Combating Identity Fraud In A Virtual World

Slides:



Advertisements
Similar presentations
The Hidden Costs of Identity Theft on American Business.
Advertisements

Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
[your name, organization] Protecting Your Identity: What to Know, What to Do.
My Name is Todd Davis My Social Security # is
Parachute Neighborhood Watch Presentation February 9, 2010.
Presented By Drexel and FMFCU.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Employee Law Module What you need to do to protect credit history and the documents that you will need for employment. The information in this module comes.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Scams & Schemes Common Sense Media.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Wireless Access Code: July 21, 2002  General medical ID theft education is lacking – over 1.4 million fraud victims in  Fraud can.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Theft.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
The Best Identity Protection
By: Asfa Khan and Huda Mukhtar
Identity Theft By: Tiffany Goode and Jessica Jackson.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Your Assets By Preventing Identity Theft 1.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
Breach Products & Services NASPO ValuePoint Master Agreement MA
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Workshifting Transform your business – empower your people.
Fraud: Identity Theft G.1 List and explain consumer protection laws, including credit reporting, debt collection, and privacy. G.2 Define common, unfair.
IDENTITY PROTECTION INFORMATION SECURITY LEADING DATA SOLUTIONS Innovative technology, collaborative relationships and real-time actionable alerts offer.
Identity Theft How bad people get good credit. Lindsey Bertugli.
Risky Business Week Protecting Your Identity: What to Know, What to Do Legal Division CSAA Insurance Group, a AAA Insurer.
Shielding the Wellness of Your Identity. Who is Elements? Credit Union A member-owned not-for-profit cooperative Founded by Lilly in Today representing.
Protecting Your Assets By Preventing Identity Theft
Identity Theft It’s a crime!
Protecting Your Credit Identity
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Identity Theft Presentation
Digital Citizenship Middle School
Fraud Mobility Ken Meiser VP- Identity Solutions.
Protecting Your Identity:
#1 Consumer Fraud Complaint – 5th straight year!
How to Protect Yourself from ID Theft and Social Engineering
Tax Identity Theft Presenter Date
Information Security Session October 24, 2005
Protecting Your Identity:
Security Essentials for Small Businesses
Protecting Yourself from Fraud including Identity Theft
Protecting Your Company’s Most Valuable Asset
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
“Credit score vocabulary”
Company Name | Phone Number | Website | Address
Identity Theft By Omer Ersen.
Is someone pretending to be you?
Presentation transcript:

Combating Identity Fraud In A Virtual World ©2016 LifeLock, Inc. 1

Portion of U.S. adults who own a smartphone1 MORE CONNECTED AND MOBILE THAN EVER Mobile devices are rapidly overtaking PCs, and companies are embracing “BYOD.” Portion of U.S. adults who own a smartphone1 1 Pew Research, Technology Device Ownership 2015, Oct 2015 © 2016 LifeLock, Inc. 2

GOOD NEWS FOR BUSINESS Mobile devices enable knowledge workers to take care of business from virtually anywhere, at any time. © 2016 LifeLock, Inc. 3

WHAT’S THE CATCH? Mobile, social media-savvy employees and customers may be more likely to become identity fraud victims. © 2016 LifeLock, Inc. 4

2 Seconds 13.1 Million #2 Complaint 5.4% HOW BIG IS THE PROBLEM? Identity Fraud Rates 13.1 Million 5.4% Every 2 Seconds #2 Complaint Number of U.S. victims of identity theft in 2015.1 Portion of U.S. adults who have been victims of identity theft in one recent 12-month period.1 Frequency with which someone in the U.S. is a victims of identity theft.1 Identity theft was the second most common consumer complaint in 2015.2 1 2016 Identity Fraud, Javelin Strategy & Research, February 2016 2 Federal Trade Commission, Consumer Sentinel Network Data Book for January –December 2015 © 2016 LifeLock, Inc. 5

WHAT PUTS USERS AT RISK? Online lifestyles open opportunities to thieves Oversharing personal information on social media: • Email addresses • Birthdays • Phone numbers • Screen names • GPS locations, etc. One wrong click in an email or a social media stream can open up a Pandora’s box of troubles © 2016 LifeLock, Inc. 6

SECURITY BREACH CAN OCCUR DESPITE YOUR BEST EFFORTS Over 160 million records were exposed from data breaches in 20151 Sophisticated criminals have learned how to exploit vulnerabilities in the banking system Successful takeover of a credit card account can easily provide valid EMV-capable cards to fraudsters2 SSN breach victims are 17 times more likely to become victims of new account fraud2 1 “Data Breach Reports.” Identity Theft Resource Center, December 2015. 2 2016 Identity Fraud Study, Javelin Strategy & Research, February 2016. © 2016 LifeLock, Inc. 7

13.1 Million 15 WHAT ARE THE COSTS? Billion $2379 Number of U.S. victims of identity fraud in 2015.1 Cost of identity fraud to Americans.1 New account fraud loss averages $2,379 per incident in 2015.1 1 2016 Identity Fraud, Javelin Strategy & Research, February 2016 © 2016 LifeLock, Inc. 8

WHAT CAN CONSUMERS DO? Be cautious about revealing personal information on social media sites. Take advantage of privacy settings. Shop on secure sites with URLs preceded by “https.” Don’t share personal information while using public Wi-Fi. © 2016 LifeLock, Inc. 9

WHAT CAN EMPLOYERS DO? Offer identity fraud protection as an employee benefit. Educate employees about security best practices. Offer support for user-supplied mobile devices. © 2016 LifeLock, Inc. 10

PROTECTION AS A SERVICE Identity theft protection services are a valuable benefit for all types of businesses. Proactive alerts: Notifies clients when personal information is being used to apply for utilities, credit cards, loans and more. Remediation, restoration and reimbursement: Helps victims recover if identity fraud occurs. © 2016 LifeLock, Inc. 11

WHAT TO LOOK FOR IN AN IDENTITY THEFT PROTECTION SERVICE Does the service cover identity theft and/or identity fraud? Is there an online portal or other simple way to track activity? If identity theft or fraud occurs, does the company offer remediation or do they just notify me—and then I have to take care of the issue? How easy is it for my employees or customers to enroll? © 2016 LifeLock, Inc. 12

A VIRTUAL NECESSITY FOR YOUR BUSINESS By offering identity theft protection services you can: Build stronger relationships with employees. Ensure secure productivity for your workforce. Change outcomes for employees who have an ID theft incident. © 2016 LifeLock, Inc. 13

VISIT LIFELOCK.COM/BUSINESS OR CALL 1.877.511.7906 TO LEARN MORE TODAY © 2016 LifeLock, Inc. 14