Your SlideShare is downloading. ×
0
How to Protect Yourself From Identity Theft ETC! 2007 Matthew Kinzie  Director, IT Stanislaus County COE
Agenda <ul><li>Definition Of Identity Theft </li></ul><ul><li>Facts about Identity Theft </li></ul><ul><li>What if you’re ...
Definition - How do you steal a person’s Identity? <ul><li>From the Wikipedia: </li></ul><ul><ul><li>“ Identity theft  (or...
Definition – Use <ul><li>Typical Uses of Fraudulent data: </li></ul><ul><ul><li>Financial gain:  Credit Cards, Bank Accoun...
Definition –Source <ul><li>Common sources of identity theft: </li></ul><ul><ul><li>Wallets, Mail, credit application forms...
Statistics From 7/2/06 Modesto Bee  ▲ $6,383  $5,249  $ Lost/Victim 2006 2004 ▼ $422  $555  Resolution $/Victim ▲ 40 33 # ...
Facts - Why should we care? <ul><li>From 7/2/2006 Modesto Bee Article: </li></ul><ul><ul><li>California has: </li></ul></u...
What do you do if you’re a victim? <ul><li>What victims need to do </li></ul><ul><ul><li>Contact a Credit Bureau & place f...
Steps to protect yourself <ul><li>Monitor credit reports every 4 months </li></ul><ul><ul><li>1 free credit report from ea...
Steps to Protect Students <ul><li>Keep paper records of students containing sensitive data the minimum amount of time poss...
Protecting students: Passwords <ul><li>Good Passwords are: </li></ul><ul><ul><li>Not shared </li></ul></ul><ul><ul><li>Eas...
Good Passwords <ul><li>With so many password protected Accounts, how do I remember all those passwords? </li></ul><ul><ul>...
Safe Transactions
Safe Transactions - IE Version 7
Summary <ul><li>Monitor: </li></ul><ul><ul><li>Credit Reports Once Every 4 months </li></ul></ul><ul><ul><li>Activity in O...
<ul><li>Questions? </li></ul>
Upcoming SlideShare
Loading in...5
×

How To Protect Yourself From Identity Theft

626

Published on

Presentation given to teachers and adminstrators on how to protect themselves from identity theft.

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
626
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
28
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Most discussions about ID Theft is how an individual protects him/herself and responds to ID Theft. A lot of discussion about how businesses can protect their data. Not much discussion about what to do after it happens.
  • Transcript of "How To Protect Yourself From Identity Theft"

