Presentation is loading. Please wait.

Presentation is loading. Please wait.

Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.

Similar presentations


Presentation on theme: "Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks."— Presentation transcript:

1 Presented By: Jennifer Thayer, SPHR, SHRM-SCP

2  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks for Preventing Identity Theft  Learn Ways to Recover from Identity Theft  Review Cautions

3 In the last five years, online crime – cyber crime – has increased significantly. Last year estimated annual losses from all types of computer crime at $67 billion a year. (FBI Computer Crime Survey, 2015)

4  1.5 million cyberattacks annually ◦ 4,000 per day and 170 per hour, 3 per minute ◦ Attackers targeting large companies to get customer’s personal information ◦ In 2014, 47% of Americans adults had their personal information stolen by hackers  Totaled $8,000,000,000 in credit card fraud (FBI cybercrime website- www.fbi.gov)

5 SPAM Spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site. The most widely recognized form of spam is email spam.

6 PHISHING Phishing is when thieves send fake emails that scare you into giving them private information, credit card numbers and online passwords, for example, then use that information to steal from you.

7 ADWARE Any software that installs itself on your system without your knowledge and displays advertisements when the user browses the Internet.

8 SPYWARE Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.

9 Identity Theft Identity (ID) Theft is a crime where a thief steals your personal information, such as your full name or social security number, to commit fraud.

10 Secure Your Wireless Network  Secure your network with a password. If you don’t know how, either buy wireless protection software or hire someone to do it.

11 Protect Yourself  Secure your computer before you go online. - -strong anti-virus, anti-spyware and anti- spam security - strong personal firewall to prevent hackers from sneaking in your computer.

12 Use a Strong Password  Create complex usernames and passwords for websites and email addresses.

13 Set Up Separate Email Account for Online Use  Set up a free Web-based email address and provide that address to websites whenever you sign up for anything.

14 Update Often  Keep your security up-to-date

15 Check Reviews  Use a website rating service to help you avoid the illegitimate websites.

16 Nothing is FREE!  Avoid free screensavers, smiley faces and other free stuff unless you absolutely know the download is safe.

17 Need To Know?  Safeguard your private information.

18 Ask Questions?  Call your bank, service provider or institution to verify any emails before you click on any links or fill out any forms.

19 Don’t be “Click Happy”!  Avoid pop-ups (Web browser windows that pop up).

20 Check Your Credit Report  Get a credit report from all three major credit reporting agencies at least once a year. ◦ -entitled to one free report per year ◦ -address errors immediately

21 Check Your Credit Card Statements  Review every credit card statement. ◦ contact your credit provider with any suspicious charges immediately.

22 Shop on Secure Websites ONLY  Take care when shopping online: Look for indicators that the website is secure, -VeriSign or TRUSTe -and a website URL that begins with “https” (that “s” stands for “secure”).

23 Secure Your Network  Lock down your wireless home network. If you don’t know how, hire someone to help you or use wireless protection software that makes wireless security easier to manage.

24 SUPERVISE children  Turn on or buy parental controls for your computer to manage when your kids can go online, and limit them to approved, safe websites.

25  Find out what kind of security is loaded on the PC you’re using, and make sure it’s up- to-date. If the computer is not secure, don’t use it.

26  Clean out the browser history on the PC ◦ remove your online history before you finish using the computer

27  Secure your home wireless network with strong encryption, ◦ Don’t know how?, buy the software or hire an expert

28  Avoid connecting to any Wi-Fi network unless you know it’s secure.  Airport  Malls  Restaurants

29  Confirm the Wi-Fi network you are accessing is legitimate.

30  Turn off the wireless network connection on your laptop when you are not using it.  Manually Select the network you wish to join

31  Avoid using any websites that require password access when using a wireless hotspot.

32  Never fill out forms that require confidential and personal information when using a wireless connection.

33  Look around when you are online.

34  Keep your laptop with you at all times to ensure your private information stays private.

35  Report: Notify your credit card companies, financial institutions or other online service accounts about the fraud immediately.

36  Contact the local police to file a report.  Get a copy of the report

37  Report the fraud to one of the credit reporting agencies (Equifax, Experian and TransUnion) ◦ Only need to contact one ◦ Review credit report and request new one annually ◦ Prevents future fraud

38  Immediately close compromised accounts  Dispute fraudulent charges  Communicate via certified letter  Save all correspondance

39  File a complaint with the Federal Trade Commission (FTC). ◦ Will help to prevent someone else being victimized ◦ Will enforce businesses that violate consumer privacy laws.

40  Reclaim your personal identification. ◦ cancel and replace your identification or driver’s license. ◦ Ask the agency to flag your file so that others cannot get a license or any other identification document in your name.

41  Beware adware, spyware, and viruses. These can mess up your system, slow computer performance, and steal any personal passwords and information you use and keep on the computer or on the web.  Never open unscreened email from contact that you don’t know; if in doubt, trash it.

42  Avoid offers for free services, products  Avoid ”Official” emails from institutions asking for personal information  Block pop-ups.  Download free software only from a reputable and trustworthy company.

43  Use encryption to protect your personal information, and when logging into your computer  Log off from all websites and shut down your computer when not in use.  Log off from all websites and delete history, downloads, and cookies after using a public computer.  Protect your home/work wireless network with encryption  Frequently change your encryption password.

44  Install trustworthy protection software, and keep yourself protected with updated versions.  Remember to update often

45

46


Download ppt "Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks."

Similar presentations


Ads by Google