773-635-5100    Let's Meet    Get SUPPORT

Shartega Systems Blog

Shartega Systems has been serving the Chicago area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Credit Card Theft and Identity Theft are Not the Same Thing

Credit Card Theft and Identity Theft are Not the Same Thing

While many might see having a credit card stolen as identity theft, this is an oversimplification that can prove dangerous. While credit card theft can be an element of identity theft, equating the two means that other forms of identity theft are overlooked. In today’s blog, we’ll go over why identity theft and credit card theft aren’t exactly the same thing, and what you can do to help keep your business safe from damage.

Defining Crimes
As we mentioned, while credit card theft and identity theft are related to one another, they aren’t terms that should be used interchangeably. Rather, credit card theft is just one of many kinds of identity theft. Think of it this way: cars, trucks, and SUVs are all types of motor vehicle. In this example, credit card theft is the car, while identity theft is represented by all varieties of motor vehicle--including trucks and SUVs.

Summed up, credit card theft is what happens when someone is able to access your account and make purchases without your permission. While this isn’t the only form of identity theft, it is certainly a prevalent one. A 2015 report from the Bureau of Justice Statistics, a section of the U.S. Department of Justice, states that 8.6 million Americans of age 16 or older were victimized in 2014 alone, out of a total of 17.6 million affected by identity theft.

Identity theft is a blanket term for criminal activity that falls into one of three categories:

  • Fraud or misuse of an existing account -- This kind of identity theft is the most common, with 16.4 million of 2014’s 17.6 million victims being targeted by this variety of identity theft. When a thief obtains access to an account of yours--through a credit card, for example--and uses it to their own ends, or passes bad checks through it, it falls under this category.
  • Fraud or misuse of a new account -- If a criminal obtains your personal information and uses it to open an account in your name, you are made a victim of this kind of identity theft. This kind of identity theft can range from relatively small, like opening a line of credit or a checking account, to large, like applying for a fraudulent mortgage on a house. This was reported about 1.1 million times in 2014.
  • Fraud or misuse of personal information -- All other uses of stolen personal information or data fall under this category, which held 713,000 of 2014’s reported cases. In this form of identity theft, someone improperly uses your information for their benefit. This may be to find employment, rent property, see a doctor or even to lie to the authorities.

Protecting Yourself (and Your Clients and Employees) from Identity Theft
Of course, you’ve probably already considered how much personal or otherwise sensitive data you have stored on your business network. There’s your business’ financial data, with employee information if they are paid through direct deposit bundled in there. Additionally, if any of your clients have financial data on file, that certainly counts as well. This also includes any non-financial records your business may keep on your clients.

In short, you have plenty of data that needs to be protected, including credit card and other personally identifiable information. Shartega Systems can help you keep it safe. Call us at 773-635-5100 for more information.

Using 2017's Examples to Maintain Network Security...
Keep Your End Users From Contributing to Security ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 22 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Privacy Network Security Best Practices Software Technology Productivity Malware Hackers Managed IT Services Business Computing Cloud IT Support Disaster Recovery Outsourced IT Backup Google Business Continuity Internet Mobile Devices Windows 10 Microsoft IT Services Data Backup Managed IT Business Management Ransomware Mobility User Tips Communications Hosted Solutions Data Recovery Email Small Business Cybersecurity Alert WIndows Saving Money Business Save Money Smartphone VoIP Server Vulnerability Efficiency Law Enforcement Office 365 Mobile Device Management Hardware Hosted Solution Innovation Android Social Media Microsoft Office Health Phishing Cybercrime Money Unsupported Software Cloud Computing Facebook Budget Gadgets Browser BYOD Firewall Chrome BDR Best Practice Miscellaneous Collaboration Audit Holiday Virtualization Wireless Computer Avoiding Downtime Managed Service Provider Government Google Drive Politics App Shortcut Smartphones Office tips Quick Tips Two-factor Authentication Data Data Security Information Technology Apps The Internet of Things Automobile Computers Data Protection USB Data Storage Cost Management Content Filtering Compliance Search Samsung Encryption OneNote Save Time Social User Error Proactive IT Passwords Cortana Risk Management Data Management Wireless Technology iPhone Applications Cleaning Marketing Identity Theft Google Docs Saving Time Work/Life Balance Operating System Spam Computer Care Commerce Application Redundancy HaaS Telephone Systems Data Breach Battery SaaS Personal Information End of Support WiFi Webinar Google Maps Lifestyle Television Router HBO Root Cause Analysis Disaster Managed IT Service Charger Unified Threat Management Adobe Antivirus IT solutions Flexibility VPN Internet Exlporer Legislation Mobile Device Users Employer-Employee Relationship Wireless Charging Avoid Downtime Software as a Service Advertising Comparison IT Management CrashOverride Virtual Reality Screen Mirroring Document Management WannaCry Upgrades Licensing Update Apple Specifications Internet of Things IT Solutions Electronic Medical Records Cast Evernote Consultant Wi-Fi Mobile Computing Mobile Smart Technology HIPAA Humor Training Sales Communication Emergency Meetings Networking Professional Services PDF Data Loss Company Culture Retail Hacker WIndows Server 2008 Settings Workers Touchscreen Travel Productivity iOS Current Events Value Conferencing Solid State Drive Patch Management Keyboard Network Updates Tablets Office Text Messaging Experience Computer Fan Microsoft Excel Reputation Education Gifts Outlook IT Support Microsoft Word Managed IT Services Password NFL Phone System Dark Web Hard Drives File Sharing Automation Excel Maintenance Word Artificial Intelligence Black Market Storage Credit Cards Regulation Hacking eWaste Emails Augmented Reality Windows Ink Sports Nanotechnology Shadow IT Business Intelligence Point of Sale FAQ History Sync Workplace Tips Device Security Hiring/Firing Competition Devices Fun Vendor Management Big Data Spyware Windows 10s Scalability Upgrade Entertainment Hard Disk Drive Presentation Windows 10 Instant Messaging Taxes 5G How To IBM Supercomputer Video Games Customer Relationship Management Managing Stress IT Budget IP Address Worker Commute Remote Computing Website Customer Service Remote Monitoring Mobile Office Scam Domains Private Cloud Recovery Benefits Legal Employer Employee Relationship Public Speaking Analytics Music Lithium-ion battery Telephony Computer Accessories Tech Support Books Safety Transportation

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *