Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Internet Phishing Not the kind of Fishing you are used to.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
[your name, organization] Protecting Your IdentityProtecting Your Identity: What to Know, What to Do.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
CCT355H5 F Presentation: Phishing November Jennifer Li.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing: Trends and Countermeasures Blaine Wilson.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Cybersecurity Test Review Introduction to Digital Technology.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Identity Theft It’s a crime!
Digital Security Identity theft Copyright Laws Plagiarism, and More.
An Introduction to Phishing and Viruses
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
IT Security  .
Lesson 3 Safe Computing.
Tax Identity Theft Presenter Date
Information Security 101 Richard Davis, Rob Laltrello.
Information Security Session October 24, 2005
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
“Credit score vocabulary”
Presentation transcript:

Protect Yourself Against Phishing

The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million in Total one year fraud amount decreased from $55.7 billion in 2006 to $49.3 billion in 2007

The bad news: Even though the number of victims and dollar amounts are down, it’s still a significant problem. The crooks committing the crimes are becoming smarter making it more difficult to isolate attempts at identity theft.

What is identity theft? Someone uses your personal identifying information to commit fraud or theft.

How can someone steal my identity? Dumpster diving Shoulder surfing Pretext calling Mail theft Workplace Skimming Theft Change of address Phishing

What is phishing? Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication.

What is phishing?

How to identify a phishing Typically use a generic greeting Frequently the messages will refer to an urgent problem May ask for personal account information such as: – Account numbers – Date of birth – Internet passwords and user names

How to identify a phishing (cont): Provide links that include a legitimate company’s name or web address, but the legitimate company has been spoofed. Fraudulent s will disguise or forge the sender’s address so they look legitimate. s & pop-up websites may include incorrect grammar.

SCU examples: The following slides are actual examples of phishing s members and non- members have received.

What steps should you take? Call or visit your local SCU branch office Call us at

Remember... Service Credit Union will NEVER ask for your account information, PIN, password, or other personal information in an unsolicited request via .

If you’ve received a phishing If you’ve opened the , don’t follow the link. Don’t reply to the . Don’t personal or financial information.

If you’ve received a phishing (cont.): Forward the to Forward any SCU s to Report the incident to the Internet Crime complaint Center at File a complaint at or call toll free – , –TTY:

Protect yourself! Install and update current virus software Install firewall software to partially guard against spyware Use a secure browser

More information? For more information on how to protect yourself and additional links to sites dedicated to protecting yourself against phishing, visit: servicecu.org scambusters.org antiphishing.org

Questions?