SlideShare a Scribd company logo
1 of 4
Download to read offline
ID Experts® – Copyright 2019 Proprietary and Confidential. The information in this document is proprietary to ID Experts and is privileged and confidential. Any
disclosure, duplication, or use, in whole or in part, of this document, may only be obtained with the prior written consent of ID Experts.
America’s workforce is like
a giant family tree. Four
generations of employees,
from baby boomers over
70 years old to centennials
(Gen Z) in their late teens,
are on the job. Despite their
differences in age, perspective,
and life experience, your
employees of all generations
face the same risks—
identity theft and privacy
compromises.
Every generation of your employees:
•	 Uses technology to complete the daily tasks of life and
connect with friends and family.
•	 Has only a few passwords for dozens of websites and
applications—one hacked password can expose both personal
and company information.
As a result, all four generations are vulnerable to identity crimes.
To offer their employees true protection and peace of mind, HR
professionals can use this guide to understand the different risks,
behavior, and attitudes of each generation. This guide can help.
of employees have been
victims of identity theft.*
20% 6 months
for a victim to resolve--
much of it at work**
Identity fraud
takes an average of
an American is a victim
of identity theft.+
An HR’s Guide to Identity & Privacy Benefits for
Employees of All Ages
Every
2 Sec.
Identity
Theft
Fast Facts
Jack, a 63-year-old controller at a small manufacturing company,
grew up watching Star Trek and Bonanza on TV. Now he uses his
smartphone to video chat with his grandkids and to post funny cat
memes on social media. He uses the same password for his personal and work
emails and another password to access Facebook and all his financial accounts.
Like most baby boomers, Jack doesn’t fully understand the identity and privacy
risks most Americans face. He also doesn’t realize that his healthy bank balance and
impressive FICO score—731!—tempt criminals who use phishing and similar schemes to
steal bank information, tax refunds, Medicare benefits, and retirement savings.1
It may be for these reasons that baby boomers like Jack account for 41% of fraud cases
and 44% of identity theft cases, according to the Federal Trade Commission.
Amy, 45, is a supervisor at a large call center by day and a food blogger
by night. Growing up, she typed out her recipes on an old Commodore
64. Now she dictates blog ideas on her smartphone and actively
promotes it on social media. She’s better educated about identity theft than Jack,
but she also uses only a few passwords to access multiple websites and apps.
Like 33% of other Gen Xers, Amy trusts businesses to protect her personal information
all or most of the time. However, she’s a prime target for fraudsters, since she uses
things like online car insurance to save money—information not routinely covered by
traditional credit monitoring.
Amy’s generation accounts for 31% of fraud cases and 36% of identity theft cases,
crimes that can go undetected for a long time.
Jack, the Baby Boomer
Amy, the Gen Xer
ID Experts® – Copyright 2019 Proprietary and Confidential
Birth Year Span:
1965 – 1980
Current Age:
40 to 55
Percentage of
Workforce: 33%
Technology Profile1
:
90% own smartphones
76% use social media
BABY BOOMER
Snapshot
GENERATION X
Snapshot
Birth Year Span:
1946 – 1964
Current Age:
56 to 74
Percentage of
Workforce: 25%
Technology Profile*:
68% own smartphones
59% use social media
Meet Your Employees
Michael, 32, is a marketing analyst for a well-known financial institution.
Off the job, he trains for and runs ultramarathons. Michael grew up with
the Internet and, like 85% of Generation Y, accesses the web from his
smartphone. He quickly adopts new technology, such as pressure-sensitive
insoles that connect to an app on his smartphone to improve his running.
Despite this hyperconnectivity, Michael’s generation is less aware of their identity and
privacy risks than Amy and other Gen Xers. In fact, he uses fewer passwords than Amy
to connect to apps and websites. He frequently uses his Social Security number in
financial transactions, such as a car loan and a mortgage on his new condo.
While Generation Y “only” accounts for 12% of fraud cases and 14% of identity theft
cases, this fraud can go unnoticed—and thus unresolved—for a long time.
A new college graduate, 21-year-old Sophia started her career as a
software developer for a SaaS-based healthcare company. She’s a
digital native who uses multiple screens—up to 5!—to work, shop,
connect, and play. As an avid gamer, she connects daily with online
friends around the globe.
Even though Sophia is digitally savvy, the risks of identity theft aren’t exactly on her
radar. She only uses five passwords and relies on two-factor authentication to keep her
information secure. Like 44% of other Gen Zers, Sophia trusts businesses to protect
their personal information. However, fraudsters target her generation because she is
online so much and shares personal information on countless websites.
Sophia’s generation accounts for 12% of fraud cases and 14% of identity theft cases.
Michael, the Millennial (Gen Yer)
Sophia, the Centennial (Gen Zer)
ID Experts® – Copyright 2019 Proprietary and Confidential
Birth Year Span:
1997 – 2012
Current Age:
8 to 23
Percentage of
Workforce: 5% (but
growing quickly)
Technology Profile2
:
97% own smartphones
4+ hours/day on phones
GENERATION Y
Snapshot
GENERATION Z
Snapshot
Birth Year Span:
1981 – 1996
Current Age:
24 to 39
Percentage of
Workforce: 35%—
the largest percentage
of all 4 generations
Technology Profile*:
93% own smartphones
86% use social media
ID Experts® – Copyright 2019 Proprietary and Confidential
Identity and Privacy Protection for All Generations
The best way to protect your employees of all ages is to educate them about phishing
scams, strong password security, and overall good digital hygiene. You can further
safeguard your workforce with identity theft protection as a paid or voluntary benefit that
meets the needs of all four generations. As you research the different providers, look for
complete identity and privacy protection that is:
•	 Easy-to-use and intuitive for baby boomers who aren’t digital natives and for Gen Zers who are.
•	 Comprehensive, to cover all the identity and privacy risks that each generation faces. For example, Gen 	
Xers need complete identity monitoring that covers more than their credit score. And Gen Z is active on
social media, so they need privacy-based protection that meets the latest threats.
•	 Actionable alerts. With growing dangers to our digital identity and privacy, employees of all generations
need to act quickly if suspicious activity is detected.
•	 Concierge-style services for victims of identity and privacy compromises, with a recovery guarantee.
•	 Backed by a company that you trust. ID Experts offers MyIDCare, secure identity and privacy protection that
is built to meet the rigorous demands of Fortune 500 companies and the highest levels of government.
Talk with your employee benefits broker or ID Experts today to learn more about
identity and privacy protection. Our flexible solutions allow you sign up off-cycle
or during enrollment, and can be offered as a voluntary or paid benefit.
About ID Experts
Whitepaper
HR to the Rescue: How to
Defend Employee Privacy
and Reduce Cyber Risk
with Identity and Privacy
Protection Benefits
On-Demand
Webinar
How to Engage
Employees of All Ages
in Today’s Digital
Landscape
Video
Social Media Privacy
and Fraud Protection
Help Your
Employees
Feel Safe
Join the more than 70%
of employers seeking out
identity theft protection
of some kind for their
employees.3
ID Experts is a leading
privacy technology company
built to protect people and
organizations from both
the consequences of data
breaches and the evolving
privacy and identity theft
threats that affect us all.
* https://www.pwc.com/us/en/industries/private-company-services/library/financial-well-being-retirement-survey.html, p. 35
** https://www.economist.com/finance-and-economics/2017/09/14/how-to-protect-yourself-against-the-theft-of-your-identity
+https://www.foxbusiness.com/features/someone-became-an-identity-theft-victim-every-2-seconds-last-year
1 Unless otherwise specified, all data in this guide is provided courtesy of DataPath, Inc.
2 Source: GlobalWebIndex and Snap Inc. Survey
3 Source: https://www.benefitspro.com/2017/09/28/identity-theft-protection-increasingly-important-t/
See more resources at idexpertscorp.com

