Alltech IT Solutions Blog

Former Fraudster Says to Stop Using Debit Cards

Former Fraudster Says to Stop Using Debit Cards

When over 16 million people are scammed out of over $16 billion, there’s likely some type of problem that needs to be addressed. Famous con artist, Frank Abagnale, the man immortalized in Steven Spielberg’s Catch Me If You Can, a movie that was based off his own memoir, has been working as a security consultant with the Federal Bureau of Investigation for over 45 years. In that time, he has become an expert in cybersecurity and fraud prevention.

In those decades' worth of fraud detection, Abagnale has seen a lot, but he’s never seen anything quite like the debit card. “I don’t own a debit card. I’ve never owned one. I’ve never allowed my three sons to possess one. Certainly, and truly the worst financial tool ever given to the American consumer.” He goes on to talk about how the debit card spikes a person’s personal liability. 

Instead, he advocates the use of credit cards. The rationale is that transactions in which a consumer uses a debit card exposes the money in their account if credentials were to get stolen, while a credit card eliminates personal liability for stolen credentials. Additionally, by using credit in the same way that most people use debit, it allows people to build and maintain a healthy credit score, a must-have if you want to make any big-ticket purchases down the road. 

“When you steal credit card numbers...that has a very short, short shelf life. You have to get rid of it very, very quickly. But, if I steal your name, if I steal your social security number, and your date of birth, you can’t change your name, you can’t change your social security number, you can’t change your date of birth.”

Abagnale, goes on to talk about the future of cybersecurity and how new technologies are being developed that will change the face of authentication; and, leave passwords irrelevant. He also talks a bit about how the Internet of Things presents a lot of opportunities for hackers due to the technology companies not taking a vigilant look at the devices’ security before sending the tech to market. 

Watch the full talk here:

If you are looking for a way to secure your data, your business’ data, and keep your network and infrastructure secure, call the security experts at Alltech IT Solutions today at 954-628-3770.

Tip of the Week: Signatures Are More Than Just You...
Finding Value in Blockchain


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, November 13 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Downloads Tip of the week Access Risk Management Marketing Internet Explorer disposal Mobile Office Cloud Computing Managed IT Services Operating System RAM Computers Digital Cables Hacker Search The Internet of Things Plug-In Server Proactive IT Law Enforcement iPhone Windows Synergy Tech Term Managed Service Provider Cloud Miscellaneous Employer-Employee Relationship Unified Communications SaaS Email Knowledge Database Solid State Drive Processors Mobile Security Cryptocurrency Passwords Credit Cards Upgrade Business Intelligence Paper Internet of Things Tip of the Week Benchmarks Licensing Recovery Phone System Productivity Managed Services Provider Gaming Console Computer Specifications Current Events Hosted Solution Video Games Automation Regulation Vendor Management Samsung Edge Wi-Fi Virus Cost Management Television Hybrid Cloud Telephone Systems Security Cameras Email Management Copy Automobile Alerts Tablet Scams User Tips Software Remote Control Hardware Voice over Internet Protocol Streaming Media Government WhatsApp Productivity Business Technology Tactics Virtualization Microsoft Teams Printers Outsourced IT Staff User Tip Hacking Inventory User Security Encryption Save Money G Suite Office Access Control Information Mobile Device Management IT Support Websites Excel Live Streaming Android instant Messaging Batteries Compliance Training Microsoft Google Threats Authentication Ink File Management Two-factor Authentication IT budget Sports Insurance Time Management DDoS National Security Scheduling Education Net Neutrality Windows 10 Employee-Employer Relationship Spam Blocking Outlook Online Shopping Applications Battery Trends Information Technology Mobility Voice over IP OneNote Recycling Eliminating Downtime Google Maps VoIP Customer Service Windows 10 Cabling Word Business Continuity BYOD Workplace Tips Safety Dark Web Office 365 Botnet Office Tips Ransomware Gadgets Tech Support Environment File Sharing Cleaning Holiday Machine Learning Physical Security Business Computing Twitter Storage Wireless Internet Politics Bitcoin Autocorrect Apps Remote Support Lead Generation Managed IT Analysis Networking Paste Wearables SSD Quick Tips Communications Laptop Health Data Security Millennials Going Green Mobile Device IT Management Tech Terms IaaS Processor Spam Scalability Instagram Gmail News Threat Communication A.I. Amazon Connectivity Vulnerability Apple Malware eCommerce Microsoft Office Project Management Hard Disk Drive Certification Remote Computing Backup HIPAA Biometrics Maintenance Update Dark Data VoIp Wireless Phishing Authorization Taskbar Security Bring Your Own Device Browser Healthcare Remote Monitoring and Management Printing Employees Printer Avoiding Downtime Gadget Help Desk Travel How To Vulnerabilities Chrome App Backup and Disaster Recovery Vendor Small Business Data loss Workers IT Services Files Telephony Spotify Best Practices Updates Conferencing Patch Management Paperless Office Touchscreen Business Management Financial Congratulations Telephone System Hard Drives Chrome OS Leadership Website Windows 7 WiFi Managed IT Services GDPR Payment Big Data Freedom of Information Content Filtering Unified Threat Management Computer Care Reporting Google Drive Spyware Privacy Remote Monitoring Windows XP Bandwidth Efficiency Virtual Assistant Troubleshooting HP CrashOverride Hosted Solutions Collaboration Company Culture Data Recovery Cybersecurity BDR Sales Personal Information Entertainment Settings Display Network Security Dongle Employer Employee Relationship Movies Work/Life Balance Alert Wireless Charging Human Resources Users Hiring/Firing Managed Service Emoji VPN Emergency Router Printer Server Telecommuting Internet Video Facebook Comparison Data Protection Blockchain Disaster Recovery Managed IT Service Error Business Hard Drive Cybercrime Staffing Yahoo Multi-Factor Security Social Media Thank You Antivirus Technology Retail Hackers Telecommute PowerPoint Data Value Profitability e-waste Managing Stress Network Password Smartphones Data Backup eWaste Money WannaCry E-Commerce Mobile Devices Microsoft Office 365 Innovation Server Management Windows Server 2008 R2 Saving Money Artificial Intelligence Medical IT Webcam Shortcut Data Management HaaS Budget Smartphone Payment Cards Document Management Data Breach IT Support Network Attached Storage Technology Tips Worker Analytics Scam Cortana Electronic Health Records Smart Technology