SlideShare a Scribd company logo
1 of 33
Keeping Your Data Secure
Jennifer Ellis
Jennifer Ellis, JD, LLC
Jennifer@JLELLIS.NET
Copyright Jennifer Ellis, all rights reserved
How Many Data Breaches in 2016?
• 1,093 data breaches for U.S. companies and government agencies
– 40% increase from 2015
• Most data breaches never discovered
• Most data breaches never reported
• At least half involved Social Security numbers
– 4 breaches exposed 120 million Social Security numbers
• Health care is a common target
– Responsible for half of breach notifications affecting 500 or more individuals
– Averaged one health data breach per day
• More than 27 million patient records
https://www.bloomberg.com/news/articles/2017-01-19/data-breaches-hit-record-in-2016-as-dnc-wendy-s-co-hacked
http://www.securityweek.com/number-us-data-breaches-increased-2016-report
https://www.healthcare-informatics.com/news-item/cybersecurity/report-healthcare-sector-hit-hard-2016-data-
breaches
Credit Agencies
• Equifax – mid May through July 2017
– 143 Million U.S. consumers
• If you have a credit report, you were probably affected
– Names, Social Security numbers, birth dates, addresses, drivers’ license information.
– Credit card numbers from 209,000
– Dispute documents from 182,000
• Equifax – May 2016
– W2Express website
• Downloadable W-2 forms for Kroger employees
• Tax data and salary details
• Equifax, Experian & Transunion – March 2013
– Focused on celebrities and high profile figures
• Michelle Obama, Paris Hilton, Hillary Clinton, Robert Mueller
– Credit reports
– Used publicly available information to bypass security questions
• Experian – September 2013 through September 2015
– Million U.S. consumers
• Applied for financing from T-Mobile
– Names, birth dates, addresses, Social Security numbers, drivers’ license information and more
Credit Cards in 2016
• $16 billion in fraud and identity theft
• 15.4 million Americans
• Card not present biggest form of fraud
– 40% increase from 2015
– This gets around chip-embedded cards
Identity Theft and Scams
Protecting Yourself
• Sign up for insurance
– Check your homeowners policy
• Get copies of your credit reports frequently
– Should come with insurance
– AnnualCreditReport.com
• Each agency must give one every 12 months for free
– Do not sign up for “free” companies that are not
well known
Credit Freeze
• Credit Freeze (security freeze)
– Prevents opening new accounts
– Will not protect already open accounts
– Have to call each agency
• There may be a fee of between $5 and $10
• Equifax: 1-800-349-9960
• Experian: 1-888-397-3742
• Transunion: 1-888-909-8872
Fraud Alert
• Fraud Alert
– Concerned you may become a victim
– Prevents unverified access for 90 days
• Extended Fraud Alert
– Already a victim of identity theft
– Seven years
• Contact one of the companies listed previously
– That company will inform the others
– No fee
Web & Email
• Be careful of websites
– Even trustworthy sites can have malware
– Many fakes websites
• Use quality malware protection
– Webroot
– Norton
– Etc
• Do not click on links
– Go to the website directly
• Use a link checker
– https://validator.w3.org/checklink
• Do not open unexpected files
– Even if you know the person
Email is Not Secure
• Do not send private information through
email
• Add encryption
– See https://www.lifewire.com/you-should-
encrypt-your-email-2486679
• Put in an encrypted file and attach
Encrypt USB Drives
• If you store data on USB drives, add
encryption
– See
https://www.pcmag.com/article2/0,2817,249272
6,00.asp
Phone Scams
• Fake number on caller ID
• Often from other nations
• Try to scare people into paying money
Protect Your Phone
• Use a password
• Turn on encryption
– Search how do I encrypt (type of phone)
– Follow instructions
• Do not jailbreak your phone
• Do not add applications from unknown sources
• Check what applications access
• Turn on find my phone
• Use malware software
• Keep up-to-date
PHONE SCAMS ARE COMMON
Homeland Security Scam
• Claim to be from Department of Homeland
Security – Immigration