More Related Content

Similar to HR’s Guide to Identity and Privacy Benefits for Employees of All Ages

Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftElizabeth Dimit
 
A Social Media Primer
A Social Media PrimerA Social Media Primer
A Social Media PrimerAmanda Blum
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2Conf
 
Reputation: The Cornerstone of a Family Office
Reputation: The Cornerstone of a Family OfficeReputation: The Cornerstone of a Family Office
Reputation: The Cornerstone of a Family OfficeReputationDefender
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Blair Gately
 
Cybersecurity for Dummies
Cybersecurity for DummiesCybersecurity for Dummies
Cybersecurity for DummiesLiberteks
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity FinalCindy Kim
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2Conf
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Taylor Van Sickle
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2Conf
 
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)CR Group
 
CEO JAN16_New Age Networking - millennials buidling relationships
CEO JAN16_New Age Networking - millennials buidling relationshipsCEO JAN16_New Age Networking - millennials buidling relationships
CEO JAN16_New Age Networking - millennials buidling relationshipsFederico Re
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Ester Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ester Horowitz - M2Power Inc - Identify Theft and Growing BusinessesEster Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ester Horowitz - M2Power Inc - Identify Theft and Growing BusinessesRamon Ray
 
SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA   SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA Surender Singh
 

Similar to HR’s Guide to Identity and Privacy Benefits for Employees of All Ages (20)

Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
A Social Media Primer
A Social Media PrimerA Social Media Primer
A Social Media Primer
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
 
Reputation: The Cornerstone of a Family Office
Reputation: The Cornerstone of a Family OfficeReputation: The Cornerstone of a Family Office
Reputation: The Cornerstone of a Family Office
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
Cybersecurity for Dummies
Cybersecurity for DummiesCybersecurity for Dummies
Cybersecurity for Dummies
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
5.5.15
5.5.155.5.15
5.5.15
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
 
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
 
CEO JAN16_New Age Networking - millennials buidling relationships
CEO JAN16_New Age Networking - millennials buidling relationshipsCEO JAN16_New Age Networking - millennials buidling relationships
CEO JAN16_New Age Networking - millennials buidling relationships
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Ester Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ester Horowitz - M2Power Inc - Identify Theft and Growing BusinessesEster Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ester Horowitz - M2Power Inc - Identify Theft and Growing Businesses
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA   SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA
 

More from Elizabeth Dimit

An HR’s Guide to Identity & Privacy Benefits for Employees of All Ages
An HR’s Guide to Identity & Privacy Benefits for Employees of All AgesAn HR’s Guide to Identity & Privacy Benefits for Employees of All Ages
An HR’s Guide to Identity & Privacy Benefits for Employees of All AgesElizabeth Dimit
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...Elizabeth Dimit
 
HIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookHIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookElizabeth Dimit
 
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsElizabeth Dimit
 
The 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseThe 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseElizabeth Dimit
 
The Coffee Shop POS Buyer's Guide
The Coffee Shop POS Buyer's GuideThe Coffee Shop POS Buyer's Guide
The Coffee Shop POS Buyer's GuideElizabeth Dimit
 
How to Remedy the Dangers of Prescription Fraud, Waste, and Abuse
How to Remedy the Dangers of Prescription Fraud, Waste, and AbuseHow to Remedy the Dangers of Prescription Fraud, Waste, and Abuse
How to Remedy the Dangers of Prescription Fraud, Waste, and AbuseElizabeth Dimit
 
A Nation in Crisis: Causes and Effects of the Ongoing Opioid Epidemic
A Nation in Crisis: Causes and Effects of the Ongoing Opioid EpidemicA Nation in Crisis: Causes and Effects of the Ongoing Opioid Epidemic
A Nation in Crisis: Causes and Effects of the Ongoing Opioid EpidemicElizabeth Dimit
 
The 5 Steps to Managing Third-party Risk
The 5 Steps to Managing Third-party RiskThe 5 Steps to Managing Third-party Risk
The 5 Steps to Managing Third-party RiskElizabeth Dimit
 
How a Top Health Insurer Manages Hundreds of Incidents Every Quarter
How a Top Health Insurer Manages Hundreds of Incidents Every QuarterHow a Top Health Insurer Manages Hundreds of Incidents Every Quarter
How a Top Health Insurer Manages Hundreds of Incidents Every QuarterElizabeth Dimit
 

More from Elizabeth Dimit (11)

An HR’s Guide to Identity & Privacy Benefits for Employees of All Ages
An HR’s Guide to Identity & Privacy Benefits for Employees of All AgesAn HR’s Guide to Identity & Privacy Benefits for Employees of All Ages
An HR’s Guide to Identity & Privacy Benefits for Employees of All Ages
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
 
ESET Case Study
ESET Case StudyESET Case Study
ESET Case Study
 
HIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookHIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule Playbook
 
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
 
The 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseThe 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident Response
 
The Coffee Shop POS Buyer's Guide
The Coffee Shop POS Buyer's GuideThe Coffee Shop POS Buyer's Guide
The Coffee Shop POS Buyer's Guide
 
