SlideShare a Scribd company logo
1 of 21
Protecting Your Identity:
What to Know, What to Do
Mark Fullbright, Identity Theft Advocate

ICFE CITRMS® Certified
Overview
Identity protection
•Protection from what?
•Warning signs of identity theft
•How you can reduce your risk
What is identity theft?
Identity theft:
•Someone steals your personal information
•Uses it without permission
•Can damage your finances, credit history and reputation
Warning Signs
How do you know if your identity was stolen?
•mistakes on accounts or your Explanation of Medical benefits
•regular bills go missing
•calls from debt collectors for debts that aren’t yours
•notice from the IRS
•calls or mail about accounts in your minor child’s name
How does identity theft happen?
Identity thieves will:
•steal information from trash or from a business
•trick you into revealing information
•take your wallet or purse

•pretend to offer a job, loan, or apartment to get your
information
Reduce Your Risk
Identity protection means treating your personal information
with care.
Make it a habit.

•like buckling your seatbelt, or
•locking your doors at night
Reduce Your Risk
How does identity theft happen?
•Your right to a free credit report every 12 months
•To order:
annualcreditreport.com
1-877-322-8228
Reduce Your Risk
Read your bank, credit and account statements, and
Explanation of Medical benefits.
•Look for charges you didn’t make.

•Be alert for bills that don’t arrive when you expect them.
•Follow up if you get account statements you don’t expect.
Reduce Your Risk
Respond quickly to notices from the Internal Revenue
Service.
•If someone has used your Social Security number on a tax
return, contact IRS’s Specialized Identity Theft Protection
Unit
–1-800-908-4490
Reduce Your Risk
Secure your Social Security Number.
•If someone asks for it, ask:
–Why do you need it?
–How will it be used?
–How do you protect it?
Reduce Your Risk
Protect Your Personal Information.
•Keep your important papers secure.
•Be careful with your mail.
•Shred sensitive documents.

•Don’t overshare on social networking sites.
Reduce Your Risk
Be alert to online impersonators.
•Do you know who is getting your personal information?
•Don’t click on links in emails.
•Contact customer service.
Reduce Your Risk
Protect your computer.
•Use anti-virus software, anti-spyware software, and a
firewall.

•Create strong passwords.
•Keep your computer’s operating system, browser, and
security up to date.
Reduce Your Risk
Protect your computer.
•Encrypt your data.
•Be wise about wi-fi.
Reduce Your Risk
Protect your computer.
•Lock up your laptop.
•Read privacy policies.
What to do if someone has
stolen your identity?
•

•Act fast to limit the damage.
•Take these steps immediately.
If your identity is stolen…
STEP 1: Place an initial fraud alert on your credit report.
•Contact any one of the three nationwide credit reporting
companies.
•Equifax 1-800-525-6285
•Experian 1-888-397-3742
•TransUnion 1-800-680-7289
If your identity is stolen…
Step 2: Order your credit reports.
•Contact each of the three credit reporting companies.
•ID theft victims get a copy of their reports for free.
•Read your reports carefully and correct any errors.
If your identity is stolen…
Step 3: Create an Identity Theft Report.
•Gives you rights that help you to recover more quickly.
• File a complaint with the FTC.
– Ftc.gov/complaint or 1-877-438-4338.
– This will become your FTC Affidavit.

•File a police report.
Your FTC Affidavit and police report make an
Identity Theft Report.
Contact the FTC
•File an identity theft complaint with the FTC:
– ftc.gov/complaint
– 1-877-ID-THEFT
– 1-877-438-4338

•Learn more identity theft:
–ftc.gov/idtheft

•Order free materials:
–bulkorder.ftc.gov

More Related Content

What's hot

Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITYSupanShah2
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attackmarada0033
 
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security IssuesMangesh Gunjal
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 
Data Privacy
Data PrivacyData Privacy
Data PrivacyHome
 
Web application security
Web application securityWeb application security
Web application securityAkhil Raj
 
Database Security Management
Database Security Management Database Security Management
Database Security Management Ahsin Yousaf
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 

What's hot (20)

Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITY
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Social Networking Security
Social Networking SecuritySocial Networking Security
Social Networking Security
 
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security Issues
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Web application security
Web application securityWeb application security
Web application security
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 

Viewers also liked

わかる中級英文法 Grammar in Use Unit 100 soとsuch
わかる中級英文法 Grammar in Use Unit 100 soとsuchわかる中級英文法 Grammar in Use Unit 100 soとsuch
わかる中級英文法 Grammar in Use Unit 100 soとsuchiacer
 
