Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Part I: Making Good Online Choices
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Top 10 Checklist to Protect Your Personal Privacy Online Teens 1.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
How to keep your kids safe online
Using internet and cell phones safely
Internet Safety and Kids Ms. Lee’s Classroom Computers are NOT bad Computers can be used to help kids learn and play. They can be used safely, if parents.
Scams Stevie's Scam School videos
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
How To Protect Your Privacy and Avoid Identity Theft Online.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
 Communicating with friends is now easier than ever, for example on Facebook you can connect with all your friends and chat to them very easily and instantly.
Internet safety By Lydia Snowden.
How To Protect Your Privacy and Avoid Identity Theft Online.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
IT security By Tilly Gerlack.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Overview Internet Privacy & Safeguards Social Networking Potential Threats Cyber-bullying.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Berkeley Unified School District Cyber Savvy social networking and netiquette.
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Consumer Protection Shop Safely and Guard Your Financial Information.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
What is Spam? d min.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Cyber Safety Jamie Salazar.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
E-Safety Parent Talk Helping to keep your children safe online.
Cybersafety 4 Kids: Smart Moves in an Online World.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Internet Safety.
8 online danger tips By: kailee bariring.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Protect Your Computer Against Harmful Attacks!
Importance of Privacy Internet Safety
What you can do to support people to be safe online
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Internet Safety – Social Media
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas, Elbert and Lincoln Counties

Common Scams You Have Won $50, You Have Won $50,000.00

H ave two things in common:  Y ou are given a very short period to respond  There is a threat or penalty if you do not respond Extortion Scams

Prevent Becoming a Victim  Never talk to strangers on the telephone – they are not calling to wish you a good day. They are invading your privacy.  Use an answering machine, voice mail or Caller ID to screen calls.  Never give any personal information, including credit card numbers, bank account, or Social Security Numbers, passwords or pin numbers, driver’s license number, etc., to anyone who calls you, UNLESS YOU INITIATE THE CALL.

 /websites  Social networking sites  On-line classified ads  Mobile devices

 Never do business without vetting the buyer; seller.  Deal with local advertisers.  Meet in person first, in a public setting, before agreeing to a purchase or service.  Be wary if the advertiser is unable to meet in person.  Never wire or send money in advance. Craigslist Scams

Cyber Crime Prevention Electronic Communications:  Know who you are communicating with.  Watch what is posted on social networking sites about you or your family.  Use electronic funds transfer & direct deposit.  Password protect online business transactions.  Update virus protection software regularly.  Confirm you are on a secure website before making on-line purchases.  Always log off each time you are finished.

Is Website Safe?

Stop Unwanted Register at Registration is free and good five years

Risks on Social Media There are strangers who “friend” you, but they really aren’t your friend.

 These are “friends” who try to get you to click on videos or other attachments, or download a document to “fix” a problem. By doing so, these attachments can infect your computer with viruses and other malware.  Sometimes, these attachments allow such “friends” to steal your personal information off of your computer. Risks on Social Media

Be careful of what you post on Facebook:  Photo’s that show house numbers or street names in the background  Personal information about you or other family members that a stranger can use to steal identity, such as:  Names of family members, birthdates, addresses Risks on Social Media

Protection  Adjust website privacy settings  Only select “friends” who you trust, because once you select a friend, they can access any information that you allow to be viewed by all friends.  If you don’t know a friend well, only give them limited access to your profile  Be careful what you click on, on others’ sites

Cell Phone Safety Most common method of infecting phone with malware is by downloading apps and games.

Risk Factors:  Not researching origin of apps before downloading Signs:  Apps that don’t include privacy policies  Apps that show up on phone that you didn’t download  Texts From unknown sources Cell Phone Safety

 Read all privacy policies before downloading apps.  Adjust settings to block unwanted numbers.  Routinely upgrade apps – includes the additional benefit of providing updated security patches.  Contact mobile phone carrier or manufacturer to resolve a security breach. Cell Phone Safety