MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Credit Card Theft and Identity Theft are Not the Same Thing

Credit Card Theft and Identity Theft are Not the Same Thing

While many might see having a credit card stolen as identity theft, this is an oversimplification that can prove dangerous. While credit card theft can be an element of identity theft, equating the two means that other forms of identity theft are overlooked. In today’s blog, we’ll go over why identity theft and credit card theft aren’t exactly the same thing, and what you can do to help keep your business safe from damage.

Defining Crimes
As we mentioned, while credit card theft and identity theft are related to one another, they aren’t terms that should be used interchangeably. Rather, credit card theft is just one of many kinds of identity theft. Think of it this way: cars, trucks, and SUVs are all types of motor vehicle. In this example, credit card theft is the car, while identity theft is represented by all varieties of motor vehicle--including trucks and SUVs.

Summed up, credit card theft is what happens when someone is able to access your account and make purchases without your permission. While this isn’t the only form of identity theft, it is certainly a prevalent one. A 2015 report from the Bureau of Justice Statistics, a section of the U.S. Department of Justice, states that 8.6 million Americans of age 16 or older were victimized in 2014 alone, out of a total of 17.6 million affected by identity theft.

Identity theft is a blanket term for criminal activity that falls into one of three categories:

  • Fraud or misuse of an existing account -- This kind of identity theft is the most common, with 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft. When a thief obtains access to an account of yours--through a credit card, for example--and uses it to their own ends, or passes bad checks through it, it falls under this category.
  • Fraud or misuse of a new account -- If a criminal obtains your personal information and uses it to open an account in your name, you are made a victim of this kind of identity theft. This kind of identity theft can range from relatively small, like opening a line of credit or a checking account, to large, like applying for a fraudulent mortgage on a house. This was reported about 1.1 million times in 2014.
  • Fraud or misuse of personal information -- All other uses of stolen personal information or data fall under this category, which held 713,000 of 2014’s reported cases. In this form of identity theft, someone improperly uses your information for their benefit. This may be to find employment, rent property, see a doctor or even to lie to the authorities.

Protecting Yourself (and Your Clients and Employees) from Identity Theft
Of course, you’ve probably already considered how much personal or otherwise sensitive data you have stored on your business network. There’s your business’ financial data, with employee information if they are paid through direct deposit bundled in there. Additionally, if any of your clients have financial data on file, that certainly counts as well. This also includes any non-financial records your business may keep on your clients.

In short, you have plenty of data that needs to be protected, including credit card and other personally identifiable information. MERIT Solutions can help you keep it safe. Call us at (757) 420-5150 for more information. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 March 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Business Computing Hackers Network Security Malware Software Internet Hosted Solutions Backup Business Management google Managed IT Services Productivity Microsoft Computer Disaster Recovery communications Mobile Devices VoIP Business Continuity Business IT Support Outsourced IT Windows 10 User Tips Hardware Innovation Productivity Email IT Services Cybercrime Mobility Small Business Windows Data Backup Efficiency Managed IT Server Mobile Device Management browser Apps Smartphone Ransomware Cybersecurity Internet of Things Save Money Telephone Systems Operating System Saving Money Data Recovery Law Enforcement Passwords Hosted Solution Quick Tips Android Virtualization Information Technology Phishing Office 365 Recovery Password Holiday Data Security Microsoft Office Chrome BYOD Data BDR Money VPN Government Vulnerability Social Media Best Practice Update Budget Smartphones Gadgets Data Management Wireless upgrade Social Risk Management Unsupported Software Google Drive Hacking Avoiding Downtime Automation Cloud Computing App IT Support Alert Communication Health Miscellaneous Managed Service Provider Work/Life Balance Computers Wi-Fi Facebook Application Proactive IT Antivirus Current Events Spam Audit The Internet of Things Managed IT Services Personal Information Data Breach Workplace Tips Politics Two-factor Authentication USB Social Engineering Save Time Wireless Technology Identity Theft search Collaboration Telephony Flexibility Shortcut Private Cloud Office tips Applications User Error History Windows 10 Firewall Samsung Content Filtering Gmail Battery HaaS Excel Disaster Compliance Humor Data Storage IT solutions OneNote Automobile Employer-Employee Relationship DDoS Blockchain Sports Network Saving Time Cleaning Television Data Loss Tech Support Marketing Office Hacker Computer Care Phone System Streaming Media Solid State Drive Google Docs Apple Internet Exlporer Legal Users Encryption WiFi Data Protection Going Green iPhone Fraud Tech Term Bandwidth Mobile Computing Redundancy Artificial Intelligence eWaste Transportation Commerce Robot Cost Management Cortana Patch Management End of Support Project Management Remote Computing SaaS Uninterrupted Power Supply Touchscreen Benefits Lifestyle Websites Laptop Business Intelligence Outlook server installation dvd "cannot install required files" Charger Word MSP stock Unified Threat Management Legislation Touchpad Managed IT Service Reputation iOS Training Entertainment Wireless Charging Electronic Medical Records Advertising Windows Ink intranet tweet Upgrades Point of Sale Comparison Regulation calculator Computer Fan Company Culture HIPAA Evernote Black Market Google Maps IT budget Twitter Data storage Consultant control Smart Technology Specifications Screen Mirroring Avoid Downtime Administration Sync Maintenance Chromecast Dark Web Value Networking Shadow IT Software as a Service WSJ Meetings Exchange Emails Document Management Sales Cast Workers Distributed Denial of Service Colocation Adobe Device Security altivista Experience Hard Drives Identities Settings SBS Files Retail Updates Video Games Licensing Devices compaq Administrator WannaCry Lithium-ion battery Virtual Reality IoT HBO Webinar Scam Conferencing Wearable Technology Microsoft Word Relocation Mobile Spyware hp Access Music Microsoft Excel Language domain IT solutions Employer Employee Relationship Gifts Professional Services Analytics Keyboard Instant Messaging PDF File Sharing IT Management remote Windows 10s Computer Accessories Worker Commute Big Data Travel Edge Yahoo Nanotechnology Mobile Device Managing Stress Text Messaging Storage Virus Running Cable WIndows Server 2008 Server 2008 Hard Disk Drive Credit Cards Books Scalability Tablets Ciminal Ali Rowghani Root Cause Analysis Hiring/Firing Trending Education Proactive Router Vendor Management FAQ How To NFL Augmented Reality Thank You Data Theft CrashOverride Congratulations Safety Emergency Worker Cache Monitors Remote Monitoring

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...