MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Credit Card Theft and Identity Theft are Not the Same Thing

Credit Card Theft and Identity Theft are Not the Same Thing

While many might see having a credit card stolen as identity theft, this is an oversimplification that can prove dangerous. While credit card theft can be an element of identity theft, equating the two means that other forms of identity theft are overlooked. In today’s blog, we’ll go over why identity theft and credit card theft aren’t exactly the same thing, and what you can do to help keep your business safe from damage.

Defining Crimes
As we mentioned, while credit card theft and identity theft are related to one another, they aren’t terms that should be used interchangeably. Rather, credit card theft is just one of many kinds of identity theft. Think of it this way: cars, trucks, and SUVs are all types of motor vehicle. In this example, credit card theft is the car, while identity theft is represented by all varieties of motor vehicle--including trucks and SUVs.

Summed up, credit card theft is what happens when someone is able to access your account and make purchases without your permission. While this isn’t the only form of identity theft, it is certainly a prevalent one. A 2015 report from the Bureau of Justice Statistics, a section of the U.S. Department of Justice, states that 8.6 million Americans of age 16 or older were victimized in 2014 alone, out of a total of 17.6 million affected by identity theft.

Identity theft is a blanket term for criminal activity that falls into one of three categories:

  • Fraud or misuse of an existing account -- This kind of identity theft is the most common, with 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft. When a thief obtains access to an account of yours--through a credit card, for example--and uses it to their own ends, or passes bad checks through it, it falls under this category.
  • Fraud or misuse of a new account -- If a criminal obtains your personal information and uses it to open an account in your name, you are made a victim of this kind of identity theft. This kind of identity theft can range from relatively small, like opening a line of credit or a checking account, to large, like applying for a fraudulent mortgage on a house. This was reported about 1.1 million times in 2014.
  • Fraud or misuse of personal information -- All other uses of stolen personal information or data fall under this category, which held 713,000 of 2014’s reported cases. In this form of identity theft, someone improperly uses your information for their benefit. This may be to find employment, rent property, see a doctor or even to lie to the authorities.

Protecting Yourself (and Your Clients and Employees) from Identity Theft
Of course, you’ve probably already considered how much personal or otherwise sensitive data you have stored on your business network. There’s your business’ financial data, with employee information if they are paid through direct deposit bundled in there. Additionally, if any of your clients have financial data on file, that certainly counts as well. This also includes any non-financial records your business may keep on your clients.

In short, you have plenty of data that needs to be protected, including credit card and other personally identifiable information. MERIT Solutions can help you keep it safe. Call us at (757) 420-5150 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Internet Productivity Hosted Solutions Backup Business Management google Managed IT Services Computer Disaster Recovery Mobile Devices Outsourced IT Microsoft communications VoIP Business Continuity Business Windows 10 IT Support Hardware Innovation Cybersecurity Email User Tips IT Services Data Backup Cybercrime Efficiency Data Recovery Managed IT Saving Money Server Mobile Device Management Ransomware Small Business Tech Term Apps Windows Mobility Smartphone Operating System Data Productivity browser Law Enforcement Internet of Things Android Office 365 Virtualization BDR Telephone Systems Save Money Phishing Money Passwords Data Security Cloud Computing Smartphones Hosted Solution Quick Tips Chrome Microsoft Office Communication BYOD Automation VPN Managed Service Provider Information Technology Password Holiday Recovery App Google Drive Hacking Avoiding Downtime Vulnerability Alert Two-factor Authentication Health Miscellaneous Wireless Facebook Computers Government Data Breach Risk Management Unsupported Software Best Practice Update Social Media Gadgets Budget Data Management Work/Life Balance Collaboration Cost Management IT Support Network Wi-Fi upgrade Social Application Current Events Audit search Wireless Technology Compliance Personal Information Spam Telephony Politics User Error Managed IT Services Cleaning USB Applications Private Cloud Save Time Office tips History Gmail Remote Computing Proactive IT Identity Theft The Internet of Things Workplace Tips Artificial Intelligence Flexibility Shortcut Data Protection Employer-Employee Relationship Social Engineering Firewall Streaming Media Tech Support Antivirus Content Filtering Hacker WiFi Project Management Internet Exlporer Cortana Battery Solid State Drive Patch Management Going Green HaaS Windows 10 Bandwidth eWaste iPhone Automobile Wireless Charging Excel Mobile Computing Value Transportation Data Storage Saving Time Management OneNote Robot Blockchain Office Phone System Computer Care End of Support Legal Mobile Security Users Data Loss Encryption Devices Marketing IT solutions Google Docs Google Assistant DDoS Humor Disaster Big Data Fraud Television Education Router Sports Vendor Management Redundancy Apple SaaS Commerce Samsung Unified Threat Management Lithium-ion battery Tablets Smart Tech Root Cause Analysis Administrator domain Gamification Entertainment Websites Training FAQ Upgrades Electronic Medical Records NFL Connectivity Relocation Augmented Reality Access MSP Touchscreen remote Lifestyle Point of Sale Memory Business Intelligence HIPAA Outlook Data Theft Yahoo Company Culture Charger Consultant Safety Word Black Market Content Filter Running Cable intranet Server 2008 Smart Technology Legislation Students PDF Managed IT Service Avoid Downtime Computing iOS Ali Rowghani Windows Ink Trending Shadow IT Monitoring IT budget Comparison Document Management Unified Communications Text Messaging Evernote Experience Regulation Analysis Computer Fan Google Maps Maintenance Screen Mirroring server installation dvd "cannot install required files" Specifications Financial Networking Sync Video Games App store Dark Web stock Software as a Service Virtual Reality Financial Technology Meetings Device Security Cast Identities Laptop Emails Uninterrupted Power Supply Scam Sales Workers Music Adobe tweet Printing Settings IoT Touchpad calculator Employer Employee Relationship Retail Updates Analytics Licensing Identity Reputation WannaCry Twitter control Keyboard Instant Messaging Advertising Spyware HBO Language Webinar Computer Accessories Conferencing Worker Commute Microsoft Word Mobile Data Privacy WSJ Mobile Device Data storage Exchange Microsoft Excel Managing Stress Computer Forensics Remote Monitoring Distributed Denial of Service IT solutions altivista Gifts Books Professional Services Scalability Hard Drive Administration Chromecast Edge SBS Hiring/Firing File Sharing PowerPoint IT Management Virus Windows 10s compaq Travel How To Chromebook Colocation Nanotechnology Ciminal Benefits Storage Wireless Internet Hard Drives Wearable Technology WIndows Server 2008 Proactive Hard Disk Drive hp Files Credit Cards Emergency CrashOverride Thank You Worker Congratulations Cache Monitors

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...