– Called ID shows 800-323-8603
• Hotline number
• Never used for outgoing calls
– Demands person prove who they are
– Sometimes tells person they are a victim of
identity theft
FBI
• Claim to be from FBI
– Claim they are investigating person
– Demand money or will be arrested
– Spoofs local FBI phone number
• FBI does not call to demand money or
threaten arrests
• Get information about local offices
– https://www.fbi.gov/contact-us/field-offices
Can You Hear Me?
• Voice asks “Can you hear me?”
• You respond yes.
• They record the yes and use it as a voice
signature to approve various things.
• Just hang up if they call
• If you already said yes, check your bank and
credit card statements for unauthorized
charges
Fake Bank Numbers
• Text you claiming that your bank is concerned
about a charge
• Provides a number for you to call
• You call the number, they ask for information
• They use that information to steal from your
bank account
• Always make sure you call the bank directly
Computer Support
• Claim to be from Microsoft or Apple
• Ask for information to log in to accounts
• Ask to be able to take control over your
computer
• Ask for money to pay for services they claim
they performed
TYPES OF SPECIALIZED FRAUD
Arrest Fraud
• Someone uses your name and information
when arrested
• You end up with a warrant
• You get pulled over
• You get arrested
• Requires a lawyer’s assistance
Child ID Theft
• Begins with child’s social security number
• Create entirely new identity on child
– Government benefits
– Bank accounts
– Credit card accounts
• Often not known until child is an adult
• Check your child’s credit too
Tax ID Theft
• Use your Social Security number to file fake tax
return
• Unknown to you until you try to file your own
– Or you receive a warning letter from IRS
• If occurs
– File a complaint at identitytheft.gov
– Contact one credit bureau and set fraud alert
– Contact all financial accounts
• Close and create new ones
– Complete IRS form 14039 – Identity theft affidavit
Medical ID Theft
• Steal personal information to
– Obtain medical care
– Buy drugs
– Submit fake bills to Medicare
• Solution, contact:
– Department of Health & Human Services –
Inspector General
– Medicare Call Center
– Federal Trade Commission
Social ID Theft
• Someone creates an online social media
presence using your information
– Often uses such information to fool people into
giving them money
• Commonly used in romance scams
• Periodically search your name and photos
online
• Watch out for warnings from friends
TIPS
.
Get a Good Shredder
• Not Strip Cut
• Cross Cut is fine
• Micro Cut is best
• Shred:
– Documents
– Cards
– CDs/DVDs
Getting a New Computer?
• Shred the hard drive
– There are places that do this
• Use data destruction software
– See
https://www.pcmag.com/article2/0,2817,249272
6,00.asp
Wi-Fi
• Secure your home wi-fi
– https://www.pcmag.com/article2/0,2817,240975
1,00.asp
• Don’t use free wi-fi
• Don’t use hotel wi-fi
• Get a hot spot
– Often $20 per month
– Can get pay as you go
Passwords
• Choose complex passwords
– https://identitysafe.norton.com/password-generator/
– At least 14 characters, preferably more
– Mix upper, lowercase, numbers, and if allowed,
special characters
– Change high risk passwords every 3-6 months
• Use a tool such as LastPass to remember
passwords
– That way you only have to remember one
– Make it extremely secure
• Do not repeat passwords
Two-Factor Authentication
• Uses two steps to protect accounts
– When you forget a password
– When you try to use a new device
• Sends a code to your cell phone
– Enter the code on the device you are trying to use
the account on
Additional Issues to Consider
• Use firewalls
• Do not use computers you don’t know
• Closely watch banks and credit cards
• Don’t carry Social Security card
• Don’t let mail pile up
– Put it on hold if going away
– If bills seem late or don’t arrive, call the company
Keeping Your Data Secure
Jennifer Ellis
Jennifer Ellis, JD, LLC
Jennifer@JLELLIS.NET
Copyright Jennifer Ellis, all rights reserved

