croom new

Eclipse Integrated Systems Blog

Credit Card Theft and Identity Theft are Not the Same Thing

Credit Card Theft and Identity Theft are Not the Same Thing

While many might see having a credit card stolen as identity theft, this is an oversimplification that can prove dangerous. While credit card theft can be an element of identity theft, equating the two means that other forms of identity theft are overlooked. In today’s blog, we’ll go over why identity theft and credit card theft aren’t exactly the same thing, and what you can do to help keep your business safe from damage.

Defining Crimes
As we mentioned, while credit card theft and identity theft are related to one another, they aren’t terms that should be used interchangeably. Rather, credit card theft is just one of many kinds of identity theft. Think of it this way: cars, trucks, and SUVs are all types of motor vehicle. In this example, credit card theft is the car, while identity theft is represented by all varieties of motor vehicle--including trucks and SUVs.

Summed up, credit card theft is what happens when someone is able to access your account and make purchases without your permission. While this isn’t the only form of identity theft, it is certainly a prevalent one. A 2015 report from the Bureau of Justice Statistics, a section of the U.S. Department of Justice, states that 8.6 million Americans of age 16 or older were victimized in 2014 alone, out of a total of 17.6 million affected by identity theft.

Identity theft is a blanket term for criminal activity that falls into one of three categories:

  • Fraud or misuse of an existing account -- This kind of identity theft is the most common, with 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft. When a thief obtains access to an account of yours--through a credit card, for example--and uses it to their own ends, or passes bad checks through it, it falls under this category.
  • Fraud or misuse of a new account -- If a criminal obtains your personal information and uses it to open an account in your name, you are made a victim of this kind of identity theft. This kind of identity theft can range from relatively small, like opening a line of credit or a checking account, to large, like applying for a fraudulent mortgage on a house. This was reported about 1.1 million times in 2014.
  • Fraud or misuse of personal information -- All other uses of stolen personal information or data fall under this category, which held 713,000 of 2014’s reported cases. In this form of identity theft, someone improperly uses your information for their benefit. This may be to find employment, rent property, see a doctor or even to lie to the authorities.

Protecting Yourself (and Your Clients and Employees) from Identity Theft
Of course, you’ve probably already considered how much personal or otherwise sensitive data you have stored on your business network. There’s your business’ financial data, with employee information if they are paid through direct deposit bundled in there. Additionally, if any of your clients have financial data on file, that certainly counts as well. This also includes any non-financial records your business may keep on your clients.

In short, you have plenty of data that needs to be protected, including credit card and other personally identifiable information. Eclipse Integrated Systems can help you keep it safe. Call us at 800-340-0505 for more information.

Tip of the Week: Syncing Email Across Multiple Dev...
Keep Your End Users From Contributing to Security ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, January 20 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Network Security Internet Google Hackers User Tips Malware Software Productivity Business Management Microsoft Tech Term Innovation Efficiency Hosted Solutions Computer Backup Windows 10 Browser Email Cybersecurity Business Apps Managed IT Services Mobile Devices Productivity Smartphones Small Business Data Recovery Data Backup Smartphone Internet of Things Saving Money Hardware Communication Windows Collaboration Holiday Android Virtualization Cybercrime VoIP Mobility Passwords Law Enforcement Business Continuity Workplace Tips communications Operating System Wireless Network Ransomware Disaster Recovery Microsoft Office Mobile Device IT Support Cloud Computing Miscellaneous IT Support Data Security Data Users IT Services Outsourced IT Password Phishing Wi-Fi Gadgets Office 365 Windows 10 BDR Chrome Quick Tips Social Media Server Money Mobile Device Management Telephone Systems Update Upgrade Best Practice Risk Management Google Drive Health Social Cost Management Employer-Employee Relationship Unsupported Software Application Vulnerability Government Information Technology App Managed IT Services Computers Two-factor Authentication Work/Life Balance Managed IT Hacking Streaming Media Networking Facebook Data Management Bandwidth Office tips User Error Current Events Marketing Save Money Proactive IT Sports USB Spam Artificial Intelligence Antivirus Managed Service Provider Blockchain Information Automation Shortcut Identity Theft Patch Management Politics Alert Training The Internet of Things eWaste Outlook End of Support Wireless Technology Battery Hosted Solution Touchscreen Mobile Computing DDoS WiFi Private Cloud Audit Company Culture Storage Save Time Excel HaaS VPN iPhone Managing Stress SaaS Commerce BYOD Telephony Humor Devices Social Engineering Computer Care Cortana Remote Monitoring and Management Television Automobile Personal Information Remote Computing Access Control Medical IT Recovery Legal Mobile Security Google Docs Analytics Wireless Charging Search Fraud Office Business Intelligence Data Storage Tech Support Flexibility Managed Service Meetings Gmail Cleaning Going Green Connectivity Samsung OneNote Word Router Transportation Data Protection Encryption Apple History Internet Exlporer Compliance Applications Maintenance File Sharing Language Books Data Theft Virtual Assistant Windows 10s Evernote Downloads Windows Ink Ciminal Robot Experience Managed IT Service IT Management Instant Messaging Error Employer Employee Relationship Root Cause Analysis RAM Certification Running Cable Cast Sales How To Touchpad Hard Drive Benefits Licensing Device Security Text Messaging Settings Data storage Computing Plug-In Solid State Drive SharePoint Trending Point of Sale Trends Troubleshooting Google Maps Project Management Lithium-ion battery Phone System Cables Electronic Medical Records Bluetooth Distributed Denial of Service IT Solutions FAQ Internet Explorer Microsoft Office 365 Computer Accessories Augmented Reality Administrator Microsoft Teams Security Cameras Retail Chromebook Reporting Smart Technology Computer Fan Travel A.I. Profitability Video Games App store Hacker Hard Disk Drive Sync Workers Advertising Data Loss IT budget Music Virus Voice over Internet Protocol Safety Emails Fax Server Charger Threat Access G Suite Wearables Unified Threat Management Conferencing Reputation Uninterrupted Power Supply Operating Sysytem Printing WannaCry Tablets Spyware Movies Eliminating Downtime Legislation Analysis Keyboard Teamwork Updates Budget Proactive Webinar WIndows Server 2008 Virtual Reality PowerPoint Authentication Vendor Management NFL Entertainment Bring Your Own Device Upgrades HBO Gifts Black Market Avoiding Downtime Google Assistant GDPR Wireless Internet Wearable Technology Healthcare Comparison Identity Adobe Microsoft Word Chromecast Microsoft Excel Identities Big Data Websites Amazon IT solutions Data Breach Files Education Authorization Edge Hybrid Cloud Consultant Credit Cards Value Dark Web Scam Nanotechnology Unified Communications Help Desk Screen Mirroring Specifications Scalability Laptop Data Privacy Hiring/Firing iOS PDF Worker Commute Worker Printers Relocation Disaster Twitter Regulation Cache Remote Monitoring Emergency CrashOverride Monitors

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login