Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
Protecting Your Identity: What to Know, What to Do.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity theft: Real or Virtual? By: Alex Metzler.
IT security By Tilly Gerlack.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Be Cautious of Identity Theft By: Sydney Langley.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Information Security Sharon Welna Information Security Officer.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
By: Asfa Khan and Huda Mukhtar
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
IDENTITY THEFT.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Done by… Hanoof Al-Khaldi Information Assurance
Protecting Your Identity:
Protecting Your Identity:
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
What is Phishing? Pronounced “Fishing”
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Presented By: Jennifer Thayer, SPHR, SHRM-SCP

 Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks for Preventing Identity Theft  Learn Ways to Recover from Identity Theft  Review Cautions

In the last five years, online crime – cyber crime – has increased significantly. Last year estimated annual losses from all types of computer crime at $67 billion a year. (FBI Computer Crime Survey, 2015)

 1.5 million cyberattacks annually ◦ 4,000 per day and 170 per hour, 3 per minute ◦ Attackers targeting large companies to get customer’s personal information ◦ In 2014, 47% of Americans adults had their personal information stolen by hackers  Totaled $8,000,000,000 in credit card fraud (FBI cybercrime website-

SPAM Spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site. The most widely recognized form of spam is spam.

PHISHING Phishing is when thieves send fake s that scare you into giving them private information, credit card numbers and online passwords, for example, then use that information to steal from you.

ADWARE Any software that installs itself on your system without your knowledge and displays advertisements when the user browses the Internet.

SPYWARE Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.

Identity Theft Identity (ID) Theft is a crime where a thief steals your personal information, such as your full name or social security number, to commit fraud.

Secure Your Wireless Network  Secure your network with a password. If you don’t know how, either buy wireless protection software or hire someone to do it.

Protect Yourself  Secure your computer before you go online. - -strong anti-virus, anti-spyware and anti- spam security - strong personal firewall to prevent hackers from sneaking in your computer.

Use a Strong Password  Create complex usernames and passwords for websites and addresses.

Set Up Separate Account for Online Use  Set up a free Web-based address and provide that address to websites whenever you sign up for anything.

Update Often  Keep your security up-to-date

Check Reviews  Use a website rating service to help you avoid the illegitimate websites.

Nothing is FREE!  Avoid free screensavers, smiley faces and other free stuff unless you absolutely know the download is safe.

Need To Know?  Safeguard your private information.

Ask Questions?  Call your bank, service provider or institution to verify any s before you click on any links or fill out any forms.

Don’t be “Click Happy”!  Avoid pop-ups (Web browser windows that pop up).

Check Your Credit Report  Get a credit report from all three major credit reporting agencies at least once a year. ◦ -entitled to one free report per year ◦ -address errors immediately

Check Your Credit Card Statements  Review every credit card statement. ◦ contact your credit provider with any suspicious charges immediately.

Shop on Secure Websites ONLY  Take care when shopping online: Look for indicators that the website is secure, -VeriSign or TRUSTe -and a website URL that begins with “https” (that “s” stands for “secure”).

Secure Your Network  Lock down your wireless home network. If you don’t know how, hire someone to help you or use wireless protection software that makes wireless security easier to manage.

SUPERVISE children  Turn on or buy parental controls for your computer to manage when your kids can go online, and limit them to approved, safe websites.

 Find out what kind of security is loaded on the PC you’re using, and make sure it’s up- to-date. If the computer is not secure, don’t use it.

 Clean out the browser history on the PC ◦ remove your online history before you finish using the computer

 Secure your home wireless network with strong encryption, ◦ Don’t know how?, buy the software or hire an expert

 Avoid connecting to any Wi-Fi network unless you know it’s secure.  Airport  Malls  Restaurants

 Confirm the Wi-Fi network you are accessing is legitimate.

 Turn off the wireless network connection on your laptop when you are not using it.  Manually Select the network you wish to join

 Avoid using any websites that require password access when using a wireless hotspot.

 Never fill out forms that require confidential and personal information when using a wireless connection.

 Look around when you are online.

 Keep your laptop with you at all times to ensure your private information stays private.

 Report: Notify your credit card companies, financial institutions or other online service accounts about the fraud immediately.

 Contact the local police to file a report.  Get a copy of the report

 Report the fraud to one of the credit reporting agencies (Equifax, Experian and TransUnion) ◦ Only need to contact one ◦ Review credit report and request new one annually ◦ Prevents future fraud

 Immediately close compromised accounts  Dispute fraudulent charges  Communicate via certified letter  Save all correspondance

 File a complaint with the Federal Trade Commission (FTC). ◦ Will help to prevent someone else being victimized ◦ Will enforce businesses that violate consumer privacy laws.

 Reclaim your personal identification. ◦ cancel and replace your identification or driver’s license. ◦ Ask the agency to flag your file so that others cannot get a license or any other identification document in your name.

 Beware adware, spyware, and viruses. These can mess up your system, slow computer performance, and steal any personal passwords and information you use and keep on the computer or on the web.  Never open unscreened from contact that you don’t know; if in doubt, trash it.

 Avoid offers for free services, products  Avoid ”Official” s from institutions asking for personal information  Block pop-ups.  Download free software only from a reputable and trustworthy company.

 Use encryption to protect your personal information, and when logging into your computer  Log off from all websites and shut down your computer when not in use.  Log off from all websites and delete history, downloads, and cookies after using a public computer.  Protect your home/work wireless network with encryption  Frequently change your encryption password.

 Install trustworthy protection software, and keep yourself protected with updated versions.  Remember to update often