How to Remedy the Dangers of Prescription Fraud, Waste, and Abuse
How to Remedy the Dangers of Prescription Fraud, Waste, and AbuseHow to Remedy the Dangers of Prescription Fraud, Waste, and Abuse
How to Remedy the Dangers of Prescription Fraud, Waste, and Abuse
 
A Nation in Crisis: Causes and Effects of the Ongoing Opioid Epidemic
A Nation in Crisis: Causes and Effects of the Ongoing Opioid EpidemicA Nation in Crisis: Causes and Effects of the Ongoing Opioid Epidemic
A Nation in Crisis: Causes and Effects of the Ongoing Opioid Epidemic
 
The 5 Steps to Managing Third-party Risk
The 5 Steps to Managing Third-party RiskThe 5 Steps to Managing Third-party Risk
The 5 Steps to Managing Third-party Risk
 
How a Top Health Insurer Manages Hundreds of Incidents Every Quarter
How a Top Health Insurer Manages Hundreds of Incidents Every QuarterHow a Top Health Insurer Manages Hundreds of Incidents Every Quarter
How a Top Health Insurer Manages Hundreds of Incidents Every Quarter
 

Recently uploaded

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 

Recently uploaded (20)

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 

HR’s Guide to Identity and Privacy Benefits for Employees of All Ages

  • 1. ID Experts® – Copyright 2019 Proprietary and Confidential. The information in this document is proprietary to ID Experts and is privileged and confidential. Any disclosure, duplication, or use, in whole or in part, of this document, may only be obtained with the prior written consent of ID Experts. America’s workforce is like a giant family tree. Four generations of employees, from baby boomers over 70 years old to centennials (Gen Z) in their late teens, are on the job. Despite their differences in age, perspective, and life experience, your employees of all generations face the same risks— identity theft and privacy compromises. Every generation of your employees: • Uses technology to complete the daily tasks of life and connect with friends and family. • Has only a few passwords for dozens of websites and applications—one hacked password can expose both personal and company information. As a result, all four generations are vulnerable to identity crimes. To offer their employees true protection and peace of mind, HR professionals can use this guide to understand the different risks, behavior, and attitudes of each generation. This guide can help. of employees have been victims of identity theft.* 20% 6 months for a victim to resolve-- much of it at work** Identity fraud takes an average of an American is a victim of identity theft.+ An HR’s Guide to Identity & Privacy Benefits for Employees of All Ages Every 2 Sec. Identity Theft Fast Facts
  • 2. Jack, a 63-year-old controller at a small manufacturing company, grew up watching Star Trek and Bonanza on TV. Now he uses his smartphone to video chat with his grandkids and to post funny cat memes on social media. He uses the same password for his personal and work emails and another password to access Facebook and all his financial accounts. Like most baby boomers, Jack doesn’t fully understand the identity and privacy risks most Americans face. He also doesn’t realize that his healthy bank balance and impressive FICO score—731!—tempt criminals who use phishing and similar schemes to steal bank information, tax refunds, Medicare benefits, and retirement savings.1 It may be for these reasons that baby boomers like Jack account for 41% of fraud cases and 44% of identity theft cases, according to the Federal Trade Commission. Amy, 45, is a supervisor at a large call center by day and a food blogger by night. Growing up, she typed out her recipes on an old Commodore 64. Now she dictates blog ideas on her smartphone and actively promotes it on social media. She’s better educated about identity theft than Jack, but she also uses only a few passwords to access multiple websites and apps. Like 33% of other Gen Xers, Amy trusts businesses to protect her personal information all or most of the time. However, she’s a prime target for fraudsters, since she uses things like online car insurance to save money—information not routinely covered by traditional credit monitoring. Amy’s generation accounts for 31% of fraud cases and 36% of identity theft cases, crimes that can go undetected for a long time. Jack, the Baby Boomer Amy, the Gen Xer ID Experts® – Copyright 2019 Proprietary and Confidential Birth Year Span: 1965 – 1980 Current Age: 40 to 55 Percentage of Workforce: 33% Technology Profile1 : 90% own smartphones 76% use social media BABY BOOMER Snapshot GENERATION X Snapshot Birth Year Span: 1946 – 1964 Current Age: 56 to 74 Percentage of Workforce: 25% Technology Profile*: 68% own smartphones 59% use social media Meet Your Employees
