Your SlideShare is downloading. ×
0
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Identity Theft Information for Businesses
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Identity Theft Information for Businesses

1,425

Published on

Guide for businesses on how to protect client information and avoid the facilitation of identity theft. Presented by the Better Business Bureau.

Guide for businesses on how to protect client information and avoid the facilitation of identity theft. Presented by the Better Business Bureau.

Published in: Economy & Finance, Technology
0 Comments
6 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,425
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
6
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Identity Theft For Business Don’t Let Bad Things Happen to Your Company’s Good Name
  • 2. ID Theft -- A Major Problem <ul><li>27.3 Americans victimized over 5 years; </li></ul><ul><li>9.9 million over the past year; </li></ul><ul><li>$48 billion in losses to business; </li></ul><ul><li>$5 billion in out-of-pocket losses to consumers. </li></ul><ul><li>Source: Federal Trade Commission </li></ul>
  • 3. ID Theft – Case Histories <ul><li>An employee of Prudential Insurance was accused of selling the personal information of 60,000 customers; </li></ul><ul><li>A man installed “keylogging” software in 14 Kinko stores in the New York area to steal customer’s data; </li></ul><ul><li>An Israeli man hacked into a U.S. company’s system to steal the data of 80,000 customers; </li></ul><ul><li>An employee of a communications firm stole the credit histories of thousands of people; </li></ul><ul><li>An employee of a Florida restaurant stole the credit card numbers of at least 18 customers. </li></ul>
  • 4. ID Theft -- Defined <ul><li>ID Theft – a wholesale takeover of someone’s identity for financial gain. </li></ul><ul><li>ID Fraud – creating a brand new identity from several different sources to commit crimes and evade detection. </li></ul>
  • 5. Victims May Not Know Until: <ul><li>They are contacted by a collection agency; </li></ul><ul><li>Credit charges show up that they never made; </li></ul><ul><li>A lender tries to repossess a car they never purchased; </li></ul><ul><li>They are contacted by police about a crime they didn’t commit. </li></ul>
  • 6. What Does the Thief Want? <ul><li>A Social Security Number </li></ul><ul><li>A Driver’s License </li></ul><ul><li>Account Numbers </li></ul>
  • 7. Where Does the Thief Get These? <ul><li>A Wallet or Purse </li></ul><ul><li>Your Mail </li></ul><ul><li>Your Trash </li></ul><ul><li>Your Computer </li></ul><ul><li>You </li></ul>
  • 8. How Is This Information Used? <ul><li>Use credit cards to go on buying spree; </li></ul><ul><li>Open new accounts in their name; </li></ul><ul><li>Change mailing address on their accounts; </li></ul><ul><li>Buy a car, with loan in their name; </li></ul><ul><li>Get phone service in their name; </li></ul><ul><li>Drain their bank accounts; </li></ul><ul><li>Apply for a job in their name; </li></ul><ul><li>Use their name if arrested for a crime. </li></ul>
  • 9. Basic Rules To Protect Your Customers and Employees <ul><li>If you don’t need it, don’t collect it; </li></ul><ul><li>If you need it once, don’t save it longer; </li></ul><ul><li>If you don’t need to save it, dispose of it carefully; </li></ul><ul><li>If you have to keep it, think security; </li></ul><ul><li>Don’t broadcast personal information; </li></ul>
  • 10. Basic Rules To Protect Your Customers and Employees <ul><li>Don’t use social security number as customer account numbers; </li></ul><ul><li>Don’t give out personal information without positive confirmation; </li></ul><ul><li>Locks are a real deterrent. </li></ul>
  • 11. Technology and Information Security <ul><li>Limit Access: </li></ul><ul><ul><li>Servers in a secure location; </li></ul></ul><ul><ul><li>Access limited to trusted employees; </li></ul></ul><ul><ul><li>Critical data only available on a “need-no-know” basis, password protected and encrypted, if possible. </li></ul></ul>
  • 12. Technology and Information Security <ul><li>Passwords: </li></ul><ul><ul><li>Use a password protection system for network and PC logins; </li></ul></ul><ul><ul><li>Avoid simple passwords: </li></ul></ul><ul><ul><ul><li>This “th%d4get” </li></ul></ul></ul><ul><ul><ul><li>Not this “password” or “bob” </li></ul></ul></ul><ul><ul><li>Change passwords regularly. </li></ul></ul>
  • 13. Technology and Information Security <ul><li>Virus Protection: </li></ul><ul><ul><li>Install anti-virus software; </li></ul></ul><ul><ul><li>Scan your system regularly of often; </li></ul></ul><ul><ul><li>Subscribe to “automatic updates” of anti-virus software; </li></ul></ul><ul><ul><li>Never disable anti-virus protection. </li></ul></ul>
  • 14. Technology and Information Security <ul><li>Install a “firewall” – a gatekeeper to protect your system from outsiders; </li></ul><ul><li>Download and install security “patches”; </li></ul><ul><li>Back up data regularly; </li></ul><ul><li>Check for suspicious activity; </li></ul><ul><li>Understand file sharing risks. </li></ul>
  • 15. Technology and Information Security <ul><li>Educate your employees: </li></ul><ul><ul><li>Not to open e-mail from unknown sources; </li></ul></ul><ul><ul><li>What to do when they receive suspicious e-mails; </li></ul></ul><ul><ul><li>To disconnect from the Internet when not online; </li></ul></ul><ul><ul><li>To consider the risks of file-sharing; </li></ul></ul><ul><ul><li>How to perform data back-up procedures; </li></ul></ul><ul><ul><li>Actions to take if their computers become infected. </li></ul></ul><ul><li>When an employee leaves, remove system access immediately </li></ul>
  • 16. When Things Go Wrong <ul><li>Mitigate the damage; </li></ul><ul><li>Notify the police; </li></ul><ul><li>Notify your insurance carrier; </li></ul><ul><li>Notify those whose records have been compromised. </li></ul>
  • 17. Your BBB – A Source for Information and Help <ul><li>Telephone – (Your Telephone) </li></ul><ul><li>Web Site – (Your URL) </li></ul><ul><li>ID Theft Web Site – www.bbb.org/idtheft </li></ul><ul><li>Video – www.bbbvideo.com </li></ul>
  • 18. Join Our Campaign
  • 19. Identity Theft <ul><li>Don’t Let Bad Things Happen to Your Company’s Good Name </li></ul>

×