Diaposiitivas de-informatica
Diaposiitivas de-informaticaDiaposiitivas de-informatica
Diaposiitivas de-informaticawilmerquinatoa
 
CV-of-Saif-CCIE-Collaboration
CV-of-Saif-CCIE-CollaborationCV-of-Saif-CCIE-Collaboration
CV-of-Saif-CCIE-CollaborationSaiful Jehadi
 
coursecompletion (1)
coursecompletion (1)coursecompletion (1)
coursecompletion (1)Heather Keel
 
わかる中級英文法 Grammar in Use Unit 92 関係節3 whose/whom/ where
わかる中級英文法 Grammar in Use Unit 92 関係節3 whose/whom/ whereわかる中級英文法 Grammar in Use Unit 92 関係節3 whose/whom/ where
わかる中級英文法 Grammar in Use Unit 92 関係節3 whose/whom/ whereiacer
 
re:Growth 2015 TOKYO keynote以外のアップデートのこと、時々でいいから...... 思い出して下さい
re:Growth 2015 TOKYO keynote以外のアップデートのこと、時々でいいから...... 思い出して下さいre:Growth 2015 TOKYO keynote以外のアップデートのこと、時々でいいから...... 思い出して下さい
re:Growth 2015 TOKYO keynote以外のアップデートのこと、時々でいいから...... 思い出して下さい宗 大栗
 
第一回IoT関連技術勉強会 分散処理編
第一回IoT関連技術勉強会 分散処理編第一回IoT関連技術勉強会 分散処理編
第一回IoT関連技術勉強会 分散処理編tzm_freedom
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Martin Ruubel
 
PythonでテキストをJSONにした話(PyCon mini sapporo 2015)
PythonでテキストをJSONにした話(PyCon mini sapporo 2015)PythonでテキストをJSONにした話(PyCon mini sapporo 2015)
PythonでテキストをJSONにした話(PyCon mini sapporo 2015)Satoshi Yamada
 
わかる中級英文法 Grammar in Use Unit 98 形容詞と副詞1
わかる中級英文法 Grammar in Use Unit 98 形容詞と副詞1わかる中級英文法 Grammar in Use Unit 98 形容詞と副詞1
わかる中級英文法 Grammar in Use Unit 98 形容詞と副詞1iacer
 
Agritech×IoT_lorawanで実現する環境モニタリング
Agritech×IoT_lorawanで実現する環境モニタリングAgritech×IoT_lorawanで実現する環境モニタリング
Agritech×IoT_lorawanで実現する環境モニタリングkazuhiro harada
 
わかる中級英文法 Grammar in Use Unit 67 可算名詞と不可算名詞1
わかる中級英文法 Grammar in Use Unit 67 可算名詞と不可算名詞1わかる中級英文法 Grammar in Use Unit 67 可算名詞と不可算名詞1
わかる中級英文法 Grammar in Use Unit 67 可算名詞と不可算名詞1iacer
 
SDN / NFV opensource and standards in wireless networks 2015 for cnv
SDN  / NFV opensource and standards in wireless networks 2015 for cnvSDN  / NFV opensource and standards in wireless networks 2015 for cnv
SDN / NFV opensource and standards in wireless networks 2015 for cnvPatrick Lopez
 
Fwn wan link load balancer 2015-04-30
Fwn wan link load balancer 2015-04-30Fwn wan link load balancer 2015-04-30
Fwn wan link load balancer 2015-04-30Lan & Wan Solutions
 
わかる中級英文法 Grammar in Use Unit 47否定疑問文
わかる中級英文法 Grammar in Use Unit 47否定疑問文わかる中級英文法 Grammar in Use Unit 47否定疑問文
わかる中級英文法 Grammar in Use Unit 47否定疑問文iacer
 
Business credit for business owners - Credit Management Association
Business credit for business owners - Credit Management AssociationBusiness credit for business owners - Credit Management Association
Business credit for business owners - Credit Management AssociationCredit Management Association
 
わかる中級英文法 Grammar in Use Unit 79 'sとof
わかる中級英文法 Grammar in Use  Unit 79  'sとof わかる中級英文法 Grammar in Use  Unit 79  'sとof
わかる中級英文法 Grammar in Use Unit 79 'sとof iacer
 
本気でPythonで宛名書きした話
本気でPythonで宛名書きした話本気でPythonで宛名書きした話
本気でPythonで宛名書きした話Satoshi Yamada
 

