Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

When It Comes to Payment Cards, Frank Abagnale Gives Credit Where Credit is Due

When It Comes to Payment Cards, Frank Abagnale Gives Credit Where Credit is Due

With more than $16 billion being scammed from more than 16 million people, there is clearly an issue at hand that could use some expert insight. Those who are familiar with Steven Spielberg’s Catch Me If You Can might know that the movie was based on the memoirs of Frank Abagnale, former con man and longtime security consultant of the FBI. With his 45 years of experience with the bureau, Abagnale can safely by considered an expert in cybersecurity and fraud protection.

One thing that Abagnale has gone on the record to discuss is what he sees as the issues in personal liability associated with using a debit card. As he says, “I don’t own a debit card. I’ve never owned one. I’ve never allowed my three sons to possess one. Certainly and truly the worst financial tool ever given to the American consumer.”

Clearly, Frank is not a fan of debit cards.

His recommendation is to use credit cards instead. His reasoning makes sense, too: a compromised debit card effectively equates to the victim’s account being compromised, whereas a credit card company wipes out personal liability in the case of stolen credentials. Furthermore, if someone were to use their credit as they would a debit card, they would have an easier time building a reputable credit score - something that certainly comes in handy when there are large purchases to make later on.

Abagnale went on to describe other benefits at his talk for Google’s 2017 Security and Privacy Month:

“When you steal credit card numbers...that has a very short, short shelf life. You have to get rid of it very, very quickly. But, if I steal your name, if I steal your social security number, and your date of birth, you can’t change your name, you can’t change your social security number, you can’t change your date of birth.”

He continues in his talk, discussing the future of cybersecurity and many topics that we frequently touch on in this blog - new technologies, the changing face of authentication, the security issues of the Internet of Things. You can see his entire talk here:

Once you’ve finished watching, you’re going to want to do everything you can to keep your business data, network, and infrastructure secure. Central Technology Solutions can help. Give us a call at 1-844-237-4300 to get started.

How Managed IT Benefits Professional Services
The IoT Continues to Expand
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, January 19 2020

