Get Started Today!  (415) 295-4898

croom new

415 IT Blog

When It Comes to Payment Cards, Frank Abagnale Gives Credit Where Credit is Due

When It Comes to Payment Cards, Frank Abagnale Gives Credit Where Credit is Due

With more than $16 billion being scammed from more than 16 million people, there is clearly an issue at hand that could use some expert insight. Those who are familiar with Steven Spielberg’s Catch Me If You Can might know that the movie was based on the memoirs of Frank Abagnale, former con man and longtime security consultant of the FBI. With his 45 years of experience with the bureau, Abagnale can safely by considered an expert in cybersecurity and fraud protection.

One thing that Abagnale has gone on the record to discuss is what he sees as the issues in personal liability associated with using a debit card. As he says, “I don’t own a debit card. I’ve never owned one. I’ve never allowed my three sons to possess one. Certainly and truly the worst financial tool ever given to the American consumer.”

Clearly, Frank is not a fan of debit cards.

His recommendation is to use credit cards instead. His reasoning makes sense, too: a compromised debit card effectively equates to the victim’s account being compromised, whereas a credit card company wipes out personal liability in the case of stolen credentials. Furthermore, if someone were to use their credit as they would a debit card, they would have an easier time building a reputable credit score - something that certainly comes in handy when there are large purchases to make later on.

Abagnale went on to describe other benefits at his talk for Google’s 2017 Security and Privacy Month:

“When you steal credit card numbers...that has a very short, short shelf life. You have to get rid of it very, very quickly. But, if I steal your name, if I steal your social security number, and your date of birth, you can’t change your name, you can’t change your social security number, you can’t change your date of birth.”

He continues in his talk, discussing the future of cybersecurity and many topics that we frequently touch on in this blog - new technologies, the changing face of authentication, the security issues of the Internet of Things. You can see his entire talk here:

Once you’ve finished watching, you’re going to want to do everything you can to keep your business data, network, and infrastructure secure. 415 IT can help. Give us a call at (415) 295-4898 to get started.

How Managed IT Benefits Professional Services
The IoT Continues to Expand
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, May 30 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Backup Data IT Support Privacy Network Security Hosted Solutions Cloud Data Recovery IT Services Software Efficiency Managed IT Services Internet Email Malware Outsourced IT Innovation Business Small Business Tech Term Upgrade Cloud Computing Hackers Business Management Computer Collaboration Cybersecurity User Tips Windows 10 Microsoft Business Continuity Google Mobile Devices Hardware Phishing Communication Ransomware Workplace Tips VoIp Managed Service Smartphones Android Backup Managed Service Provider Paperless Office Encryption Server Communications Quick Tips Office 365 Remote Monitoring Data Management Disaster Recovery Managed IT Mobile Device Healthcare Business Technology Vulnerability BDR Holiday Windows 7 Saving Money Browser Wi-Fi Network Internet of Things Artificial Intelligence Passwords Remote Work Applications Miscellaneous Help Desk Laptops Compliance Social Media Facebook Document Management Government Smartphone Save Money Managed IT services Processor Health Two-factor Authentication Redundancy Vendor Management Blockchain Scam Avoiding Downtime Employer-Employee Relationship Users Antivirus Microsoft Office Data Security Bandwidth Virtualization Project Management Automation Tip of the week Information Data Loss Proactive Maintenance Meetings Website Infrastructure IT Management VPN Company Culture Software as a Service Customer Relationship Management IoT Chrome Access Control Virtual Private Network OneDrive Analytics Windows Storage Router Machine Learning BYOD Mobility RMM Gmail Alert Server Management The Internet of Things Cooperation Recycling Co-Managed IT Risk Management Monitoring Gadgets File Management Financial Remote Monitoring and Management Net Neutrality Assessment Payment Cards Networking Operating System Office Search Network Management Tablet Electronic Health Records Dark Web Augmented Reality Regulations Employees Internet Exlporer Consultation Smart Technology Files Management Consulting Downtime Hard Drive Managed Services Employee-Employer Relationship File Sharing Computing Professional Services Training Time Management Managed Services Provider Apps Social Network Word Remote Workers HIPAA Utility Computing Flexibility Unified Threat Management Bring Your Own Device Mobile Security Patch Management Covid-19 Unified Communications Password Recovery Tech Support Printing Operations CIO applications Bluetooth G Suite Human Error Shadow IT Digital Payment Hotspot E-Commerce Theft Managed IT Service Windows Server Mobile Authentication Holidays Employer/Employee Relationships Apple Techology Smart Tech Database Hard Disk Drives Sensors Development Electronic Medical Records Outsource IT Black Friday Technology Laws IT Technicians Cost Management Remote Worker Money Motherboard OneNote Chromebook Permission Outsourcing Mouse Language Notes Connectivity Features Break Fix User Management Emergency Multi-Factor Security Websites Authorization IT Proactive Maintenance Solid State Drive Outlook Disaster Resistance Cyber Monday Staff Voice over Internet Protocol Projects Printer Migration eWaste Politics Optimization Permissions Solid State Drives Cookies Cables Laptop Unified Threat Management Private Cloud Microsoft Excel Value of Managed Services How To Vulnerabilities Test Video Conferencing Computing Infrastructure PowerPoint Display Procurement Teamwork Information Technology SaaS WPA3 Managing Stress Business Telephone Cybercrime Cyber security Shortcut Proactive IT Remote Working Return on Investment Chatbots Instant Messaging Virtual Machines Google Calendar Fraud Options Telephone Nanotechnology Wires Mirgation Bookmarks ROI Lenovo Touchscreen Hacking Mobile Computing Biometric Alerts Wearable Technology Star Wars Cyberattacks Social Virtual Reality Shared resources Going Green Samsung Spam Fleet Tracking Enterprise Content Management Zero-Day Threat IT Assessment Travel Database Management IT Consulting Budget Firewall Settings Personal Information SharePoint Heating/Cooling Identity Theft Enterprise Resource Planning Customer Service Credit Cards 5G Mobile VoIP App Mobile Device Management Bitcoin Mail Merge User Error Cache Favorites Manufacturing Vendor Superfish Trending Geography Wireless Gamification Comparison Licensing Virtual Assistant Read Only Security Cameras Data Warehousing Batteries Statistics Social Networking Asset Tracking Backup and Disaster Recovery Digitize Technology Tips GDPR Data Breach Distributed Denial of Service Transportation Active Directory Downloads Servers Identity MSP Finance Computers Legislation Wireless Internet Big Data Screen Reader Point of Sale Tech Terms Wasting Time Current Events Address WiFi Remote Computing Conferencing Windows Server 2008 Smart Devices Modem High-Speed Internet Mobile Office Specifications Printers Education Marketing CEO Students Twitter Daniel Stevens Regulation

Latest Blog

While all a business’ technology solutions are important, some are bound to take priority over the others, especially when certain ones become an industry-wide focus. A recent survey evaluated the top concerns of small-to-medium-sized businesses for the coming year. The resu...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...