Your SlideShare is downloading. ×
0
How to Prevent Identity Theft
How to Prevent Identity Theft
How to Prevent Identity Theft
How to Prevent Identity Theft
How to Prevent Identity Theft
How to Prevent Identity Theft
How to Prevent Identity Theft
How to Prevent Identity Theft
How to Prevent Identity Theft
How to Prevent Identity Theft
How to Prevent Identity Theft
How to Prevent Identity Theft
How to Prevent Identity Theft
How to Prevent Identity Theft
How to Prevent Identity Theft
How to Prevent Identity Theft
How to Prevent Identity Theft
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

How to Prevent Identity Theft

432

Published on

Identity theft is a rising threat, affecting more than 12.6 million Americans in 2012. …

Identity theft is a rising threat, affecting more than 12.6 million Americans in 2012.

This slide introduces you to the 3 types of criminals and the methods they commonly use to steal your personal information.

Find out what you can do to protect yourself and avoid being the next victim of identity theft.

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
432
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
31
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. The Perpetrators Your information is vulnerable to a wide variety of would be thieves
  • 2. The PUBLIC WIFI PREDATOR Sets up fake Wi-Fi networks or uses sniffer software to steal victims’ personal information as victims are using public Wi-Fi at coffee shops, airports or hotels.
  • 3. The HI-TECH HENIOUS HACKER Uses technology know-how to obtain victims’ data and personal information by hacking home WiFi networks or using social engineering, malware, or phishing email.
  • 4. The DUMPSTER DIVING DELINQUENT Gathers victims’ personal and financial information by dumpster diving, stealing mail, shoulder surfing or swiping wallets/purses.
  • 5. What Could These Crooks Do with Your Personal Information?
  • 6. These criminals could sell or trade your information on the black market…
  • 7. …spreading it to even more shady people!
  • 8. Identity Theft Is On The Rise! Number of Identity Theft Incidents & Total Fraud Amount by Year
  • 9. Scary Identity Theft Statistics • 1 in 20 American adults were victims of identity theft in 2012. • An identity theft incidence occurs 20 times every minute! • 25% of people who receive data breach notifications become victims of identity theft. • Consumers who had their social security number compromised in a data breach were 5 times more likely to be a fraud victim than an average consumer. • 18% of more than 2 million complaints that the consumer sentinel network received in 2012 were related to identity theft, making it the number one problem reported to the agency.
  • 10. Common Ways Victims’ Information is Misused
  • 11. AS REPORTED TO THE CONSUMER SENTINEL NETWORK
  • 12. How You Can Fight Back The best ways to protect yourself
  • 13. Follow these Security Measures When Using Public WiFi • Use a VPN service to encrypt all your internet communications (VPN offers the highest level of security • Confirm the network name • Turn off sharing of printer and files • Turn on the firewall on your device • Limit online shopping and banking on public Wi-Fi
  • 14. Secure Your Device and Your Home WiFi Network • Enable WPA 2 Encryption on your home Wi-Fi Network • Install anti-virus and anti-malware programs and keep them up to date • Enable firewall protection • Create random and strong passwords for all accounts • Beware of phishing emails • Limit the information you share on social media sites
  • 15. Protect Your Personal Information Offline • Keep important documents in a safe bolted to the floor • Put a lock on your mailbox • Shred any papers that have your personal information on them before discarding • Monitor your credit reports regularly • Institute a credit free to prevent anyone from applying for new credit using your name • Enlist an identity theft protection service
  • 16. Unleash the Power of Hotspot Shield VPN Protect Your Privacy. Secure Your Data. Unblock Websites. Hotspot Shield VPN enables you to surf the web privately and securely, protecting you from hackers, malware and identity theft. Get Hotspot Shield for free at www.hotspotshield.com

×