Velocity Technology Partners Blog

Velocity Technology Partners has been serving Athens, Gainesville and North Georgia since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Credit Card Theft and Identity Theft are Not the Same Thing

Credit Card Theft and Identity Theft are Not the Same Thing

While many might see having a credit card stolen as identity theft, this is an oversimplification that can prove dangerous. While credit card theft can be an element of identity theft, equating the two means that other forms of identity theft are overlooked. In today’s blog, we’ll go over why identity theft and credit card theft aren’t exactly the same thing, and what you can do to help keep your business safe from damage.

Defining Crimes
As we mentioned, while credit card theft and identity theft are related to one another, they aren’t terms that should be used interchangeably. Rather, credit card theft is just one of many kinds of identity theft. Think of it this way: cars, trucks, and SUVs are all types of motor vehicle. In this example, credit card theft is the car, while identity theft is represented by all varieties of motor vehicle--including trucks and SUVs.

Summed up, credit card theft is what happens when someone is able to access your account and make purchases without your permission. While this isn’t the only form of identity theft, it is certainly a prevalent one. A 2015 report from the Bureau of Justice Statistics, a section of the U.S. Department of Justice, states that 8.6 million Americans of age 16 or older were victimized in 2014 alone, out of a total of 17.6 million affected by identity theft.

Identity theft is a blanket term for criminal activity that falls into one of three categories:

  • Fraud or misuse of an existing account -- This kind of identity theft is the most common, with 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft. When a thief obtains access to an account of yours--through a credit card, for example--and uses it to their own ends, or passes bad checks through it, it falls under this category.
  • Fraud or misuse of a new account -- If a criminal obtains your personal information and uses it to open an account in your name, you are made a victim of this kind of identity theft. This kind of identity theft can range from relatively small, like opening a line of credit or a checking account, to large, like applying for a fraudulent mortgage on a house. This was reported about 1.1 million times in 2014.
  • Fraud or misuse of personal information -- All other uses of stolen personal information or data fall under this category, which held 713,000 of 2014’s reported cases. In this form of identity theft, someone improperly uses your information for their benefit. This may be to find employment, rent property, see a doctor or even to lie to the authorities.

Protecting Yourself (and Your Clients and Employees) from Identity Theft
Of course, you’ve probably already considered how much personal or otherwise sensitive data you have stored on your business network. There’s your business’ financial data, with employee information if they are paid through direct deposit bundled in there. Additionally, if any of your clients have financial data on file, that certainly counts as well. This also includes any non-financial records your business may keep on your clients.

In short, you have plenty of data that needs to be protected, including credit card and other personally identifiable information. Velocity Technology Partners can help you keep it safe. Call us at (800) - 983 - 5765 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

IT budget Smartphone intranet Connectivity Apple App Credit Cards Operating System Websites Windows Mobile Devices iPhone Wireless Charging Cybersecurity Management Encryption Employer-Employee Relationship Cleaning Edge Application Spyware Unsupported Software Automation Big Data Congratulations Shortcut Compliance Tip of the Week Content Filtering Mobile Security BYOD Hardware Content Filter Licensing Printing Emergency OneNote Microsoft Word Antivirus HBO Innovation Identity Google Assistant Google Maps Personal Information Chrome Tablets Identities Education Network Security Server Malware Specifications Wi-Fi Google Drive Cloud Legal Data Theft Windows 10 Language IT support Mobility The Internet of Things Networking eWaste Security Telephone Router Memory Tech Support Disaster Recovery Hosted Solutions Work/Life Balance PowerPoint Social Engineering Two-factor Authentication Storage WiFi Microsoft Smartphones Hackers Outsourced IT Ciminal Chromebook Maintenance Streaming Media Company Culture Monitoring Microsoft Excel Business Management VPN Sports Update Phishing Virtualization Efficiency IT Solutions MSP Adobe Financial Best Practices Devices Vulnerability Technology Software Backup Legislation Proactive IT Safety History Managed IT Social Media Network Communications Lifestyle Gifts Computers Ransomware Business FAQ Data Recovery Saving Money Excel Data Management WannaCry Collaboration Money Softphones Device Security Redundancy Vendor Management Analysis Risk Management Workers BDR Data Breach Gadgets Applications IT Support Hard Drive Remote Computing Android IoT Data Protection Microsoft Office Business Computing Cortana Data Privacy Apps Blockchain Mobile Device Management App store Gamification Fraud Hosted Solution Flexibility Charger Evernote SaaS Patch Management Google Twitter Identity Theft Cybercrime User Error Government Productivity Data Alert Cast Holiday Politics Communication Passwords Marketing Computer Audit Travel Retail Gmail File Sharing IT Management Thank You Software as a Service Commerce Proactive NFL Students Virus Conferencing Data Loss Data Backup Value Business Continuity Email Data Storage WIndows Server 2008 User Tips Tech Term Comparison Privacy Outlook Wireless Internet Best Practice Financial Technology Screen Mirroring Computer Forensics Project Management Cost Management Telephone Systems Spam Windows Ink Internet of Things Law Enforcement Managed IT Services Unified Communications VoIp Browser Office 365 Managing Stress Smart Tech Data Security Sales Wireless Technology Updates Remote Monitoring Google Docs Sync Small Business Artificial Intelligence Managed Service Provider Computing Internet IT Services Word Cloud Computing