croom new

Credit Card Theft and Identity Theft are Not the Same Thing

Credit Card Theft and Identity Theft are Not the Same Thing

While many might see having a credit card stolen as identity theft, this is an oversimplification that can prove dangerous. While credit card theft can be an element of identity theft, equating the two means that other forms of identity theft are overlooked. In today’s blog, we’ll go over why identity theft and credit card theft aren’t exactly the same thing, and what you can do to help keep your business safe from damage.

Defining Crimes
As we mentioned, while credit card theft and identity theft are related to one another, they aren’t terms that should be used interchangeably. Rather, credit card theft is just one of many kinds of identity theft. Think of it this way: cars, trucks, and SUVs are all types of motor vehicle. In this example, credit card theft is the car, while identity theft is represented by all varieties of motor vehicle--including trucks and SUVs.

Summed up, credit card theft is what happens when someone is able to access your account and make purchases without your permission. While this isn’t the only form of identity theft, it is certainly a prevalent one. A 2015 report from the Bureau of Justice Statistics, a section of the U.S. Department of Justice, states that 8.6 million Americans of age 16 or older were victimized in 2014 alone, out of a total of 17.6 million affected by identity theft.

Identity theft is a blanket term for criminal activity that falls into one of three categories:

  • Fraud or misuse of an existing account -- This kind of identity theft is the most common, with 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft. When a thief obtains access to an account of yours--through a credit card, for example--and uses it to their own ends, or passes bad checks through it, it falls under this category.
  • Fraud or misuse of a new account -- If a criminal obtains your personal information and uses it to open an account in your name, you are made a victim of this kind of identity theft. This kind of identity theft can range from relatively small, like opening a line of credit or a checking account, to large, like applying for a fraudulent mortgage on a house. This was reported about 1.1 million times in 2014.
  • Fraud or misuse of personal information -- All other uses of stolen personal information or data fall under this category, which held 713,000 of 2014’s reported cases. In this form of identity theft, someone improperly uses your information for their benefit. This may be to find employment, rent property, see a doctor or even to lie to the authorities.

Protecting Yourself (and Your Clients and Employees) from Identity Theft
Of course, you’ve probably already considered how much personal or otherwise sensitive data you have stored on your business network. There’s your business’ financial data, with employee information if they are paid through direct deposit bundled in there. Additionally, if any of your clients have financial data on file, that certainly counts as well. This also includes any non-financial records your business may keep on your clients.

In short, you have plenty of data that needs to be protected, including credit card and other personally identifiable information. Eclipse Integrated Systems can help you keep it safe. Call us at 800-340-0505 for more information.

Tip of the Week: Syncing Email Across Multiple Dev...
Keep Your End Users From Contributing to Security ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Business Computing Network Security Hackers Google Business Management Internet Malware Software Microsoft Computer Windows 10 Backup Innovation User Tips Hosted Solutions Productivity Business Apps Cybersecurity Tech Term Productivity Windows Email Mobile Devices Efficiency Cybercrime Smartphone Managed IT Services Hardware communications Disaster Recovery Operating System VoIP Virtualization Browser Saving Money Internet of Things Law Enforcement Small Business Smartphones Business Continuity Android Ransomware Data Security Data Backup Data Recovery Collaboration IT Support Wireless Quick Tips Money Chrome Phishing Microsoft Office Mobile Device Management Telephone Systems Mobility Server Communication Miscellaneous Passwords Office 365 Holiday IT Support Workplace Tips Gadgets Google Drive Social Outsourced IT Cost Management IT Services Data Employer-Employee Relationship Social Media Government Application App Information Technology Update Cloud Computing Wi-Fi Vulnerability Password Unsupported Software Network Health Best Practice Risk Management BDR Save Money Sports Identity Theft Managed IT Users Politics Spam Alert Work/Life Balance Windows 10 Facebook Managed Service Provider Computers Current Events Office tips Patch Management Shortcut Upgrade Streaming Media Hacking USB Data Management User Error Artificial Intelligence Antivirus Two-factor Authentication Search Managed IT Services Remote Computing Excel Networking Audit Flexibility Company Culture Recovery Devices Save Time Encryption Cortana Router Automation Proactive IT Commerce Meetings History End of Support Gmail Battery Computer Care Going Green Tech Support Apple Google Docs Blockchain Transportation Wireless Charging Private Cloud Fraud eWaste Internet Exlporer WiFi iPhone Managing Stress Wireless Technology Data Storage Mobile Computing DDoS HaaS The Internet of Things Office Hosted Solution Automobile Data Protection Bandwidth Samsung OneNote Personal Information Maintenance Cleaning Mobile Security VPN Social Engineering Television Legal Telephony Humor Virtual Reality Google Assistant Cast Sales Training Fax Server Analytics Bring Your Own Device Licensing Device Security Windows 10s Black Market Identity Storage Employer Employee Relationship Root Cause Analysis Entertainment Business Intelligence Touchscreen Amazon Google Maps Project Management Benefits Access Connectivity IT Solutions FAQ Teamwork Uninterrupted Power Supply Operating Sysytem Websites Education Budget Value BYOD Retail Settings Big Data Hybrid Cloud Travel Solid State Drive Data Privacy Computer Accessories Augmented Reality Unified Communications Sync Workers Electronic Medical Records Avoiding Downtime Data Theft Virtual Assistant Data Loss IT budget Smart Technology Computer Fan Wearable Technology PDF Worker Commute Downloads Charger SaaS Scalability Hacker Hard Disk Drive Chromecast Conferencing Books Managed IT Service Tablets Spyware Instant Messaging Files Hard Drive Legislation Experience RAM Updates Safety Emails How To Computing WannaCry Text Messaging Trends WIndows Server 2008 Unified Threat Management NFL Keyboard Point of Sale Internet Explorer HBO Gifts Laptop Cables Chromebook Comparison Vendor Management Phone System Microsoft Teams Adobe Microsoft Word Webinar App store Microsoft Excel Identities Running Cable Robot A.I. Data Breach Upgrades Word Edge Advertising Threat Credit Cards SharePoint Video Games Touchpad Virus Voice over Internet Protocol Trending Printing Screen Mirroring Specifications Bluetooth Distributed Denial of Service Music Data storage G Suite Applications IT solutions Reputation File Sharing Language Scam Nanotechnology Lithium-ion battery Movies Outlook Evernote Consultant Windows Ink Ciminal Hiring/Firing iOS Marketing Administrator PowerPoint IT Management Mobile Device Proactive Information Worker Twitter Cache Relocation Plug-In Remote Monitoring CrashOverride Emergency Disaster Remote Monitoring and Management Monitors

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login