Viewers also liked (20)

Vmware
VmwareVmware
Vmware
 
わかる中級英文法 Grammar in Use Unit 100 soとsuch
わかる中級英文法 Grammar in Use Unit 100 soとsuchわかる中級英文法 Grammar in Use Unit 100 soとsuch
わかる中級英文法 Grammar in Use Unit 100 soとsuch
 
Diaposiitivas de-informatica
Diaposiitivas de-informaticaDiaposiitivas de-informatica
Diaposiitivas de-informatica
 
CV-of-Saif-CCIE-Collaboration
CV-of-Saif-CCIE-CollaborationCV-of-Saif-CCIE-Collaboration
CV-of-Saif-CCIE-Collaboration
 
coursecompletion (1)
coursecompletion (1)coursecompletion (1)
coursecompletion (1)
 
わかる中級英文法 Grammar in Use Unit 92 関係節3 whose/whom/ where
わかる中級英文法 Grammar in Use Unit 92 関係節3 whose/whom/ whereわかる中級英文法 Grammar in Use Unit 92 関係節3 whose/whom/ where
わかる中級英文法 Grammar in Use Unit 92 関係節3 whose/whom/ where
 
re:Growth 2015 TOKYO keynote以外のアップデートのこと、時々でいいから...... 思い出して下さい
re:Growth 2015 TOKYO keynote以外のアップデートのこと、時々でいいから...... 思い出して下さいre:Growth 2015 TOKYO keynote以外のアップデートのこと、時々でいいから...... 思い出して下さい
re:Growth 2015 TOKYO keynote以外のアップデートのこと、時々でいいから...... 思い出して下さい
 
第一回IoT関連技術勉強会 分散処理編
第一回IoT関連技術勉強会 分散処理編第一回IoT関連技術勉強会 分散処理編
第一回IoT関連技術勉強会 分散処理編
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
 
PythonでテキストをJSONにした話(PyCon mini sapporo 2015)
PythonでテキストをJSONにした話(PyCon mini sapporo 2015)PythonでテキストをJSONにした話(PyCon mini sapporo 2015)
PythonでテキストをJSONにした話(PyCon mini sapporo 2015)
 
わかる中級英文法 Grammar in Use Unit 98 形容詞と副詞1
わかる中級英文法 Grammar in Use Unit 98 形容詞と副詞1わかる中級英文法 Grammar in Use Unit 98 形容詞と副詞1
わかる中級英文法 Grammar in Use Unit 98 形容詞と副詞1
 
Agritech×IoT_lorawanで実現する環境モニタリング
Agritech×IoT_lorawanで実現する環境モニタリングAgritech×IoT_lorawanで実現する環境モニタリング
Agritech×IoT_lorawanで実現する環境モニタリング
 
わかる中級英文法 Grammar in Use Unit 67 可算名詞と不可算名詞1
わかる中級英文法 Grammar in Use Unit 67 可算名詞と不可算名詞1わかる中級英文法 Grammar in Use Unit 67 可算名詞と不可算名詞1
わかる中級英文法 Grammar in Use Unit 67 可算名詞と不可算名詞1
 
SDN / NFV opensource and standards in wireless networks 2015 for cnv
SDN  / NFV opensource and standards in wireless networks 2015 for cnvSDN  / NFV opensource and standards in wireless networks 2015 for cnv
SDN / NFV opensource and standards in wireless networks 2015 for cnv
 
Fwn wan link load balancer 2015-04-30
Fwn wan link load balancer 2015-04-30Fwn wan link load balancer 2015-04-30
Fwn wan link load balancer 2015-04-30
 
わかる中級英文法 Grammar in Use Unit 47否定疑問文
わかる中級英文法 Grammar in Use Unit 47否定疑問文わかる中級英文法 Grammar in Use Unit 47否定疑問文
わかる中級英文法 Grammar in Use Unit 47否定疑問文
 
Business credit for business owners - Credit Management Association
Business credit for business owners - Credit Management AssociationBusiness credit for business owners - Credit Management Association
Business credit for business owners - Credit Management Association
 
わかる中級英文法 Grammar in Use Unit 79 'sとof
わかる中級英文法 Grammar in Use  Unit 79  'sとof わかる中級英文法 Grammar in Use  Unit 79  'sとof
わかる中級英文法 Grammar in Use Unit 79 'sとof
 
