Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.

Slides:



Advertisements
Similar presentations
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Advertisements

SECURITY CHECK Protecting Your System and Yourself Source:
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Protecting Your Identity: What to Know, What to Do.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
Houston, We Have a Problem. When Things go Wrong Ed Carter & Steve Hoffer Information Security Office Ohio University.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Over 3,000 computers are affected monthly by Malware and Phishing.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Scams & Schemes Common Sense Media.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Spyware By: Sydney Langley. Spyware Is software installed on your computer without your consent Spyware monitors or controls your computer use.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Information Security Sharon Welna Information Security Officer.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Internet Safety Internet Safety LPM
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
You. are at risk for the fastest growing crimes crime.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Identity Theft It’s a crime!
Protecting Yourself from Fraud including Identity Theft
Identity Theft Samuel H. Slater.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division

“Phishing” from OnGuard Online

Identity theft is a crime… The U.S. Department of Justice defines identity theft this way: “Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain.”

A short quiz… What should you do if you receive an of this type? 1.Immediately click on the link and follow instructions to make sure your information is not affected. 2.Log into your account, check your information and change your password. 3.Don’t respond or enter any personal information, then forward the to

Protect your personal information Identity theft risk can be minimized when online by not giving out personal information. Don't reply or click on any link in an unsolicited or pop-up message asking for personal information. When shopping online, be careful what personal information you give, and always make sure vendors have taken measures to secure their sites.

Know who you are dealing with online Phishing. These are unsolicited s or pop-up messages claiming to be from businesses or organizations that you might be familiar with, like a bank or a major retail brand. Always check out sellers before you buy. Legitimate businesses or individual sellers should give you a physical address and a working telephone number.

Know who you are dealing with online Free Software and File Sharing. Online file-sharing can give people access to a wealth of information. Spyware comes with many free downloads. This is software that is installed without your knowledge that adversely affects your computer, and may access your personal information.

Are you at risk for identity theft? Test Your "Identity Quotient” at iz-interactive.htm [the link is on the workshop Web site]

How did you score? points - Recent surveys indicate that 7-10 million people were victims of ID theft last year. You are at high risk. We recommend you purchase a paper shredder, become more security-aware in document handling, and start to question why people need your personal data points - Your odds of being victimized are about average points – Congratulations! You have a high "IQ." Keep up the good work and don't let your guard down now.

Protect your computer Anti-Virus Software helps protect your computer from viruses that destroy data, cause crashes or even steal your personal information. Anti-Spyware Software helps protect your computer from malicious spyware that monitors your online activities and collects personal information while you surf the web. A firewall helps keep hackers from accessing your computer to gather information without your permission. But nothing provides 100% protection!

Use strong passwords Which of the following would you consider to be the strongest password for Jane Doe: 1. JaneDoe Ihave2blackdogs!

Other steps you can take… Keep your operating system and Web browsers up- to-date. Be sure to install updates and patches that fix security issues. Back-up your files on a regular basis. If you have important files stored on your computer, copy them onto a removable disc or an external hard drive, and store it in a safe place.

Why should students be concerned? They may be more vulnerable to identity theft because of the availability of personal data and the way many students handle this data. Almost half of all college students receive credit card applications on a daily or weekly basis. Nearly a third of students rarely, if ever, reconcile their credit card and checking account balances. Almost 50 percent of students have had grades posted by Social Security number.

What to do in an e-mergency Hacked or Computer Viruses. If this happens to you, immediately unplug your Internet connection from your computer. Next scan your entire computer with fully updated anti-virus and anti-spyware software. Internet Fraud-Identity Theft or Phishing. If a scammer takes advantage of you online in any way, report it to local law enforcement, and then to the Federal Trade Commission at If you get a phishing report it by forwarding the to and to the company’s fraud or spam address.

Educate yourself…

Resources to view online OnGuard Online IdentityTheft.com & College Students IdentityTheft.com FTC: Deter-Detect-Defend – Avoid ID Theft FDIC’s Introduction to Identity Theft Identity Theft Quizzes from Privacy Rights Clearinghouse Identity Theft Quizzes

Now…how does all this happen?