Presentation is loading. Please wait.

Presentation is loading. Please wait.

Welcome James B. Underhill, CFP ® Financial Planner Underhill Financial Advisors, LLC 3146 N. Swan Rd Tucson, AZ 85712 Office: (520) 795-2950

Similar presentations


Presentation on theme: "Welcome James B. Underhill, CFP ® Financial Planner Underhill Financial Advisors, LLC 3146 N. Swan Rd Tucson, AZ 85712 Office: (520) 795-2950"— Presentation transcript:

1 Welcome James B. Underhill, CFP ® Financial Planner Underhill Financial Advisors, LLC 3146 N. Swan Rd Tucson, AZ Office: (520) Michael S. Nyman CPA, CISA, CISSP, CITP, CRISC, CliftonLarsenAllen Securities and Investment Advisory Services offered through ING Financial Partners, Member SIPC. Underhill Financial Advisors, L.L.C. is not a subsidiary of nor controlled by ING Financial Partners. Michael S. Nyman & CliftonLarsonAllen, Underhill Financial Advisors, LLC and ING Financial Partners are not affiliated companies. This seminar has been funded in whole by AssetMark Trust _IAR_0416

2 ©2013 CliftonLarsonAllen LLP CLAconnect.com Ways to protect yourself Identify Theft

3 ©2013 CliftonLarsonAllen LLP Catholic church parish Hospice Collection agency Main Street newspaper stand Electrical contractor Health care trade association Rural hospital Mining company On and on and on and on…………….. What do the following have in common?

4 ©2013 CliftonLarsonAllen LLP CliftonLarsonAllen – Mike Nyman Mike Nyman –Alphabet Soup –IT Security / IT Assurance –Softball –Boy Scout Leader –Dad

5 ©2013 CliftonLarsonAllen LLP Boy Scouts, IT Professionals, & Hackers Be Prepared… Boys Scouts –Be Prepared –Mountain Man Rendezvous Preparation –Road Trip!!!

6 ©2013 CliftonLarsonAllen LLP Boy Scouts, IT Professionals, & Hackers Be Prepared… Boy Scouts –R-C Boy Scout Ranch –Daily Routine –Business as Usual…

7 ©2013 CliftonLarsonAllen LLP Cub Scouts, IT Professionals, & Hackers Be Prepared… Culter Run –Various events

8 ©2013 CliftonLarsonAllen LLP Reasons Why We Should Care Organized Crime –Wholesale theft of personal financial information Fastest growing white-collar crime –Use of online credentials Hackers are targeting you! –WSJ front page: “Hackers Turn to Small Business”

9 ©2013 CliftonLarsonAllen LLP The Cost? Norton/Symantec Corp: Cost of global cybercrime: $388 billion Global black market in marijuana, cocaine and heroin combined: $288 billion  Hackers are lazy - go for the “easy money”  Bank customers are much easier targets than the banks themselves

10 ©2013 CliftonLarsonAllen LLP Identify Theft – Doing Business Safely Emerging & Continuing Security Trends Types of Identify Theft Key defensive measures

11 ©2013 CliftonLarsonAllen LLP CLAconnect.com Emerging and Continuing Security Trends

12 ©2013 CliftonLarsonAllen LLP Two Security Threat Reports Intrusion Analysis: TrustWave –January 2010 and April 2011 –https://www.trustwave.com/GSRhttps://www.trustwave.com/GSR Intrusion Analysis: Verizon Business Services –July 2010 and April 2011 –http://securityblog.verizonbusiness.com/2011/04/19/201 1-data-breach-investigations-report-released/http://securityblog.verizonbusiness.com/2011/04/19/201 1-data-breach-investigations-report-released/

13 ©2013 CliftonLarsonAllen LLP TrustWave – Intrusion Analysis Report Top Methods of Entry Included: Remote Access Applications [45%]  Default vendor supplied or weak passwords [90%] 3 rd Party Connections [42%] – MPLS, ATM, frame relay SQL Injection [6%] – Web application compromises [90%] Exposed Services [4%]

14 ©2013 CliftonLarsonAllen LLP Verizon Data Breach Analysis

15 ©2013 CliftonLarsonAllen LLP Hackers, Fraudsters, and Victims Opportunistic Attacks Targeted Attacks

16 ©2013 CliftonLarsonAllen LLP Social Engineering Phishing –“Spear Phishing” On-line trojans How do hackers and fraudsters break in?

17 ©2013 CliftonLarsonAllen LLP The Fine Art of “People Hacking” “Amateurs hack systems, professionals hack people.” Bruce Schneier Social Engineering uses non-technical attacks to gain information or access to technical systems –Pre-text telephone calls –Building penetration ◊ Seeding – attacks

18 ©2013 CliftonLarsonAllen LLP Pre-text Phone Calls “Hi, this is Mike from Comcast. I am working with Randy, and I need your help…” –Name dropping –Establish a rapport –Ask for help –Inject some techno-babble –People want to avoid inconvenience –Timing, timing, timing…

19 ©2013 CliftonLarsonAllen LLP Verizon – Threat Vectors

20 ©2013 CliftonLarsonAllen LLP CLAconnect.com Types of Identify Theft

21 ©2013 CliftonLarsonAllen LLP WHAT IS IDENTITY THEFT? It occurs when someone steals your personal information – e.g., credit card or Social Security number – and uses it fraudulently It can cost you time and money It can destroy your credit and ruin your good name