Venom
Venom Venom
Venom
 
本気でPythonで宛名書きした話
本気でPythonで宛名書きした話本気でPythonで宛名書きした話
本気でPythonで宛名書きした話
 

Similar to Protect Identity: Know Risks & Steps

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftCost U Less Direct
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Barbara O'Neill
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)Jermaine Smith
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Jermaine Smith
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 

Similar to Protect Identity: Know Risks & Steps (20)

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft Toolkit
Identity Theft ToolkitIdentity Theft Toolkit
Identity Theft Toolkit
 
Staying Secure Electronically
Staying Secure ElectronicallyStaying Secure Electronically
Staying Secure Electronically
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Idenity Theft
Idenity TheftIdenity Theft
Idenity Theft
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 

More from - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 

Recently uploaded (20)

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 

Protect Identity: Know Risks & Steps

  • 1. Protecting Your Identity: What to Know, What to Do Mark Fullbright, Identity Theft Advocate ICFE CITRMS® Certified
  • 2. Overview Identity protection •Protection from what? •Warning signs of identity theft •How you can reduce your risk
  • 3. What is identity theft? Identity theft: •Someone steals your personal information •Uses it without permission •Can damage your finances, credit history and reputation
  • 4. Warning Signs How do you know if your identity was stolen? •mistakes on accounts or your Explanation of Medical benefits •regular bills go missing •calls from debt collectors for debts that aren’t yours •notice from the IRS •calls or mail about accounts in your minor child’s name
  • 5. How does identity theft happen? Identity thieves will: •steal information from trash or from a business •trick you into revealing information •take your wallet or purse •pretend to offer a job, loan, or apartment to get your information
  • 6. Reduce Your Risk Identity protection means treating your personal information with care. Make it a habit. •like buckling your seatbelt, or •locking your doors at night
  • 7. Reduce Your Risk How does identity theft happen? •Your right to a free credit report every 12 months •To order: annualcreditreport.com 1-877-322-8228
  • 8. Reduce Your Risk Read your bank, credit and account statements, and Explanation of Medical benefits. •Look for charges you didn’t make. •Be alert for bills that don’t arrive when you expect them. •Follow up if you get account statements you don’t expect.
  • 9. Reduce Your Risk Respond quickly to notices from the Internal Revenue Service. •If someone has used your Social Security number on a tax return, contact IRS’s Specialized Identity Theft Protection Unit –1-800-908-4490
  • 10. Reduce Your Risk Secure your Social Security Number. •If someone asks for it, ask: –Why do you need it? –How will it be used? –How do you protect it?
  • 11. Reduce Your Risk Protect Your Personal Information. •Keep your important papers secure. •Be careful with your mail. •Shred sensitive documents. •Don’t overshare on social networking sites.
  • 12. Reduce Your Risk Be alert to online impersonators. •Do you know who is getting your personal information? •Don’t click on links in emails. •Contact customer service.
  • 13. Reduce Your Risk Protect your computer. •Use anti-virus software, anti-spyware software, and a firewall. •Create strong passwords. •Keep your computer’s operating system, browser, and security up to date.
  • 14. Reduce Your Risk Protect your computer. •Encrypt your data. •Be wise about wi-fi.
  • 15. Reduce Your Risk Protect your computer. •Lock up your laptop. •Read privacy policies.
  • 16. What to do if someone has stolen your identity? • •Act fast to limit the damage. •Take these steps immediately.
  • 17. If your identity is stolen… STEP 1: Place an initial fraud alert on your credit report. •Contact any one of the three nationwide credit reporting companies. •Equifax 1-800-525-6285 •Experian 1-888-397-3742 •TransUnion 1-800-680-7289
  • 18. If your identity is stolen… Step 2: Order your credit reports. •Contact each of the three credit reporting companies. •ID theft victims get a copy of their reports for free. •Read your reports carefully and correct any errors.
  • 19. If your identity is stolen… Step 3: Create an Identity Theft Report. •Gives you rights that help you to recover more quickly. • File a complaint with the FTC. – Ftc.gov/complaint or 1-877-438-4338. – This will become your FTC Affidavit. •File a police report.
  • 20. Your FTC Affidavit and police report make an Identity Theft Report.
  • 21. Contact the FTC •File an identity theft complaint with the FTC: – ftc.gov/complaint – 1-877-ID-THEFT – 1-877-438-4338 •Learn more identity theft: –ftc.gov/idtheft •Order free materials: –bulkorder.ftc.gov