Alltech IT Solutions Blog

Former Fraudster Says to Stop Using Debit Cards

Former Fraudster Says to Stop Using Debit Cards

When over 16 million people are scammed out of over $16 billion, there’s likely some type of problem that needs to be addressed. Famous con artist, Frank Abagnale, the man immortalized in Steven Spielberg’s Catch Me If You Can, a movie that was based off his own memoir, has been working as a security consultant with the Federal Bureau of Investigation for over 45 years. In that time, he has become an expert in cybersecurity and fraud prevention.

In those decades' worth of fraud detection, Abagnale has seen a lot, but he’s never seen anything quite like the debit card. “I don’t own a debit card. I’ve never owned one. I’ve never allowed my three sons to possess one. Certainly, and truly the worst financial tool ever given to the American consumer.” He goes on to talk about how the debit card spikes a person’s personal liability. 

Instead, he advocates the use of credit cards. The rationale is that transactions in which a consumer uses a debit card exposes the money in their account if credentials were to get stolen, while a credit card eliminates personal liability for stolen credentials. Additionally, by using credit in the same way that most people use debit, it allows people to build and maintain a healthy credit score, a must-have if you want to make any big-ticket purchases down the road. 

“When you steal credit card numbers...that has a very short, short shelf life. You have to get rid of it very, very quickly. But, if I steal your name, if I steal your social security number, and your date of birth, you can’t change your name, you can’t change your social security number, you can’t change your date of birth.”

Abagnale, goes on to talk about the future of cybersecurity and how new technologies are being developed that will change the face of authentication; and, leave passwords irrelevant. He also talks a bit about how the Internet of Things presents a lot of opportunities for hackers due to the technology companies not taking a vigilant look at the devices’ security before sending the tech to market. 

Watch the full talk here:

If you are looking for a way to secure your data, your business’ data, and keep your network and infrastructure secure, call the security experts at Alltech IT Solutions today at 954-628-3770.

Tip of the Week: Signatures Are More Than Just You...
Finding Value in Blockchain
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, May 28 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.alltechits.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Live Streaming Shadow IT Authorization Browser Sports Chrome OS Staff Paste Data Protection Retail Video Games Laptop Updates Politics disposal Co-Managed IT Firewall Analysis Compliance Trends Storage Training Voice over Internet Protocol Data Management Profitability Downloads Profiles Botnet Malware Data Environment Network Hacker Voice over IP Upgrade Outlook Emoji Batteries Database Tech Terms Windows 10 Remote Workers Education Content Filtering Recovery HIPAA Employer-Employee Relationship Analytics Phone System Value Managed IT Services Data Recovery Windows 10 Threat Processor Physical Security Eliminating Downtime Streaming Media Scam Productivity Antivirus Spotify Data loss Licensing Wearables Money Internet Printing Instagram Information Technology Authentication Word Server Cybersecurity Copy Efficiency Password Thank You Windows Specifications Scalability Smart Technology Business Applications Worker Multi-Factor Authentication Printers Hybrid Cloud Vulnerabilities Error Cortana Cloud Computing Disaster Recovery Wireless Connectivity Router Electronic Health Records Collaboration Customer Service Hard Drives Remote Monitoring User Tips Employees Backup and Disaster Recovery Productivity Digital Chrome Current Events WhatsApp Microsoft G Suite Paper Data Breach Apps Workplace Tips Holidays Healthcare Remote Monitoring and Management Millennials Blockchain Work/Life Balance Cryptocurrency Company Culture Automation Quick Tips Facebook Business Management Managed Service Bring Your Own Device Hardware Solid State Drive Network Security Video Biometrics BDR Hosted Desktop Gadget User Security Government Google Maps Ransomware Taskbar Medical IT Tablet Alert Cabling IT budget Android Processors Comparison Virtual Private Network How To File Sharing Telephone Systems Gadgets Financial Business Technology IT Support Data Security Server Management Phishing PowerPoint Scheduling Marketing VPN Autocorrect Inventory Alerts Mobile Devices GDPR Smartphone Computer Care Save Money Spam Blocking Unified Threat Management Innovation Patch Management Computer Personal Information VoIp Managed IT Services Benchmarks Google Cables Remote Control Bandwidth Telecommuting Cloud Proactive IT Access Two-factor Authentication Saving Money Synergy Office Managed IT Service eWaste Backup Hard Drive Cleaning Office 365 Certification Amazon Data Backup Internet Explorer Hosted Solutions Privacy Business Intelligence Business Computing Hosted Solution Managing Stress Internet of Things Cost Management Entertainment Knowledge RAM Project Management Safety Email Best Practices Networking Mobile Device Wireless Internet Hacking Managed IT Dark Web Leadership Gmail Payment E-Commerce Budget Ink Office Tips Virtualization IT Services Conferencing Security IaaS Recycling Spam Printer Outsourced IT Threats Search Virtual Assistant Customer Relationship Management Distribution Unified Communications Vendor Employer Employee Relationship iPhone Mobile Office Vendor Management Hard Disk Drive Telecommute Time Management Small Business Managed Services Provider Emergency News Regulation Virus Tech Support Website Passwords Shortcut Encryption Holiday The Internet of Things Paperless Office Edge Health User Tip Google Drive Tech Term Windows XP Yahoo Information Technology Telephone System Mobility Windows Server 2008 R2 Machine Learning Fleet Management Access Control Software File Management Tactics Technology Tips WannaCry Social Network Remote Computing Automobile Telephony Email Management Humor Payment Cards A.I. Social Media Multi-Factor Security eCommerce Gaming Console Samsung Wireless Charging Communication Vulnerability Troubleshooting Bitcoin WiFi Touchscreen IT Management Artificial Intelligence Virtual Reality Mobile Device Management Microsoft Teams Files Miscellaneous Spyware Excel instant Messaging IT Support Hackers e-waste Communications SSD Wi-Fi Online Shopping Websites Movies Remote Smartphones Memes Big Data Windows 7 Staffing Managed Service Provider DDoS IT App Update Help Desk Business Continuity Twitter Congratulations Scams Tip of the Week BYOD Network Attached Storage OneNote Hiring/Firing Insurance National Security Users Human Resources Document Management Webcam Going Green Security Cameras Lead Generation HP Employee-Employer Relationship Television HaaS Net Neutrality Sales Risk Management Microsoft Office 365 Remote Support Settings VoIP Plug-In Mobile Workers Travel Law Enforcement Maintenance Microsoft Office Dongle Avoiding Downtime Tip of the week Operating System SaaS Dark Data Computers Covid-19 Printer Server Mobile Security Display Credit Cards Apple CrashOverride Cybercrime Freedom of Information Battery Reporting