Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the Bridgewater area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Credit Card Theft and Identity Theft are Not the Same Thing

Credit Card Theft and Identity Theft are Not the Same Thing

While many might see having a credit card stolen as identity theft, this is an oversimplification that can prove dangerous. While credit card theft can be an element of identity theft, equating the two means that other forms of identity theft are overlooked. In today’s blog, we’ll go over why identity theft and credit card theft aren’t exactly the same thing, and what you can do to help keep your business safe from damage.

Defining Crimes
As we mentioned, while credit card theft and identity theft are related to one another, they aren’t terms that should be used interchangeably. Rather, credit card theft is just one of many kinds of identity theft. Think of it this way: cars, trucks, and SUVs are all types of motor vehicle. In this example, credit card theft is the car, while identity theft is represented by all varieties of motor vehicle--including trucks and SUVs.

Summed up, credit card theft is what happens when someone is able to access your account and make purchases without your permission. While this isn’t the only form of identity theft, it is certainly a prevalent one. A 2015 report from the Bureau of Justice Statistics, a section of the U.S. Department of Justice, states that 8.6 million Americans of age 16 or older were victimized in 2014 alone, out of a total of 17.6 million affected by identity theft.

Identity theft is a blanket term for criminal activity that falls into one of three categories:

  • Fraud or misuse of an existing account -- This kind of identity theft is the most common, with 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft. When a thief obtains access to an account of yours--through a credit card, for example--and uses it to their own ends, or passes bad checks through it, it falls under this category.
  • Fraud or misuse of a new account -- If a criminal obtains your personal information and uses it to open an account in your name, you are made a victim of this kind of identity theft. This kind of identity theft can range from relatively small, like opening a line of credit or a checking account, to large, like applying for a fraudulent mortgage on a house. This was reported about 1.1 million times in 2014.
  • Fraud or misuse of personal information -- All other uses of stolen personal information or data fall under this category, which held 713,000 of 2014’s reported cases. In this form of identity theft, someone improperly uses your information for their benefit. This may be to find employment, rent property, see a doctor or even to lie to the authorities.

Protecting Yourself (and Your Clients and Employees) from Identity Theft
Of course, you’ve probably already considered how much personal or otherwise sensitive data you have stored on your business network. There’s your business’ financial data, with employee information if they are paid through direct deposit bundled in there. Additionally, if any of your clients have financial data on file, that certainly counts as well. This also includes any non-financial records your business may keep on your clients.

In short, you have plenty of data that needs to be protected, including credit card and other personally identifiable information. Eclipse Integrated Systems can help you keep it safe. Call us at 800-340-0505 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 20 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Business Computing Internet Malware Software Business Management Google Network Security Microsoft Windows 10 Computer Innovation User Tips Backup Hosted Solutions Productivity Productivity Business Apps Windows Email Cybersecurity Mobile Devices Efficiency Hardware Smartphone Cybercrime Disaster Recovery Operating System Virtualization Browser Law Enforcement Managed IT Services Android IT Support Data Security Ransomware Small Business Business Continuity VoIP Telephone Systems Mobile Device Management Office 365 Smartphones Quick Tips Miscellaneous Passwords Holiday Phishing Internet of Things Server Microsoft Office Data Backup Money Mobility communications Chrome App Application Government Cloud Computing Data Recovery Wireless Vulnerability IT Services Saving Money Health Wi-Fi Update Information Technology Communication Collaboration Password Best Practice Unsupported Software Risk Management Workplace Tips Gadgets Social Google Drive Outsourced IT Tech Term Social Media Spam Windows 10 BDR Hacking Shortcut Identity Theft Save Money Work/Life Balance Office tips USB Computers Alert Antivirus Managed Service Provider Upgrade User Error Data Management Politics IT Support Facebook Managed IT Two-factor Authentication Data Current Events Automation Meetings Commerce Personal Information Tech Support Automobile Cortana Proactive IT Transportation Internet Exlporer Hosted Solution DDoS Wireless Technology Mobile Computing Data Storage Fraud OneNote Encryption Samsung Patch Management VPN Telephony Humor Managed IT Services Remote Computing Audit iPhone Cost Management Excel Going Green Computer Care Artificial Intelligence Apple Legal Search eWaste Mobile Security The Internet of Things WiFi Blockchain Google Docs Flexibility Office Streaming Media Network Cleaning Social Engineering Bandwidth History End of Support Television Data Protection Sports Private Cloud Battery Users HaaS Save Time Recovery Employer-Employee Relationship SaaS IT Solutions Advertising Phone System FAQ Devices Hard Disk Drive Travel Hacker Reputation Files Virus Unified Threat Management Music Charger Spyware Tablets Keyboard Laptop Proactive Legislation Black Market Vendor Management Upgrades WIndows Server 2008 Analytics Trending Robot Wireless Charging NFL Lithium-ion battery Touchpad Distributed Denial of Service Websites Bluetooth Comparison Consultant PDF Big Data Screen Mirroring Data Breach Edge Marketing iOS Word Hiring/Firing Worker Commute Data Theft Fax Server Specifications Instant Messaging Training Touchscreen Outlook Text Messaging Books Evernote Uninterrupted Power Supply Ciminal Windows Ink Benefits Operating Sysytem Budget Computing Settings Sales Managing Stress Company Culture Cast Electronic Medical Records Gmail Networking Wearable Technology Project Management Computer Fan Google Maps Video Games Smart Technology Avoiding Downtime Chromecast App store Retail BYOD Emails Sync Safety Workers IT budget WannaCry Data Loss Conferencing Webinar Updates Running Cable Virtual Reality Entertainment Identity SharePoint Gifts HBO IT solutions Adobe Router Data storage Microsoft Word Identities Nanotechnology Microsoft Excel Scalability Scam Education Administrator Data Privacy Credit Cards Mobile Device Maintenance Windows 10s Applications Language Root Cause Analysis File Sharing How To Employer Employee Relationship IT Management Experience Access Teamwork Device Security Solid State Drive Licensing Augmented Reality Storage Computer Accessories Point of Sale CrashOverride Relocation Cache Remote Monitoring Emergency Disaster Monitors Worker Hard Drive

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login