More Related Content

What's hot

Cyber security and fl data breach
Cyber security and fl data breachCyber security and fl data breach
Cyber security and fl data breachRob Jackson
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Internet use issues
Internet use issues Internet use issues
Internet use issues computers 11
 
Data theft
Data theftData theft
Data theftLaura
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
Common Fraud Schemes - Presentation
Common Fraud Schemes - PresentationCommon Fraud Schemes - Presentation
Common Fraud Schemes - PresentationChristopher Hoina
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primerfwscholl
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017FourthAsAService
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6krupp
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Themmilfamln
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Onlinetomasztopa
 

What's hot (20)

Cyber security and fl data breach
Cyber security and fl data breachCyber security and fl data breach
Cyber security and fl data breach
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
 
Data theft
Data theftData theft
Data theft
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
What is data privacy?
What is data privacy?What is data privacy?
What is data privacy?
 
Phishing
PhishingPhishing
Phishing
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Common Fraud Schemes - Presentation
Common Fraud Schemes - PresentationCommon Fraud Schemes - Presentation
Common Fraud Schemes - Presentation
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primer
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Online
 

Similar to Staying Secure Electronically

Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminarmullarkea
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentationRoel Palmaers
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technicalStephen Cobb
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Preventionfmi_igf
 
Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012Mark Kotzin
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summaryicts-uct
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Barbara O'Neill
 
A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers806670
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 

Similar to Staying Secure Electronically (20)

Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Protect Your Identity
Protect Your IdentityProtect Your Identity
Protect Your Identity
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 

More from Jennifer Ellis, JD, LLC

Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for Lawyers
Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for LawyersAttorney Marketing (Ads, Social Media) / The Cloud - Concerns for Lawyers
Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for LawyersJennifer Ellis, JD, LLC
 
Social Media Marketing and Ethics for Lawyers in 2014
Social Media Marketing and Ethics for Lawyers in 2014Social Media Marketing and Ethics for Lawyers in 2014
Social Media Marketing and Ethics for Lawyers in 2014Jennifer Ellis, JD, LLC
 
GLBT Representation in Pennsylvania - A Broad Overview
GLBT Representation in Pennsylvania - A Broad OverviewGLBT Representation in Pennsylvania - A Broad Overview
GLBT Representation in Pennsylvania - A Broad OverviewJennifer Ellis, JD, LLC
 
Law Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and EthicsLaw Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and EthicsJennifer Ellis, JD, LLC
 

More from Jennifer Ellis, JD, LLC (10)

Researching Social Media
Researching Social MediaResearching Social Media
Researching Social Media
 
Social Media and Litigation
Social Media and Litigation Social Media and Litigation
Social Media and Litigation
 
Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for Lawyers
Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for LawyersAttorney Marketing (Ads, Social Media) / The Cloud - Concerns for Lawyers
Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for Lawyers
 
Basics - Setting up a WordPress Site
Basics - Setting up a WordPress SiteBasics - Setting up a WordPress Site
Basics - Setting up a WordPress Site
 
Social Media Marketing and Ethics for Lawyers in 2014
Social Media Marketing and Ethics for Lawyers in 2014Social Media Marketing and Ethics for Lawyers in 2014
Social Media Marketing and Ethics for Lawyers in 2014
 
SEO: Now What Does Google Want?!
SEO: Now What Does Google Want?!SEO: Now What Does Google Want?!
SEO: Now What Does Google Want?!
 
SEO: Now What Does Google Want?
SEO: Now What Does Google Want?SEO: Now What Does Google Want?
SEO: Now What Does Google Want?
 
