Velocity Technology Partners Blogs

Credit Card Theft and Identity Theft are Not the Same Thing

Credit Card Theft and Identity Theft are Not the Same Thing

While many might see having a credit card stolen as identity theft, this is an oversimplification that can prove dangerous. While credit card theft can be an element of identity theft, equating the two means that other forms of identity theft are overlooked. In today’s blog, we’ll go over why identity theft and credit card theft aren’t exactly the same thing, and what you can do to help keep your business safe from damage.

Defining Crimes
As we mentioned, while credit card theft and identity theft are related to one another, they aren’t terms that should be used interchangeably. Rather, credit card theft is just one of many kinds of identity theft. Think of it this way: cars, trucks, and SUVs are all types of motor vehicle. In this example, credit card theft is the car, while identity theft is represented by all varieties of motor vehicle--including trucks and SUVs.

Summed up, credit card theft is what happens when someone is able to access your account and make purchases without your permission. While this isn’t the only form of identity theft, it is certainly a prevalent one. A 2015 report from the Bureau of Justice Statistics, a section of the U.S. Department of Justice, states that 8.6 million Americans of age 16 or older were victimized in 2014 alone, out of a total of 17.6 million affected by identity theft.

Identity theft is a blanket term for criminal activity that falls into one of three categories:

  • Fraud or misuse of an existing account -- This kind of identity theft is the most common, with 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft. When a thief obtains access to an account of yours--through a credit card, for example--and uses it to their own ends, or passes bad checks through it, it falls under this category.
  • Fraud or misuse of a new account -- If a criminal obtains your personal information and uses it to open an account in your name, you are made a victim of this kind of identity theft. This kind of identity theft can range from relatively small, like opening a line of credit or a checking account, to large, like applying for a fraudulent mortgage on a house. This was reported about 1.1 million times in 2014.
  • Fraud or misuse of personal information -- All other uses of stolen personal information or data fall under this category, which held 713,000 of 2014’s reported cases. In this form of identity theft, someone improperly uses your information for their benefit. This may be to find employment, rent property, see a doctor or even to lie to the authorities.

Protecting Yourself (and Your Clients and Employees) from Identity Theft
Of course, you’ve probably already considered how much personal or otherwise sensitive data you have stored on your business network. There’s your business’ financial data, with employee information if they are paid through direct deposit bundled in there. Additionally, if any of your clients have financial data on file, that certainly counts as well. This also includes any non-financial records your business may keep on your clients.

In short, you have plenty of data that needs to be protected, including credit card and other personally identifiable information. Velocity Technology Partners can help you keep it safe. Call us at (800) - 983 - 5765 for more information.

Using 2017's Examples to Maintain Network Security...
Keep Your End Users From Contributing to Security ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, September 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Hosted Solutions Apple Maintenance Mobile Device Management Managed IT services Audit Data Privacy Gamification Credit Cards WannaCry Network Security Managed IT Services Analysis Backup Disaster Recovery Smartphone Compliance Vendor Management Applications intranet Risk Management Ransomware Content Filter Workers Legislation Financial Excel Money The Internet of Things NFL Cortana Devices Microsoft Sports Cleaning Bring Your Own Device Telephone Systems Cloud Cybercrime Specifications Proactive IT Business Continuity Social Engineering IT support Hardware Browser Holiday Data Storage Two-factor Authentication File Sharing Software as a Service FAQ Content Filtering Virtualization Licensing Encryption IT Support Connectivity Passwords Business Congratulations Hard Drive Gmail Social Media Twitter Windows 10 Identity Computing Safety Internet Adobe Microsoft Office Data Loss Wireless Technology Hosted Solution Communications IT Services Collaboration Data Breach Evernote Hackers Mobile Devices Sales Managed Service Provider Blockchain Education Security Chrome IoT Remote Computing VPN Data Privacy Windows Ink Antivirus BDR Mobile Security Spam Vulnerability App store Law Enforcement Server Outlook History Malware Microsoft Word Update Automation Tablets Data Protection Word Networking Artificial Intelligence Data Backup Software Work/Life Balance Gifts Managed IT Data Theft Thank You Comparison Value Politics Google OneNote Hybrid Cloud Tech Support Updates MSP Cloud Computing Language Windows Innovation Microsoft Excel Data Recovery Employer-Employee Relationship Monitoring PowerPoint Retail Shortcut Cast Sync Softphones Mobility Email Memory Technology Fraud Virus Management Computer Forensics Project Management Financial Technology Ciminal Chromebook Spyware User Tips Cybersecurity Router Operating System BYOD Travel Proactive Flexibility Data Security iPhone Printing Telephone Legal Personal Information User Error Saving Money Streaming Media Network Identity Theft SaaS Managing Stress Wireless Charging Unsupported Software Google Drive IT Management Efficiency IT budget Conferencing Office 365 Screen Mirroring Company Culture Wireless Internet IT Solutions Marketing Remote Monitoring Communication Charger WiFi Tip of the Week Smart Tech Google Assistant Tech Term Students Smartphones Small Business Business Computing WIndows Server 2008 VoIp Alert Computers Government Storage eWaste Outsourced IT Device Security Identities Patch Management Best Practices Google Maps Application Redundancy Lifestyle Edge Cost Management Best Practice Phishing Big Data Regulation Google Docs Data Management Apps Android Gadgets Business Management Unified Communications HBO App Wi-Fi Computer Emergency Commerce Websites Productivity Internet of Things