    1. 1. How to Protect Yourself From Identity Theft ETC! 2007 Matthew Kinzie Director, IT Stanislaus County COE
    2. 2. Agenda <ul><li>Definition Of Identity Theft </li></ul><ul><li>Facts about Identity Theft </li></ul><ul><li>What if you’re a victim of Identity Theft? </li></ul><ul><li>Steps to protect yourself from Identity Theft </li></ul>
    3. 3. Definition - How do you steal a person’s Identity? <ul><li>From the Wikipedia: </li></ul><ul><ul><li>“ Identity theft (or identity fraud,) occurs when someone wrongfully acquires or uses another person's personal data, typically for their own financial gain. Sometimes it is referred to as &quot;identity fraud&quot; since the criminal impersonates rather than 'removes' the victim's identity.” (http://en.wikipedia.org/wiki/Identity_theft) </li></ul></ul>
    4. 4. Definition – Use <ul><li>Typical Uses of Fraudulent data: </li></ul><ul><ul><li>Financial gain: Credit Cards, Bank Accounts, Bank Loans, Phone service, utilities </li></ul></ul><ul><ul><li>Concealment: Work in U.S. Illegally, Commit Crimes </li></ul></ul><ul><ul><li>Obtaining medical services </li></ul></ul><ul><ul><ul><li>People get medical services using another’s identity to get insurance </li></ul></ul></ul><ul><ul><ul><li>The theft’s medical records get intertwined with the victim’s – could cause serious medical complications for the victim </li></ul></ul></ul>
    5. 5. Definition –Source <ul><li>Common sources of identity theft: </li></ul><ul><ul><li>Wallets, Mail, credit application forms, employer records </li></ul></ul><ul><ul><li>Less common: </li></ul></ul><ul><ul><ul><li>Pretexting – caller impersonates someone else to get information from organizational representatives. </li></ul></ul></ul><ul><ul><ul><li>Phishing – e-mail asking for confirmation of account numbers, passwords, SSNs </li></ul></ul></ul><ul><ul><ul><li>Pharming – attacking internet service provider to redirect commonly used web pages </li></ul></ul></ul><ul><ul><ul><li>Vishing – phone message, mail, or e-mail asking you to call number where you’re prompted to enter Account Numbers, SSNs, etc. </li></ul></ul></ul>
    6. 6. Statistics From 7/2/06 Modesto Bee ▲ $6,383 $5,249 $ Lost/Victim 2006 2004 ▼ $422 $555 Resolution $/Victim ▲ 40 33 # Hours/Victim ▲ $56 Bill $53 Bill $ Amount ▼ 8.9 Mill 10.1 Mill # ID Thefts 2005 2002
    7. 7. Facts - Why should we care? <ul><li>From 7/2/2006 Modesto Bee Article: </li></ul><ul><ul><li>California has: </li></ul></ul><ul><ul><ul><li>Most Identity Theft Cases – up to 20% of all cases nationwide </li></ul></ul></ul><ul><ul><ul><li>3 rd highest rate of Identity Theft – 122/100,000 </li></ul></ul></ul><ul><ul><li>California school districts (from CBEDS/Ed-Data): </li></ul></ul><ul><ul><ul><li>6.3 Million students </li></ul></ul></ul><ul><ul><ul><li>643,000 active employees and many more retirees/ex employees. </li></ul></ul></ul>
    8. 8. What do you do if you’re a victim? <ul><li>What victims need to do </li></ul><ul><ul><li>Contact a Credit Bureau & place fraud alert (note credit will be harder to get): </li></ul></ul><ul><ul><ul><li>Equifax: 1-877-576-5734; www.equifax.com       </li></ul></ul></ul><ul><ul><ul><li>Experian: 1-888-397-3742; www.experian.com/fraud       </li></ul></ul></ul><ul><ul><ul><li>TransUnion: 1-800-680-7289; www.transunion.com </li></ul></ul></ul><ul><ul><li>Close fraudulently opened accounts </li></ul></ul><ul><ul><li>Report crime to FTC: </li></ul></ul><ul><ul><ul><li>www.ftc.gov/idtheft or 1-877-IDTHEFT </li></ul></ul></ul><ul><ul><li>File Police Report </li></ul></ul>
    9. 9. Steps to protect yourself <ul><li>Monitor credit reports every 4 months </li></ul><ul><ul><li>1 free credit report from each of 3 agencies a year: </li></ul></ul><ul><ul><ul><li>www.annualcreditreport.com (no “s”) </li></ul></ul></ul><ul><li>Credit Freeze Vs. Credit Monitoring Services </li></ul><ul><li>Shred all credit card applications and other garbage that have identifying information </li></ul><ul><li>Never give out Social Security Number, Birth Date, any account number unless you initiated the call and feel comfortable with the receiver </li></ul>
    10. 10. Steps to Protect Students <ul><li>Keep paper records of students containing sensitive data the minimum amount of time possible. </li></ul><ul><li>Shred all paper reports containing sensitive student data. </li></ul><ul><li>Do not download sensitive data to a laptop hard drive. </li></ul><ul><ul><li>If you do “Shred” rather than delete the file as soon as you no longer need it. </li></ul></ul><ul><li>Do not browse sensitive data over wireless connections (unless through a “VPN”) </li></ul><ul><li>Update windows patches frequently </li></ul><ul><li>Use a firewall </li></ul><ul><li>Run Anti-Virus, Anti-Adware (Ad-Aware), Anti-Spyware (Spybot) frequently </li></ul>
    11. 11. Protecting students: Passwords <ul><li>Good Passwords are: </li></ul><ul><ul><li>Not shared </li></ul></ul><ul><ul><li>Easy to remember (so you don’t write it down) </li></ul></ul><ul><ul><li>Hard to guess (so hackers can’t figure it out) </li></ul></ul><ul><ul><ul><li>Very Personal – ideally something embarrassing that you wouldn’t want to share (so you don’t share it!) </li></ul></ul></ul><ul><ul><ul><li>No words in dictionary, family member (especially pets) names, birthdates, addresses, etc. </li></ul></ul></ul><ul><ul><ul><li>Hacker’s dictionaries have words with letters replaced by common numbers, e.g. w0r6 (word), 1ik3 (like), 43at (heat). </li></ul></ul></ul><ul><ul><li>Long </li></ul></ul><ul><ul><ul><li>How do I make something like ipattF50otusoA easy to remember? </li></ul></ul></ul>
    12. 12. Good Passwords <ul><li>With so many password protected Accounts, how do I remember all those passwords? </li></ul><ul><ul><li>Combine 3-4 characters & numbers to represent the account. Combine that string with a common set of characters that you use in all passwords. </li></ul></ul><ul><li>What about passwords that expire periodically? </li></ul><ul><ul><li>Adding a number that represents the current month is easily guessed. </li></ul></ul><ul><ul><li>Logical themes that have a sequence such as the order of the planets, phrases in a verse, etc. </li></ul></ul>
    13. 13. Safe Transactions
    14. 14. Safe Transactions - IE Version 7
    15. 15. Summary <ul><li>Monitor: </li></ul><ul><ul><li>Credit Reports Once Every 4 months </li></ul></ul><ul><ul><li>Activity in Online banks, credit cards, brokerages at least Monthly </li></ul></ul><ul><li>Hide your Identity: </li></ul><ul><ul><li>Shred Credit Card Application forms and any paper with personally identifiable information. </li></ul></ul><ul><ul><li>Give personal information only to people you trust. </li></ul></ul><ul><ul><li>Use Strong Passwords, don’t use sites that do not allow strong passwords. </li></ul></ul>
    16. 16. <ul><li>Questions? </li></ul>
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×