  • 3. Michael, 32, is a marketing analyst for a well-known financial institution. Off the job, he trains for and runs ultramarathons. Michael grew up with the Internet and, like 85% of Generation Y, accesses the web from his smartphone. He quickly adopts new technology, such as pressure-sensitive insoles that connect to an app on his smartphone to improve his running. Despite this hyperconnectivity, Michael’s generation is less aware of their identity and privacy risks than Amy and other Gen Xers. In fact, he uses fewer passwords than Amy to connect to apps and websites. He frequently uses his Social Security number in financial transactions, such as a car loan and a mortgage on his new condo. While Generation Y “only” accounts for 12% of fraud cases and 14% of identity theft cases, this fraud can go unnoticed—and thus unresolved—for a long time. A new college graduate, 21-year-old Sophia started her career as a software developer for a SaaS-based healthcare company. She’s a digital native who uses multiple screens—up to 5!—to work, shop, connect, and play. As an avid gamer, she connects daily with online friends around the globe. Even though Sophia is digitally savvy, the risks of identity theft aren’t exactly on her radar. She only uses five passwords and relies on two-factor authentication to keep her information secure. Like 44% of other Gen Zers, Sophia trusts businesses to protect their personal information. However, fraudsters target her generation because she is online so much and shares personal information on countless websites. Sophia’s generation accounts for 12% of fraud cases and 14% of identity theft cases. Michael, the Millennial (Gen Yer) Sophia, the Centennial (Gen Zer) ID Experts® – Copyright 2019 Proprietary and Confidential Birth Year Span: 1997 – 2012 Current Age: 8 to 23 Percentage of Workforce: 5% (but growing quickly) Technology Profile2 : 97% own smartphones 4+ hours/day on phones GENERATION Y Snapshot GENERATION Z Snapshot Birth Year Span: 1981 – 1996 Current Age: 24 to 39 Percentage of Workforce: 35%— the largest percentage of all 4 generations Technology Profile*: 93% own smartphones 86% use social media
  • 4. ID Experts® – Copyright 2019 Proprietary and Confidential Identity and Privacy Protection for All Generations The best way to protect your employees of all ages is to educate them about phishing scams, strong password security, and overall good digital hygiene. You can further safeguard your workforce with identity theft protection as a paid or voluntary benefit that meets the needs of all four generations. As you research the different providers, look for complete identity and privacy protection that is: • Easy-to-use and intuitive for baby boomers who aren’t digital natives and for Gen Zers who are. • Comprehensive, to cover all the identity and privacy risks that each generation faces. For example, Gen Xers need complete identity monitoring that covers more than their credit score. And Gen Z is active on social media, so they need privacy-based protection that meets the latest threats. • Actionable alerts. With growing dangers to our digital identity and privacy, employees of all generations need to act quickly if suspicious activity is detected. • Concierge-style services for victims of identity and privacy compromises, with a recovery guarantee. • Backed by a company that you trust. ID Experts offers MyIDCare, secure identity and privacy protection that is built to meet the rigorous demands of Fortune 500 companies and the highest levels of government. Talk with your employee benefits broker or ID Experts today to learn more about identity and privacy protection. Our flexible solutions allow you sign up off-cycle or during enrollment, and can be offered as a voluntary or paid benefit. About ID Experts Whitepaper HR to the Rescue: How to Defend Employee Privacy and Reduce Cyber Risk with Identity and Privacy Protection Benefits On-Demand Webinar How to Engage Employees of All Ages in Today’s Digital Landscape Video Social Media Privacy and Fraud Protection Help Your Employees Feel Safe Join the more than 70% of employers seeking out identity theft protection of some kind for their employees.3 ID Experts is a leading privacy technology company built to protect people and organizations from both the consequences of data breaches and the evolving privacy and identity theft threats that affect us all. * https://www.pwc.com/us/en/industries/private-company-services/library/financial-well-being-retirement-survey.html, p. 35 ** https://www.economist.com/finance-and-economics/2017/09/14/how-to-protect-yourself-against-the-theft-of-your-identity +https://www.foxbusiness.com/features/someone-became-an-identity-theft-victim-every-2-seconds-last-year 1 Unless otherwise specified, all data in this guide is provided courtesy of DataPath, Inc. 2 Source: GlobalWebIndex and Snap Inc. Survey 3 Source: https://www.benefitspro.com/2017/09/28/identity-theft-protection-increasingly-important-t/ See more resources at idexpertscorp.com