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Productivity Hosted Solutions Privacy Network Security Data Email IT Services Data Backup Malware Internet Hackers Software Outsourced IT Microsoft Productivity IT Support Innovation Computer Business Data Recovery Managed IT Services Mobile Devices Efficiency IT Support Hardware Upgrade Ransomware Backup Small Business Google User Tips Tech Term Cloud Computing Business Continuity Phishing Windows 10 Communication Internet of Things Collaboration Managed IT Services Cybersecurity Workplace Tips Smartphone Smartphones Managed Service Provider VoIP Paperless Office Android Business Management Disaster Recovery Remote Monitoring Data Management Facebook Social Media Windows 10 Windows Office 365 Managed Service Managed IT communications Save Money Encryption Artificial Intelligence Server Browser Mobile Device BDR Passwords Virtualization Holiday Network Help Desk Saving Money Risk Management BYOD Automation Business Technology App Password Government Wi-Fi Document Management Mobile Device Management Miscellaneous Quick Tips Apps Bring Your Own Device Gmail Microsoft Office Going Green Recovery Vendor Management Big Data Avoiding Downtime Windows 7 Analytics Chrome Unified Threat Management Laptops Applications Firewall Robot Bandwidth Compliance Healthcare Training Employer-Employee Relationship Money Computers Infrastructure Data storage Content Filtering File Sharing Data loss Vulnerability Blockchain Information Wireless Processor IT Management Redundancy Tip of the week Apple Hosted Solution Website Scam SaaS Telephone Systems Project Management Antivirus Customer Relationship Management Computing Machine Learning Mobility Storage Data Security Tablet Information Technology Printing Gadgets Files Operating System Access Control Remote Computing Customer Service Users Unified Communications Politics RMM Settings Work/Life Balance Virtual Reality Downtime Social Software as a Service Router Regulations Two-factor Authentication Office Maintenance IT Service VPN Networking Monitors Net Neutrality IT solutions Patch Management Social Network Electronic Medical Records Remote Workers Alert File Management Virtual Private Network Network Management Budget Internet Exlporer Sports Hard Drive Assessment IoT Bitcoin Payment Cards How To Samsung HIPAA How To Server Management Cooperation Co-Managed IT Flexibility Mouse Chromebook Mobile Security Outlook OneDrive Employees Consultation Private Cloud Monitoring Uninterrupted Power Supply Tech Support Google Drive Professional Services Company Culture Spam Recycling YouTube Business Growth WiFi Utility Computing Digital Payment Consulting Word Search Upgrades Dark Web Websites Identity Theft Twitter Proactive Licensing Mobile Computing Hacker Display The Internet of Things Administration End of Support Health Education Employee-Employer Relationship Solid State Drive LiFi Smart Technology Remote Monitoring and Management Wireless Technology Legal Management Current Events Technology Tips Virus Chatbots Gadget Wires Human Error Time Management Alt Codes Return on Investment Update Automobile Cost Management Computer Care E-Commerce WannaCry Teamwork Unsupported Software Vulnerabilities Authentication Database Management Microsoft Excel Modem Connectivity Hacking Cryptocurrency Database Sensors Multi-Factor Security Wearable Technology Options Holidays Distributed Denial of Service Annual Convention GPS WPA3 Financial Servers Data Breach Notes Social Engineering Printer USB Alerts Enterprise Resource Planning Bookmarks Mobile Data Comparison Identity Permission Typing Active Directory Features Hacks Shared resources Windows Server 2008 Crowdsourcing Meetings Geography Authorization Best Practice GDPR Cookies Marketing Supercomputer Disaster Trending Voice over Internet Protocol Google Calendar Mail Merge 5G Dark Data IT Personal Information Managed IT Service San Diego Tracking Fleet Tracking Procurement Technology Laws PowerPoint Value of Managed Services Safety Buisness G Suite Mobile History Favorites Specifications Taxes Test Touchscreen Techology Windows Server Cache Google Maps Electronic Health Records VoIP Sponsor High-Speed Internet Lenovo Permissions Nanotechnology Star Wars IT Budget Windows 8 Save Time Telephone Legislation Notifications IT Technicians Address Wireless Internet Business Telephone Break Fix Social Networking Asset Tracking Statistics Identities Managed Services SharePoint Black Market Staff Cabling Conferencing Manufacturing Optimization Black Friday Roanoke — Central Technology Solutions MSP Disaster Resistance Security Cameras User Management Writing Unified Threat Management Emoji Hotspot Cyberattacks Digital Obstacle Point of Sale Development Zero-Day Threat Superfish Google Wallet Network Congestion Fraud Screen Reader Transportation Mobile VoIP Mirgation Instant Messaging Employer/Employee Relationships Computer Repair Motherboard OneNote Bluetooth Hard Drives Google Docs Virtual Assistant Vendor Downloads Augmented Reality Cybercrime Managing Stress Hard Disk Drives Virtual Machines Physical Security Cyber Monday technology services provider Telephony Tech Terms Proactive IT Remote Worker Batteries Retail User Error Cortana Language Sync eWaste Read Only Spyware Course Humor Law Enforcement Cables Backup and Disaster Recovery Drones Projects Smart Tech Public Cloud Managed Services Provider Shortcut Backups Cyber security 3D Printing Migration Travel Enterprise Content Management Finance Firefox Deep Learning Proactive Maintenance Data Warehousing Botnet Wasting Time Smart Devices Processors Operations Solid State Drives Office Tips Credit Cards Technology Assurance Group ’s 18 Virtual Desktop Theft Heating/Cooling IT Consulting ROI Remote Work Computing Infrastructure Mobile Device Managment Software Tips Cameras Motion Sickness Emergency CrashOverride CCTV Administrator Relocation Regulation Webcam IT Consultant Error IT Assessment Web Server Hard Disk Drive Students Printers