Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Defining the Crimes
The first thing you have to know is that credit card theft and identity theft are not mutually exclusive, but while credit card theft is identity theft, identity theft obviously isn’t credit card theft. Credit card theft is when someone has stolen your credit card information and is able to use that information to purchase goods, services, or dispense money.

Identity theft, however is a blanket term that covers these three situations:

Fraud or misuse of an existing account -- With 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft, this is easily the most prevalent form of identity theft. This is defined by situation where a party gains access to an account without the account holder’s authorization and uses its credentials to benefit them in some way.

Fraud or misuse of a new account -- Opening a new account in another party’s name. This type of fraud can happen all over, and can range anywhere from opening a consumer benefits account, to opening a line of credit or a checking account, to buying property. This type of fraud was reported about 1.1 million times in 2014.

Fraud or misuse of personal information -- All other uses of stolen personal information added up to a relatively paltry 713,000 reported cases. This is mainly when someone uses your identity to gain a benefit they couldn’t have otherwise. You see this used mostly to find employment, rent property, see a doctor, or lie to the authorities.

Protecting Yourself
As a business owner, you are responsible for the data people have entrusted with your. By knowing what to do to protect your own data, you’ll know how to approach securing the clients, employees, and vendors personal data you hold on file. Make sure to have a strong firewall on your network to keep unwanted intruders out, and antivirus and spam blocking solutions to eliminate threats when they do get past your defenses. Also, consider learning today’s best practices to ensure you are always in the right position to keep your identity secure. Here is a resource from the University of Pittsburgh to help you.

For more information about identity theft and network security, visit our blog regularly.

Delivering Value Through Managed IT Services
VoIP Delivers Benefits That a Traditional Phone Sy...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 January 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Backup Business Computing Network Security Hosted Solutions Managed IT Services Malware Disaster Recovery VoIP Google Microsoft Business Software Business Continuity Mobile Devices Productivity Outsourced IT Email Data Internet Smartphones Windows 10 Innovation Efficiency IT Support communications Computer Hardware Ransomware Cybercrime Office Android Server Telephone Systems IT Services Browser Data Backup Alert Computers Business Management Windows Small Business Saving Money Quick Tips Upgrade Social Engineering User Tips Mobile Device Management Chrome BYOD App How To Firewall Data Recovery Managed IT Hacking Cybersecurity Cloud Computing Mobility Office Tips Work/Life Balance Avoiding Downtime Microsoft Office Save Money Virtualization Holiday Law Enforcement Collaboration Network Recovery Smartphone Social Media BDR Miscellaneous Workplace Tips Passwords Private Cloud Flexibility Wi-Fi Bring Your Own Device Bandwidth Managed Service Provider Facebook Proactive IT Money Operating System Productivity HaaS Office 365 Two-factor Authentication Health Budget Information Technology Communication Password Phishing Gadgets Spam Data Management Black Market Risk Management Internet of Things Google Drive Router Employer-Employee Relationship Compliance Managed IT Services SaaS Data Breach Gmail Remote Monitoring Windows 10 Automation User Error Marketing Safety Artificial Intelligence Redundancy Value Scam Wearable Technology Save Time Data Security Spam Blocking Computing Infrastructure VPN Physical Security Worker Mobile Computing Automobile Apps DDoS Vulnerability Cleaning Battery Downtime Mobile Device History Data Storage Meetings Wireless Workers Apple Content Filtering Best Practice Shadow IT Applications Business Intelligence Data storage Government Charger Identity Theft End of Support Internet Exlporer Credit Cards Solid State Drive Settings Hiring/Firing IT Management Computer Care The Internet of Things Word OneNote Samsung Entertainment Patch Management Public Cloud Remote Computing Business Owner Unsupported Software Wireless Technology Keyboard Notifications Travel How to Root Cause Analysis People Hybrid Cloud Customer Bluetooth Comparison Document Management Software Tips Fax Server Techology Colocation Loyalty Chromecast Online Shopping Experience Flash Password Manager Transportation Mobile Office PDF Specifications IT solutions webinar Evernote Music Sync Benefits Uninterrupted Power Supply Software as a Service Data loss Millennials HBO Conferencing Windows 10s hacker Assessment USB Telephony Smart Technology Update Antivirus Screen Mirroring Rootkit Workforce Frequently Asked Questions Wireless Charging IT Support Legal Television Troubleshooting Skype Google Docs Cast Training Telecommuting Content Distributed Denial of Service Excel Fiber-Optic WiFi Audit Public Computer Going Green Hosted Solution Start Menu Two Factor Authentication Tech Support Website Education Robot Relocation Vendor Management Remote Work Audiobook Tip of the week Cables Mobile Computer Fan Laptop Voice over Internet Protocol Knowledge Politics IaaS Mouse Windows Server 2008 Unified Communications Hard Drives Professional Services Video Games eWaste FENG Networking Touchpad Big Data Electronic Medical Records Multi-Factor Security Users Data Warehousing Network Congestion Outlook Emails Unified Threat Management YouTube Windows 7 Theft Lithium-ion battery Tools Scalability Environment Internet exploMicrosoft IBM Books Humor Trending Virtual Reality Running Cable iPhone Fraud HIPAA Streaming Media Regulations Cortana Emergency Instant Messaging Advertising Supercomputer Monitor Employer Employee Relationship Sports Lifestyle Worker Commute IT Plan IT Consultant SharePoint NarrowBand Amazon Google Apps Encryption Botnet Search Current Events Reputation Computer Accessories Data Protection Leadership Netflix Files Amazon Web Services Servers Infrastructure Business Mangement Recycling Administration Thank You Congratulations Webinar IT solutions CrashOverride

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!