SlideShare a Scribd company logo
1 of 22
What is Identity Theft
It occurs when someone steals your personal
information – e.g. , credit card or Social Security
number - and uses it fraudulently
It can cost you time and money .
It can destroy your credit and ruin your good name .
What Can Thieves Do With Your Identity
 Credit Card Fraud : open a CC in your name and or change the
billing address for your cards.
 Phone and Utilities : Open a new accounts in your name or “run
up” charges on your existing account.
 Bank/Financial : Create “fake” checks in your name or account
number , write bad checks in your name , make a “fake” ATM card
to impersonate yours, and or take a loan out in your name.
 Government : Use your DL information to get a DL with your name
and their picture , use your SSN to get benefits, file fraudulent tax
return with your information.
Types of Fraud
.
Credit Card
Government
Doc/Benefit
Phone and Utility
Employee Fraud
Bank Fraud
Number of ID Theft Police Reports
Filled
Police
Report
Did not
Filled
Report
Cost to Consumers
Out of Pocket Expense ($631 per
consumer)
Number of Identity Theft victims
Common Techniques Used by Thieves
 Dumpster Driving - Going through your trash to find mail or
information with your name on it.
 Skimming - Stealing credit card numbers by using a special
“hidden” device when you are processing a transaction on your
card.
 Phishing - Make a “fake” website of a bank or a company and send
emails asking for account information verification.
 Social Engineering - Using very special speaking techniques to get
people to give out confidential information
Preventing Dumpster Diving
Invest in a small paper shredder. They can be
purchased at any local retail store.
Ensure that everything that has your name and
address or any other personal information is
shredded.
Make sure to not leave any mail with
confidential information unattended in your
mailbox for long periods of time.
Use online “e-statements” for all your accounts.
How To Prevent Phishing
Do not open any emails or attachments from anyone
you do not know.
Ensure that all banking websites you use have the
“lock symbol” located at the bottom of the web
browser (Firefox, Internet Explorer).
Do not open links in emails. Type the address of the
website your trying to access and not the link.
opt-Out of email newsletters or “junk mail lists”.
Bottom Line: If it looks suspicious, DON’T CLICK IT.
Reducing The Risk of Social Engineering
Make sure you keep track of your personal
information and do not give out your information
freely on the internet. Make sure you shred any
personal documents with confidential information.
Social engineering can sometimes be very difficult
to catch because of the simplicity of the attack.
This is why many companies have implemented
multiple forms of identity verification.
How To Protect Yourself Online
Use strong complex passwords. Instead of “abc123” use a
password like “S!lLy$linkys!0p&” (Silly Slinky Slope)
Keep your operating system (Windows) and your
software programs up to date.
Keep your firewall turned ON.
Enable your virus protection.
Do not post any information on the internet that could
be used to reset any of your online accounts.
Anti-virus and Malware Removal
Recommendations
Microsoft Security Essentials
Avast
DOM32
Malware Bytes
How to Protect Computer and Mobile
Device Data
The process of deleting files is not enough. Ensure all
sensitive information is removed.
Simply reinstalling the operating system DOES NOT
ERASE YOUR FILES!
A free option for Windows based computers is Eraser.
For other operating systems, see Dariks Boot and
Nuke (DBAN).
Ensure all your mobile device data is encrypted.
FOUR AREAS OF NEGLECT
Lack of Feeling
Lack of Knowledge
Lack of Training or Education
Lack of Respect
FOUR AREAS OF NEGLECT
Mobile Device Security
 As mobile devices become as powerful as desktop
computers it is vital invest in security.
 Invest in a remote lock remote wipe solution if the device
is ever stolen.
 Enable virus, malware, and firewall on the device.
 Some solutions come with a siren or loud sound to “scare”
thieves.
 Free solutions include: Apple’s Find My iPhone, F-Secure
Anti-Theft for Mobile, Microsoft find my phone.
If Your Identity Is Ever Stolen
File a police report with your local police
department.
Check all of your credit reports, notify creditors, and
make sure to dispute any unauthorized transactions
on your accounts.
Swift action must be taken to restore your name.
The faster you do this process the faster you can
restore your good name.
Importance Of Filing A Police Report
Filing a report entitles you to certain legal rights when you
provided it to the three major credit reporting agencies or
companies that the identity thief misused your information.
Identity Theft Report can be used to PERMANENTLY block
fraudulent information that results from an identity theft.
It will ensure these debts do not reappear on your credit.
Importance of Filing A Police Report
continued…
It prevents companies from continuing to collect on
the debt that resulted from identity theft or selling
the debt to others for collection.
An Identity Theft Report is also needed to place an
extended fraud alert on your credit report.
In short: properly reporting the identity theft to the
proper authorities will make the process run more
smoothly.
More Ways To Protect Yourself
Protect your social security number.
Verify sources before sharing information.
Safeguard wallet or purse
Store private information in secure locations.•
Implement a credit freeze on your credit report
Invest in identity theft insurance or credit monitoring.
More Ways To Protect Yourself Continued
 Never write down your password or share it with others.
 Change your passwords at least every six months.
 Only friend people you know and trust on your social media
networks.
 When disposing your old computer, make sure you use data
erasing software before you remove it.
 If you have multiple passwords you cannot remember make an
encrypted file with a very strong password to protect it.
 Have the Postal Service hold your mail when you leave town.
Websites To Help You Stay Current•
Federal Trade Agency :
Fighting Back Against Identity Theft
http://www.ftc.gov/bcp/edu/microsites/idtheft/consu
mers /about-identity-theft.html
Clark Howard www.clarkhoward.com
Ben Halpert CISSP www.benhalpert.com
Symantec Education on Youtube
http://www.idtheftcenter.org/
Identity theft

