reality Specifications Nanotechnology Internet exploMicrosoft Sync Business Mangement Evernote Smart Office Notifications Instant Messaging NIST Software as a Service Accountants Humor People Supercomputer Emergency Conferencing Employer Employee Relationship Worker Commute Millennials iPhone Fax Server HBO Advertising Telephony Recycling Windows 10s Search Cryptocurrency Monitor Mobile Office Screen Mirroring Current Events Thank You Twitter Company Culture Administration Congratulations Webinar Managing Stress IT solutions CrashOverride

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!