GLBT Representation in Pennsylvania - A Broad Overview
GLBT Representation in Pennsylvania - A Broad OverviewGLBT Representation in Pennsylvania - A Broad Overview
GLBT Representation in Pennsylvania - A Broad Overview
 
Social Media - Not Just for Marketing
Social Media - Not Just for MarketingSocial Media - Not Just for Marketing
Social Media - Not Just for Marketing
 
Law Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and EthicsLaw Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and Ethics
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Staying Secure Electronically

  • 1. Keeping Your Data Secure Jennifer Ellis Jennifer Ellis, JD, LLC Jennifer@JLELLIS.NET Copyright Jennifer Ellis, all rights reserved
  • 2. How Many Data Breaches in 2016? • 1,093 data breaches for U.S. companies and government agencies – 40% increase from 2015 • Most data breaches never discovered • Most data breaches never reported • At least half involved Social Security numbers – 4 breaches exposed 120 million Social Security numbers • Health care is a common target – Responsible for half of breach notifications affecting 500 or more individuals – Averaged one health data breach per day • More than 27 million patient records https://www.bloomberg.com/news/articles/2017-01-19/data-breaches-hit-record-in-2016-as-dnc-wendy-s-co-hacked http://www.securityweek.com/number-us-data-breaches-increased-2016-report https://www.healthcare-informatics.com/news-item/cybersecurity/report-healthcare-sector-hit-hard-2016-data- breaches
  • 3. Credit Agencies • Equifax – mid May through July 2017 – 143 Million U.S. consumers • If you have a credit report, you were probably affected – Names, Social Security numbers, birth dates, addresses, drivers’ license information. – Credit card numbers from 209,000 – Dispute documents from 182,000 • Equifax – May 2016 – W2Express website • Downloadable W-2 forms for Kroger employees • Tax data and salary details • Equifax, Experian & Transunion – March 2013 – Focused on celebrities and high profile figures • Michelle Obama, Paris Hilton, Hillary Clinton, Robert Mueller – Credit reports – Used publicly available information to bypass security questions • Experian – September 2013 through September 2015 – Million U.S. consumers • Applied for financing from T-Mobile – Names, birth dates, addresses, Social Security numbers, drivers’ license information and more
  • 4. Credit Cards in 2016 • $16 billion in fraud and identity theft • 15.4 million Americans • Card not present biggest form of fraud – 40% increase from 2015 – This gets around chip-embedded cards
  • 6. Protecting Yourself • Sign up for insurance – Check your homeowners policy • Get copies of your credit reports frequently – Should come with insurance – AnnualCreditReport.com • Each agency must give one every 12 months for free – Do not sign up for “free” companies that are not well known
  • 7. Credit Freeze • Credit Freeze (security freeze) – Prevents opening new accounts – Will not protect already open accounts – Have to call each agency • There may be a fee of between $5 and $10 • Equifax: 1-800-349-9960 • Experian: 1-888-397-3742 • Transunion: 1-888-909-8872
  • 8. Fraud Alert • Fraud Alert – Concerned you may become a victim – Prevents unverified access for 90 days • Extended Fraud Alert – Already a victim of identity theft – Seven years • Contact one of the companies listed previously – That company will inform the others – No fee
  • 9. Web & Email • Be careful of websites – Even trustworthy sites can have malware – Many fakes websites • Use quality malware protection – Webroot – Norton – Etc • Do not click on links – Go to the website directly • Use a link checker – https://validator.w3.org/checklink • Do not open unexpected files – Even if you know the person
  • 10. Email is Not Secure • Do not send private information through email • Add encryption – See https://www.lifewire.com/you-should- encrypt-your-email-2486679 • Put in an encrypted file and attach
  • 11. Encrypt USB Drives • If you store data on USB drives, add encryption – See https://www.pcmag.com/article2/0,2817,249272 6,00.asp
  • 12. Phone Scams • Fake number on caller ID • Often from other nations • Try to scare people into paying money
  • 13. Protect Your Phone • Use a password • Turn on encryption – Search how do I encrypt (type of phone) – Follow instructions • Do not jailbreak your phone • Do not add applications from unknown sources • Check what applications access • Turn on find my phone • Use malware software • Keep up-to-date