More Related Content

What's hot

secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger Abhishek Hirapara
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14Naval OPSEC
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attackAariyaRathi
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacksSreejith.D. Menon
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Securityanjuselina
 

What's hot (20)

secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Phishing
PhishingPhishing
Phishing
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Phishing
PhishingPhishing
Phishing
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 

Similar to Identity theft

Similar to Identity theft (20)

Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Data theft
Data theftData theft
Data theft
 
Identity Theft Toolkit
Identity Theft ToolkitIdentity Theft Toolkit
Identity Theft Toolkit
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
Is this a scam.pdf
Is this a scam.pdfIs this a scam.pdf
Is this a scam.pdf
 
Digital Banking Fraud
Digital Banking FraudDigital Banking Fraud
Digital Banking Fraud
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 

Recently uploaded

10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

Identity theft

  • 1.
  • 2. What is Identity Theft It occurs when someone steals your personal information – e.g. , credit card or Social Security number - and uses it fraudulently It can cost you time and money . It can destroy your credit and ruin your good name .
  • 3. What Can Thieves Do With Your Identity  Credit Card Fraud : open a CC in your name and or change the billing address for your cards.  Phone and Utilities : Open a new accounts in your name or “run up” charges on your existing account.  Bank/Financial : Create “fake” checks in your name or account number , write bad checks in your name , make a “fake” ATM card to impersonate yours, and or take a loan out in your name.  Government : Use your DL information to get a DL with your name and their picture , use your SSN to get benefits, file fraudulent tax return with your information.
  • 4. Types of Fraud . Credit Card Government Doc/Benefit Phone and Utility Employee Fraud Bank Fraud
  • 5. Number of ID Theft Police Reports Filled Police Report Did not Filled Report
  • 6. Cost to Consumers Out of Pocket Expense ($631 per consumer) Number of Identity Theft victims
  • 7. Common Techniques Used by Thieves  Dumpster Driving - Going through your trash to find mail or information with your name on it.  Skimming - Stealing credit card numbers by using a special “hidden” device when you are processing a transaction on your card.  Phishing - Make a “fake” website of a bank or a company and send emails asking for account information verification.  Social Engineering - Using very special speaking techniques to get people to give out confidential information
  • 8. Preventing Dumpster Diving Invest in a small paper shredder. They can be purchased at any local retail store. Ensure that everything that has your name and address or any other personal information is shredded. Make sure to not leave any mail with confidential information unattended in your mailbox for long periods of time. Use online “e-statements” for all your accounts.
  • 9. How To Prevent Phishing Do not open any emails or attachments from anyone you do not know. Ensure that all banking websites you use have the “lock symbol” located at the bottom of the web browser (Firefox, Internet Explorer). Do not open links in emails. Type the address of the website your trying to access and not the link. opt-Out of email newsletters or “junk mail lists”. Bottom Line: If it looks suspicious, DON’T CLICK IT.