22 ©2013 CliftonLarsonAllen LLP Your Personal Information Is Where? YOU Smartphone Internet Mail Trash USB Banks, Credit Agencies, Utilities, and Retail. Education, Student Loans, Healthcare Government, Taxes, Criminal, Property, and VA Driver License Company laptop Paperwork Personal PC

23 ©2013 CliftonLarsonAllen LLP 1. Indifference – Lack of Feeling 2. Ignorance – Lack of Knowledge 3. Inability – Lack of Training or Education 4. Inaction – Lack of Respect FOUR AREAS OF NEGLECT

24 ©2013 CliftonLarsonAllen LLP Drivers License MedicalFinancialSocial Security Five Types of Identity Theft It’s not just about Credit Cards, it’s a Legal Issue ! Less than 28% Criminal

25 ©2013 CliftonLarsonAllen LLP Driver’s License Identity Theft ♦ Your driving privileges could be suspended or revoked. ♦ You could be arrested during a routine traffic stop for crimes you did not commit. ♦ Thieves can open bank accounts, apply for credit cards and cash checks in your name. Our Driver’s License has become an unofficial National Identification Card !

26 ©2013 CliftonLarsonAllen LLP Illegal Immigrants use your Social Security Number to gain employment or report income under your name. They take the income leaving you with the tax bill. They can file false income tax returns or even file for social security benefits using your number. Thieves and Criminals can use your SSN to apply for credit, obtain a Driver’s License and much more … Social Security Identity Theft

27 ©2013 CliftonLarsonAllen LLP Why your Children are at Risk ?

28 ©2013 CliftonLarsonAllen LLP ♦ You could owe thousands of dollars for a procedure you never had. ♦ You could become uninsurable and be denied employment because of conditions that you do not have (AIDS, Diabetes etc…) There are over 52,000,000 people in the U.S. without Health Insurance. (US Census Bureau 2007) Stolen Health Insurance Card are being sold on the black market for $500-$600 each ! (AARP) Medical Identity Theft

29 ©2013 CliftonLarsonAllen LLP ♦ You could be arrested for crimes you didn’t commit. ♦ You could be denied employment because of fraudulent criminal records found during routine background checks. ♦ Security checkpoints at airports could become a nightmare for you. Thieves mask their criminal activity behind your identity Criminal Identity Theft occurs when an imposter gives another person’s name and personal information such as a driver’s license, date of birth or social security number to a law enforcement officer during an investigation or upon arrest. Criminal Identity Theft

30 ©2013 CliftonLarsonAllen LLP Victims of Financial Identity Theft are people who have had bank accounts wiped out, credit histories ruined and jobs and valuable possessions taken away. Thieves use your social security number to open new accounts and can change the billing address leaving you with the debt. Financial Institutions advertise zero liability for fraudulent activity on accounts if notified within 48 hours. What happens after 48 hours ? You could be responsible for debts you didn’t create ! Financial Identity Theft

31 ©2013 CliftonLarsonAllen LLP CLAconnect.com Common Security Practices

32 ©2013 CliftonLarsonAllen LLP Smartphones / Tablets Use of PIN Use of Cellular Connect versus Internet Connect

33 ©2013 CliftonLarsonAllen LLP Internet Don’t use obvious passwords and same passwords Don’t use password files Don’t use same internet browsers

34 ©2013 CliftonLarsonAllen LLP Internet s Spam

35 ©2013 CliftonLarsonAllen LLP Phishing – Targeted Attack Randall J. Romes Two or Three tell- tale signs Can you find them?

36 ©2013 CliftonLarsonAllen LLP Phishing – Targeted Attack Fewer tell tale signs on fake websites

37 ©2013 CliftonLarsonAllen LLP Mail / Trash Inspect your financial statements Be alert for mail or bills that don’t arrive Secure storage place at home Shred financial documents before discarding them Trash on the curb, where is your privacy?

38 ©2013 CliftonLarsonAllen LLP Banks / Education / Government Databases Don’t give out personnel information unless you’re sure who you’re dealing with Protect your identify

39 ©2013 CliftonLarsonAllen LLP If old one, properly discard it If stolen or compromised, report to law enforcement Get a new license and a new license number Driver License

40 ©2013 CliftonLarsonAllen LLP Telephone Some warning signs of telemarketing fraud—what a caller may tell you: “You must act ‘now’ or the offer won’t be good.” “You’ve won a ‘free’ gift, vacation, or prize.” But you have to pay for “postage and handling” or other charges. “You must send money, give a credit card or bank account number, or have a check picked up by courier.” You may hear this before you have had a chance to consider the offer carefully. “You don’t need to check out the company with anyone.” The callers say you do not need to speak to anyone including your family, lawyer, accountant, local Better Business Bureau, or consumer protection agency. “You don’t need any written information about their company or their references.” “You can’t afford to miss this ‘high-profit, no-risk’ offer.”

41 ©2013 CliftonLarsonAllen LLP Final Words DETER thieves by safeguarding you information DETECT suspicious activity by routinely monitoring your financial accounts and statements. DEFINE against identify theft as soon as you suspect a problem.

42 ©2013 CliftonLarsonAllen LLP Questions? Hang on, it’s going to be a wild ride!! Mike Nyman, Sr. Manager Information Security Services Group *** (602)


Download ppt "Welcome James B. Underhill, CFP ® Financial Planner Underhill Financial Advisors, LLC 3146 N. Swan Rd Tucson, AZ 85712 Office: (520) 795-2950"

Similar presentations


Ads by Google