Get Started Today!  (415) 295-4898

croom new

415 IT Blog

When It Comes to Payment Cards, Frank Abagnale Gives Credit Where Credit is Due

When It Comes to Payment Cards, Frank Abagnale Gives Credit Where Credit is Due

With more than $16 billion being scammed from more than 16 million people, there is clearly an issue at hand that could use some expert insight. Those who are familiar with Steven Spielberg’s Catch Me If You Can might know that the movie was based on the memoirs of Frank Abagnale, former con man and longtime security consultant of the FBI. With his 45 years of experience with the bureau, Abagnale can safely by considered an expert in cybersecurity and fraud protection.

One thing that Abagnale has gone on the record to discuss is what he sees as the issues in personal liability associated with using a debit card. As he says, “I don’t own a debit card. I’ve never owned one. I’ve never allowed my three sons to possess one. Certainly and truly the worst financial tool ever given to the American consumer.”

Clearly, Frank is not a fan of debit cards.

His recommendation is to use credit cards instead. His reasoning makes sense, too: a compromised debit card effectively equates to the victim’s account being compromised, whereas a credit card company wipes out personal liability in the case of stolen credentials. Furthermore, if someone were to use their credit as they would a debit card, they would have an easier time building a reputable credit score - something that certainly comes in handy when there are large purchases to make later on.

Abagnale went on to describe other benefits at his talk for Google’s 2017 Security and Privacy Month:

“When you steal credit card numbers...that has a very short, short shelf life. You have to get rid of it very, very quickly. But, if I steal your name, if I steal your social security number, and your date of birth, you can’t change your name, you can’t change your social security number, you can’t change your date of birth.”

He continues in his talk, discussing the future of cybersecurity and many topics that we frequently touch on in this blog - new technologies, the changing face of authentication, the security issues of the Internet of Things. You can see his entire talk here:

Once you’ve finished watching, you’re going to want to do everything you can to keep your business data, network, and infrastructure secure. 415 IT can help. Give us a call at (415) 295-4898 to get started.

How Managed IT Benefits Professional Services
The IoT Continues to Expand


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, November 15 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Data Backup Business Computing Data Network Security Hosted Solutions IT Support Data Recovery Privacy Cloud Software Email IT Services Outsourced IT Internet Tech Term Managed IT Services Malware User Tips Innovation Business Windows 10 Computer Efficiency Hackers Cloud Computing Small Business Microsoft Upgrade Business Management Collaboration Hardware Phishing Ransomware Google Paperless Office Cybersecurity Business Continuity Managed Service VoIp Workplace Tips Mobile Devices Android Communication Managed Service Provider Encryption Remote Monitoring Communications Server Office 365 Smartphones Internet of Things Passwords Managed IT Artificial Intelligence Vulnerability Backup Wi-Fi Help Desk Government Save Money Document Management Quick Tips Mobile Device Healthcare Managed IT services Browser Applications Data Management BDR Holiday Laptops Business Technology Disaster Recovery Saving Money Scam Redundancy Windows 7 Bandwidth Tip of the week Automation Microsoft Office Compliance Blockchain Processor Smartphone Avoiding Downtime Project Management Employer-Employee Relationship Antivirus Information Router Social Media VPN Analytics Machine Learning Website Access Control BYOD Windows Data Security Vendor Management IT Management Infrastructure Customer Relationship Management RMM Miscellaneous Chrome Two-factor Authentication Storage Monitoring Maintenance Facebook Bring Your Own Device HIPAA Utility Computing Financial Remote Monitoring and Management Networking Operating System Search Unified Threat Management Mobile Security OneDrive Professional Services Training Employees Unified Communications Recycling Mobility Downtime Files Employee-Employer Relationship Virtual Private Network The Internet of Things Company Culture Gmail Server Management Cooperation Network Risk Management Word Remote Workers Password Gadgets Apps Software as a Service Net Neutrality Regulations Patch Management Assessment IoT Management Hard Drive Network Management Tablet File Sharing Users Internet Exlporer File Management Data Loss Consultation Dark Web Smart Technology Alert Proactive Projects Cache Touchscreen Hacking Electronic Medical Records Computing Alerts Solid State Drives Payment Cards Geography Meetings Voice over Internet Protocol Time Management OneNote Permission Travel Value of Managed Services Social Networking Technology Laws Remote Worker Virtual Reality PowerPoint Display Teamwork Information Technology Identity Outlook Disaster Resistance Features Firewall Cybercrime Screen Reader Emergency Multi-Factor Security Heating/Cooling Authorization Return on Investment Remote Computing Trending Comparison Licensing Options Telephone Modem High-Speed Internet Printer Politics Statistics How To Test Technology Tips Managed Services G Suite Unified Threat Management Office Private Cloud Data Warehousing Flexibility Tech Support Legislation Shared resources Going Green Mobile Shortcut Proactive IT Electronic Health Records Procurement Distributed Denial of Service Database Management Smart Tech Servers WPA3 Settings Personal Information Consulting Specifications 5G Mobile VoIP Development Instant Messaging Lenovo Bluetooth Digital Payment Hotspot Manufacturing Vendor Motherboard Chromebook Recovery Bookmarks ROI Operations Virtual Assistant Bitcoin IT Technicians Cost Management Fleet Tracking Zero-Day Threat Virtualization Batteries IT Consulting Cyberattacks Social Managed IT Service GDPR Connectivity Samsung Transportation Active Directory Migration eWaste Managed Services Provider Mobile Device Management Black Friday Wireless Internet Big Data Cookies Cables SharePoint Customer Service Superfish Wireless Mouse Language Smart Devices Vulnerabilities Mail Merge User Error Favorites Money Wasting Time Current Events Websites Asset Tracking Backup and Disaster Recovery CIO applications Remote Work Managing Stress Data Breach Read Only Security Cameras Break Fix Windows Server Chatbots Point of Sale Tech Terms Cyber Monday Staff Employer/Employee Relationships Apple Nanotechnology Wires Downloads MSP Finance Permissions Mirgation Computing Infrastructure Hard Disk Drives Sensors Mobile Computing Address WiFi Conferencing Microsoft Excel Database SaaS Human Error Spam Enterprise Content Management Printing Augmented Reality Notes Wearable Technology Star Wars Fraud User Management Identity Theft Enterprise Resource Planning Techology E-Commerce Theft Proactive Maintenance Solid State Drive App Authentication Google Calendar Daniel Stevens Cyber security Regulation Marketing Twitter Education CEO Printers Students

Latest Blog

In managing business technology, we are always talking about downtime--how expensive downtime is, how downtime hurts productivity, how there are a multitude of separate situations that can cause downtime. That kind of doom and gloom may not get you to act, but it may just pu...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...