  • 10. Reducing The Risk of Social Engineering Make sure you keep track of your personal information and do not give out your information freely on the internet. Make sure you shred any personal documents with confidential information. Social engineering can sometimes be very difficult to catch because of the simplicity of the attack. This is why many companies have implemented multiple forms of identity verification.
  • 11. How To Protect Yourself Online Use strong complex passwords. Instead of “abc123” use a password like “S!lLy$linkys!0p&” (Silly Slinky Slope) Keep your operating system (Windows) and your software programs up to date. Keep your firewall turned ON. Enable your virus protection. Do not post any information on the internet that could be used to reset any of your online accounts.
  • 12. Anti-virus and Malware Removal Recommendations Microsoft Security Essentials Avast DOM32 Malware Bytes
  • 13. How to Protect Computer and Mobile Device Data The process of deleting files is not enough. Ensure all sensitive information is removed. Simply reinstalling the operating system DOES NOT ERASE YOUR FILES! A free option for Windows based computers is Eraser. For other operating systems, see Dariks Boot and Nuke (DBAN). Ensure all your mobile device data is encrypted.
  • 14. FOUR AREAS OF NEGLECT Lack of Feeling Lack of Knowledge Lack of Training or Education Lack of Respect FOUR AREAS OF NEGLECT
  • 15. Mobile Device Security  As mobile devices become as powerful as desktop computers it is vital invest in security.  Invest in a remote lock remote wipe solution if the device is ever stolen.  Enable virus, malware, and firewall on the device.  Some solutions come with a siren or loud sound to “scare” thieves.  Free solutions include: Apple’s Find My iPhone, F-Secure Anti-Theft for Mobile, Microsoft find my phone.
  • 16. If Your Identity Is Ever Stolen File a police report with your local police department. Check all of your credit reports, notify creditors, and make sure to dispute any unauthorized transactions on your accounts. Swift action must be taken to restore your name. The faster you do this process the faster you can restore your good name.
  • 17. Importance Of Filing A Police Report Filing a report entitles you to certain legal rights when you provided it to the three major credit reporting agencies or companies that the identity thief misused your information. Identity Theft Report can be used to PERMANENTLY block fraudulent information that results from an identity theft. It will ensure these debts do not reappear on your credit.
  • 18. Importance of Filing A Police Report continued… It prevents companies from continuing to collect on the debt that resulted from identity theft or selling the debt to others for collection. An Identity Theft Report is also needed to place an extended fraud alert on your credit report. In short: properly reporting the identity theft to the proper authorities will make the process run more smoothly.
  • 19. More Ways To Protect Yourself Protect your social security number. Verify sources before sharing information. Safeguard wallet or purse Store private information in secure locations.• Implement a credit freeze on your credit report Invest in identity theft insurance or credit monitoring.
  • 20. More Ways To Protect Yourself Continued  Never write down your password or share it with others.  Change your passwords at least every six months.  Only friend people you know and trust on your social media networks.  When disposing your old computer, make sure you use data erasing software before you remove it.  If you have multiple passwords you cannot remember make an encrypted file with a very strong password to protect it.  Have the Postal Service hold your mail when you leave town.
  • 21. Websites To Help You Stay Current• Federal Trade Agency : Fighting Back Against Identity Theft http://www.ftc.gov/bcp/edu/microsites/idtheft/consu mers /about-identity-theft.html Clark Howard www.clarkhoward.com Ben Halpert CISSP www.benhalpert.com Symantec Education on Youtube http://www.idtheftcenter.org/