Your SlideShare is downloading. ×
How To Protect Yourself From Identity Theft
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

How To Protect Yourself From Identity Theft

600
views

Published on

Presentation given to teachers and adminstrators on how to protect themselves from identity theft.

Presentation given to teachers and adminstrators on how to protect themselves from identity theft.


0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
600
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
27
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Most discussions about ID Theft is how an individual protects him/herself and responds to ID Theft. A lot of discussion about how businesses can protect their data. Not much discussion about what to do after it happens.
  • Transcript

    • 1. How to Protect Yourself From Identity Theft ETC! 2007 Matthew Kinzie Director, IT Stanislaus County COE
    • 2. Agenda
      • Definition Of Identity Theft
      • Facts about Identity Theft
      • What if you’re a victim of Identity Theft?
      • Steps to protect yourself from Identity Theft
    • 3. Definition - How do you steal a person’s Identity?
      • From the Wikipedia:
        • “ Identity theft (or identity fraud,) occurs when someone wrongfully acquires or uses another person's personal data, typically for their own financial gain. Sometimes it is referred to as "identity fraud" since the criminal impersonates rather than 'removes' the victim's identity.” (http://en.wikipedia.org/wiki/Identity_theft)
    • 4. Definition – Use
      • Typical Uses of Fraudulent data:
        • Financial gain: Credit Cards, Bank Accounts, Bank Loans, Phone service, utilities
        • Concealment: Work in U.S. Illegally, Commit Crimes
        • Obtaining medical services
          • People get medical services using another’s identity to get insurance
          • The theft’s medical records get intertwined with the victim’s – could cause serious medical complications for the victim
    • 5. Definition –Source
      • Common sources of identity theft:
        • Wallets, Mail, credit application forms, employer records
        • Less common:
          • Pretexting – caller impersonates someone else to get information from organizational representatives.
          • Phishing – e-mail asking for confirmation of account numbers, passwords, SSNs
          • Pharming – attacking internet service provider to redirect commonly used web pages
          • Vishing – phone message, mail, or e-mail asking you to call number where you’re prompted to enter Account Numbers, SSNs, etc.
    • 6. Statistics From 7/2/06 Modesto Bee ▲ $6,383 $5,249 $ Lost/Victim 2006 2004 ▼ $422 $555 Resolution $/Victim ▲ 40 33 # Hours/Victim ▲ $56 Bill $53 Bill $ Amount ▼ 8.9 Mill 10.1 Mill # ID Thefts 2005 2002
    • 7. Facts - Why should we care?
      • From 7/2/2006 Modesto Bee Article:
        • California has:
          • Most Identity Theft Cases – up to 20% of all cases nationwide
          • 3 rd highest rate of Identity Theft – 122/100,000
        • California school districts (from CBEDS/Ed-Data):
          • 6.3 Million students
          • 643,000 active employees and many more retirees/ex employees.
    • 8. What do you do if you’re a victim?
      • What victims need to do
        • Contact a Credit Bureau & place fraud alert (note credit will be harder to get):
          • Equifax: 1-877-576-5734; www.equifax.com      
          • Experian: 1-888-397-3742; www.experian.com/fraud      
          • TransUnion: 1-800-680-7289; www.transunion.com
        • Close fraudulently opened accounts
        • Report crime to FTC:
          • www.ftc.gov/idtheft or 1-877-IDTHEFT
        • File Police Report
    • 9. Steps to protect yourself
      • Monitor credit reports every 4 months
        • 1 free credit report from each of 3 agencies a year:
          • www.annualcreditreport.com (no “s”)
      • Credit Freeze Vs. Credit Monitoring Services
      • Shred all credit card applications and other garbage that have identifying information
      • Never give out Social Security Number, Birth Date, any account number unless you initiated the call and feel comfortable with the receiver
    • 10. Steps to Protect Students
      • Keep paper records of students containing sensitive data the minimum amount of time possible.
      • Shred all paper reports containing sensitive student data.
      • Do not download sensitive data to a laptop hard drive.
        • If you do “Shred” rather than delete the file as soon as you no longer need it.
      • Do not browse sensitive data over wireless connections (unless through a “VPN”)
      • Update windows patches frequently
      • Use a firewall
      • Run Anti-Virus, Anti-Adware (Ad-Aware), Anti-Spyware (Spybot) frequently
    • 11. Protecting students: Passwords
      • Good Passwords are:
        • Not shared
        • Easy to remember (so you don’t write it down)
        • Hard to guess (so hackers can’t figure it out)
          • Very Personal – ideally something embarrassing that you wouldn’t want to share (so you don’t share it!)
          • No words in dictionary, family member (especially pets) names, birthdates, addresses, etc.
          • Hacker’s dictionaries have words with letters replaced by common numbers, e.g. w0r6 (word), 1ik3 (like), 43at (heat).
        • Long
          • How do I make something like ipattF50otusoA easy to remember?
    • 12. Good Passwords
      • With so many password protected Accounts, how do I remember all those passwords?
        • Combine 3-4 characters & numbers to represent the account. Combine that string with a common set of characters that you use in all passwords.
      • What about passwords that expire periodically?
        • Adding a number that represents the current month is easily guessed.
        • Logical themes that have a sequence such as the order of the planets, phrases in a verse, etc.
    • 13. Safe Transactions
    • 14. Safe Transactions - IE Version 7
    • 15. Summary
      • Monitor:
        • Credit Reports Once Every 4 months
        • Activity in Online banks, credit cards, brokerages at least Monthly
      • Hide your Identity:
        • Shred Credit Card Application forms and any paper with personally identifiable information.
        • Give personal information only to people you trust.
        • Use Strong Passwords, don’t use sites that do not allow strong passwords.
    • 16.
      • Questions?