Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

Delivering Value Through Managed IT Services
VoIP Delivers Benefits That a Traditional Phone Sy...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 23 April 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Privacy Cloud Technology Hackers Network Security Business Computing Backup Hosted Solutions Managed IT Services Malware Disaster Recovery Google Microsoft Software VoIP Business Mobile Devices Business Continuity Email Internet Productivity Outsourced IT Data Innovation Ransomware IT Support Smartphones Cybercrime Efficiency Windows 10 communications Computer Hardware IT Services Data Backup Browser Android Cloud Computing Office Computers Server Telephone Systems Alert Saving Money Smartphone Business Management Virtualization User Tips Mobile Device Management Windows Data Recovery Small Business Quick Tips BYOD Cybersecurity Chrome Social Engineering Internet of Things Upgrade Network BDR Private Cloud Managed IT Social Media Hacking Miscellaneous Mobility Passwords Workplace Tips Work/Life Balance App Office Tips Firewall Avoiding Downtime Productivity Save Money Law Enforcement Microsoft Office Recovery How To Collaboration Holiday Office 365 Flexibility Wi-Fi Data Management Bring Your Own Device Managed Service Provider Business Intelligence VPN Bandwidth Proactive IT Money Two-factor Authentication Remote Monitoring Communication HaaS Facebook Data Protection Operating System Budget Phishing Health Information Technology Gmail Redundancy Password Data Security User Error Marketing Tech Term Gadgets Vulnerability Black Market Managed IT Services Apps Router Compliance Google Drive Mobile Device Cleaning Identity Theft Risk Management Data Breach SaaS Windows 10 Employer-Employee Relationship Big Data Automation Safety Artificial Intelligence Value Spam Data loss Save Time PDF Update Entertainment Computing Infrastructure Automobile Encryption Worker Mobile Computing Physical Security CES Wearable Technology Legal Data Storage Workers Battery Training Downtime History Content Filtering Credit Cards Applications Charger Best Practice Data storage DDoS IT Management Shadow IT Government Electronic Medical Records End of Support Word Solid State Drive OneNote IT Plan Internet Exlporer Hiring/Firing Computer Care HIPAA Meetings Unsupported Software Wireless The Internet of Things Apple Samsung Patch Management Comparison Business Owner eWaste Public Cloud Keyboard Remote Computing Scam Document Management Wireless Technology Spam Blocking Settings Loyalty Hybrid Cloud Experience Software as a Service Techology Accountants Running Cable Streaming Media HBO Conferencing Transportation Millennials Customer Colocation Telephony Chromecast Recycling Windows 10s Music Screen Mirroring Frequently Asked Questions Wireless Charging SharePoint IT Support Benefits Workforce Skype Criminal Assessment USB Google Docs IoT Cast Uninterrupted Power Supply Excel Fiber-Optic Smart Technology Telecommuting hacker Notifications Start Menu Audit People Rootkit Fax Server Television Troubleshooting Website Smart Tech Tip of the week Cables Remote Work Content Mobile Content Management Computer Fan Mobile Office IT solutions Knowledge Public Computer Hosted Solution Voice over Internet Protocol Insurance Windows Server 2008 Unified Communications Two Factor Authentication Education Audiobook Professional Services Going Green Blockchain FENG Vendor Management Network Congestion Multi-Factor Security Robot Practices Data Warehousing Tech Support Windows 7 Theft Emails Relocation Politics Tools Laptop Hard Drives Human Resources Antivirus Networking Trending Video Games Hosted Computing Fraud Users Regulations Cortana IaaS Unified Threat Management Touchpad Staff WiFi IT Consultant IBM Books Lifestyle Outlook Scalability Inventory Distributed Denial of Service Amazon Virtual Reality YouTube Google Apps Internet exploMicrosoft Botnet Digital Signature Leadership Supercomputer Emergency Humor Instant Messaging Access Control Amazon Web Services iPhone Worker Commute Servers Infrastructure Netflix Employer Employee Relationship Advertising Travel Strategy Root Cause Analysis Mouse Software Tips Sports Current Events Monitor Search Authentication Online Shopping Flash NarrowBand Password Manager Computer Accessories Analysis webinar Specifications Reputation How to Evernote Files Lithium-ion battery Sync Business Mangement Environment Bluetooth Administration Webinar IT solutions CrashOverride Thank You Congratulations Nanotechnology

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!