2. What is Identity Theft
It occurs when someone steals your personal
information – e.g. , credit card or Social Security
number - and uses it fraudulently
It can cost you time and money .
It can destroy your credit and ruin your good name .
3. What Can Thieves Do With Your Identity
Credit Card Fraud : open a CC in your name and or change the
billing address for your cards.
Phone and Utilities : Open a new accounts in your name or “run
up” charges on your existing account.
Bank/Financial : Create “fake” checks in your name or account
number , write bad checks in your name , make a “fake” ATM card
to impersonate yours, and or take a loan out in your name.
Government : Use your DL information to get a DL with your name
and their picture , use your SSN to get benefits, file fraudulent tax
return with your information.
4. Types of Fraud
.
Credit Card
Government
Doc/Benefit
Phone and Utility
Employee Fraud
Bank Fraud
5. Number of ID Theft Police Reports
Filled
Police
Report
Did not
Filled
Report
6. Cost to Consumers
Out of Pocket Expense ($631 per
consumer)
Number of Identity Theft victims
7. Common Techniques Used by Thieves
Dumpster Driving - Going through your trash to find mail or
information with your name on it.
Skimming - Stealing credit card numbers by using a special
“hidden” device when you are processing a transaction on your
card.
Phishing - Make a “fake” website of a bank or a company and send
emails asking for account information verification.
Social Engineering - Using very special speaking techniques to get
people to give out confidential information
8. Preventing Dumpster Diving
Invest in a small paper shredder. They can be
purchased at any local retail store.
Ensure that everything that has your name and
address or any other personal information is
shredded.
Make sure to not leave any mail with
confidential information unattended in your
mailbox for long periods of time.
Use online “e-statements” for all your accounts.
9. How To Prevent Phishing
Do not open any emails or attachments from anyone
you do not know.
Ensure that all banking websites you use have the
“lock symbol” located at the bottom of the web
browser (Firefox, Internet Explorer).
Do not open links in emails. Type the address of the
website your trying to access and not the link.
opt-Out of email newsletters or “junk mail lists”.
Bottom Line: If it looks suspicious, DON’T CLICK IT.
10. Reducing The Risk of Social Engineering
Make sure you keep track of your personal
information and do not give out your information
freely on the internet. Make sure you shred any
personal documents with confidential information.
Social engineering can sometimes be very difficult
to catch because of the simplicity of the attack.
This is why many companies have implemented
multiple forms of identity verification.
11. How To Protect Yourself Online
Use strong complex passwords. Instead of “abc123” use a
password like “S!lLy$linkys!0p&” (Silly Slinky Slope)
Keep your operating system (Windows) and your
software programs up to date.
Keep your firewall turned ON.
Enable your virus protection.
Do not post any information on the internet that could
be used to reset any of your online accounts.
13. How to Protect Computer and Mobile
Device Data
The process of deleting files is not enough. Ensure all
sensitive information is removed.
Simply reinstalling the operating system DOES NOT
ERASE YOUR FILES!
A free option for Windows based computers is Eraser.
For other operating systems, see Dariks Boot and
Nuke (DBAN).
Ensure all your mobile device data is encrypted.
14. FOUR AREAS OF NEGLECT
Lack of Feeling
Lack of Knowledge
Lack of Training or Education
Lack of Respect
FOUR AREAS OF NEGLECT
15. Mobile Device Security
As mobile devices become as powerful as desktop
computers it is vital invest in security.
Invest in a remote lock remote wipe solution if the device
is ever stolen.
Enable virus, malware, and firewall on the device.
Some solutions come with a siren or loud sound to “scare”
thieves.
Free solutions include: Apple’s Find My iPhone, F-Secure
Anti-Theft for Mobile, Microsoft find my phone.
16. If Your Identity Is Ever Stolen
File a police report with your local police
department.
Check all of your credit reports, notify creditors, and
make sure to dispute any unauthorized transactions
on your accounts.
Swift action must be taken to restore your name.
The faster you do this process the faster you can
restore your good name.
17. Importance Of Filing A Police Report
Filing a report entitles you to certain legal rights when you
provided it to the three major credit reporting agencies or
companies that the identity thief misused your information.
Identity Theft Report can be used to PERMANENTLY block
fraudulent information that results from an identity theft.
It will ensure these debts do not reappear on your credit.
18. Importance of Filing A Police Report
continued…
It prevents companies from continuing to collect on
the debt that resulted from identity theft or selling
the debt to others for collection.
An Identity Theft Report is also needed to place an
extended fraud alert on your credit report.
In short: properly reporting the identity theft to the
proper authorities will make the process run more
smoothly.
19. More Ways To Protect Yourself
Protect your social security number.
Verify sources before sharing information.
Safeguard wallet or purse
Store private information in secure locations.•
Implement a credit freeze on your credit report
Invest in identity theft insurance or credit monitoring.
20. More Ways To Protect Yourself Continued
Never write down your password or share it with others.
Change your passwords at least every six months.
Only friend people you know and trust on your social media
networks.
When disposing your old computer, make sure you use data
erasing software before you remove it.
If you have multiple passwords you cannot remember make an
encrypted file with a very strong password to protect it.
Have the Postal Service hold your mail when you leave town.
21. Websites To Help You Stay Current•
Federal Trade Agency :
Fighting Back Against Identity Theft
http://www.ftc.gov/bcp/edu/microsites/idtheft/consu
mers /about-identity-theft.html
Clark Howard www.clarkhoward.com
Ben Halpert CISSP www.benhalpert.com
Symantec Education on Youtube
http://www.idtheftcenter.org/