  • 14. PHONE SCAMS ARE COMMON
  • 15. Homeland Security Scam • Claim to be from Department of Homeland Security – Immigration – Called ID shows 800-323-8603 • Hotline number • Never used for outgoing calls – Demands person prove who they are – Sometimes tells person they are a victim of identity theft
  • 16. FBI • Claim to be from FBI – Claim they are investigating person – Demand money or will be arrested – Spoofs local FBI phone number • FBI does not call to demand money or threaten arrests • Get information about local offices – https://www.fbi.gov/contact-us/field-offices
  • 17. Can You Hear Me? • Voice asks “Can you hear me?” • You respond yes. • They record the yes and use it as a voice signature to approve various things. • Just hang up if they call • If you already said yes, check your bank and credit card statements for unauthorized charges
  • 18. Fake Bank Numbers • Text you claiming that your bank is concerned about a charge • Provides a number for you to call • You call the number, they ask for information • They use that information to steal from your bank account • Always make sure you call the bank directly
  • 19. Computer Support • Claim to be from Microsoft or Apple • Ask for information to log in to accounts • Ask to be able to take control over your computer • Ask for money to pay for services they claim they performed
  • 21. Arrest Fraud • Someone uses your name and information when arrested • You end up with a warrant • You get pulled over • You get arrested • Requires a lawyer’s assistance
  • 22. Child ID Theft • Begins with child’s social security number • Create entirely new identity on child – Government benefits – Bank accounts – Credit card accounts • Often not known until child is an adult • Check your child’s credit too
  • 23. Tax ID Theft • Use your Social Security number to file fake tax return • Unknown to you until you try to file your own – Or you receive a warning letter from IRS • If occurs – File a complaint at identitytheft.gov – Contact one credit bureau and set fraud alert – Contact all financial accounts • Close and create new ones – Complete IRS form 14039 – Identity theft affidavit
  • 24. Medical ID Theft • Steal personal information to – Obtain medical care – Buy drugs – Submit fake bills to Medicare • Solution, contact: – Department of Health & Human Services – Inspector General – Medicare Call Center – Federal Trade Commission
  • 25. Social ID Theft • Someone creates an online social media presence using your information – Often uses such information to fool people into giving them money • Commonly used in romance scams • Periodically search your name and photos online • Watch out for warnings from friends
  • 27. Get a Good Shredder • Not Strip Cut • Cross Cut is fine • Micro Cut is best • Shred: – Documents – Cards – CDs/DVDs
  • 28. Getting a New Computer? • Shred the hard drive – There are places that do this • Use data destruction software – See https://www.pcmag.com/article2/0,2817,249272 6,00.asp
  • 29. Wi-Fi • Secure your home wi-fi – https://www.pcmag.com/article2/0,2817,240975 1,00.asp • Don’t use free wi-fi • Don’t use hotel wi-fi • Get a hot spot – Often $20 per month – Can get pay as you go
  • 30. Passwords • Choose complex passwords – https://identitysafe.norton.com/password-generator/ – At least 14 characters, preferably more – Mix upper, lowercase, numbers, and if allowed, special characters – Change high risk passwords every 3-6 months • Use a tool such as LastPass to remember passwords – That way you only have to remember one – Make it extremely secure • Do not repeat passwords
  • 31. Two-Factor Authentication • Uses two steps to protect accounts – When you forget a password – When you try to use a new device • Sends a code to your cell phone – Enter the code on the device you are trying to use the account on
  • 32. Additional Issues to Consider • Use firewalls • Do not use computers you don’t know • Closely watch banks and credit cards • Don’t carry Social Security card • Don’t let mail pile up – Put it on hold if going away – If bills seem late or don’t arrive, call the company
  • 33. Keeping Your Data Secure Jennifer Ellis Jennifer Ellis, JD, LLC Jennifer@JLELLIS.NET Copyright Jennifer Ellis, all rights reserved