Identity Theft Presentation

1,469 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,469
On SlideShare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
43
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Identity Theft Presentation

  1. 1. Identity Theft PreventionISSA:Macon State College
  2. 2. What is Identity Theft?• Identity theft happens when someone uses your personally identifying information, like your name, social security number, or credit card number, without your permission, to commit fraud or other crimes.
  3. 3. What Can Thieves Do With Your Identity• Credit Card Fraud: Open a CC in your name and or change the billing address for your cards.• Phone and Utilities: Open a new accounts in your name or “run up” charges on your existing accounts.• Bank/Financial: Create “fake” checks in your name or account number, write bad checks in your name, make a “fake” ATM card to impersonate yours, and or take a loan out in your name.• Government: Use your DL information to get a DL with your name and their picture, use your SSN to get benefits, file fraudulent tax returns with your information.
  4. 4. Types of Fraud Credit Card Government Doc/Benefit Phone and Utility Employee Fraud Bank Fraud Loan Fraud Other
  5. 5. Number of ID Theft Police Reports Filled Police Report Did Not File Report
  6. 6. Cost to Consumers Out of Pocket Expense ($631 per consumer) Number of Identity Theft Victims
  7. 7. Common Techniques Used By Thieves• Dumpster Diving – Going through your trash to find mail or information with your name on it.• Skimming – Stealing credit card numbers by using a special “hidden” device when you are processing a transaction on your card.• Phishing – Make a “fake” website of a bank or a company and send emails asking for account information verification.• Social Engineering – Using very special speaking techniques to get people to give out confidential information
  8. 8. Preventing Dumpster Diving • Invest in a small paper shredder. They can be purchased at any local retail store. • Ensure that everything that has your name and address or any other personal information is shredded. • Make sure to not leave any mail with confidential information unattended in your mailbox for long periods of time. • Use online “e-statements” for all your accounts.
  9. 9. How To Prevent Phishing• Do not open any emails or attachments from anyone you do not know.• Ensure that all banking websites you use have the “lock symbol” located at the bottom of the web browser (Firefox, Internet Explorer).• Do not open links in emails. Type the address of the website your trying to access and not the link.• Opt-Out of email newsletters or “junk mail lists”.• Bottom Line: If it looks suspicious, DON’T CLICK IT.
  10. 10. Credit Card and Debit Card Rights• Credit Card Loss or Fraudulent Charges (FCBA)• Max liability under federal law for unauthorized use of your credit card is $50.• If you report the loss before the card is used the card issuer can not hold you liable.• Also, if the loss involves your credit card number, but not the card itself, you have no liability for unauthorized use.
  11. 11. Credit Card and Debit Card Rights Continued• ATM or Debit Card Loss or Fraudulent Transfers (EFTA).• Your liability under federal law for unauthorized use of your ATM or debit card depends on how quickly you report the loss.• If you report an ATM or debit card missing before its used without your permission, the card issuer cannot hold you responsible for any unauthorized transfers.• If unauthorized use occurs before you report it, your liability under federal law depends on how quickly you report the loss.
  12. 12. EFTA Example• If you report the loss within two business days after you realize your card is missing, you will not be responsible for more than $50 for unauthorized use. However, if you dont report the loss within two business days after you discover the loss, you could lose up to $500 because of an unauthorized transfer.
  13. 13. Reducing The Risk of Social Engineering• Make sure you keep track of your personal information and do not give out your information freely on the internet. Make sure you shred any personal documents with confidential information.• Social engineering can sometimes be very difficult to catch because of the simplicity of the attack. This is why many companies have implemented multiple forms of identity verification.
  14. 14. How To Protect Yourself Online• Use strong complex passwords. Instead of “abc123” use a password like “S!lLy$linkys!0p&” (SillySlinkySlope)• Keep your operating system (Windows) and your software programs up to date.• Keep your firewall turned ON.• Enable your virus protection.• Do not post any information on the internet that could be used to reset any of your online accounts.
  15. 15. Anti-virus and Malware RemovalRecommendations• Microsoft Security Essentials• Avast• DOM32• Malware Bytes
  16. 16. How to Protect Computer and Mobile Device Data • The process of deleting files is not enough. Ensure all sensitive information is removed. • Simply reinstalling the operating system DOES NOT ERASE YOUR FILES! • A free option for Windows based computers is Eraser. • For other operating systems, see Dariks Boot and Nuke (DBAN). • Ensure all your mobile device data is encrypted.
  17. 17. Mobile Device Security• As mobile devices become as powerful as desktop computers it is vital invest in security.• Invest in a remote lock remote wipe solution if the device is ever stolen.• Enable virus, malware, and firewall on the device.• Some solutions come with a siren or loud sound to “scare” thieves.• Free solutions include: Apple’s Find My iPhone, F-Secure Anti-Theft for Mobile, Microsofts find my phone.
  18. 18. Identities Can Be Stolen Without The Internet• In 2007, The Washington Post published an article detailing a case of identity theft, the victim’s identity was obtained from the ID cards in a lost wallet. (Jackman, 2007).• On July 19th Koco 5 from Oklahoma City reported a case of identity theft perpetrated by using information on discarded RX bottles. (RX bottles can lead., 2007)
  19. 19. If Your Identity Is Ever Stolen • File a police report with your local police department. • Check all of your credit reports, notify creditors, and make sure to dispute any unauthorized transactions on your accounts. • Swift action must be taken to restore your name. The faster you do this process the faster you can restore your good name.
  20. 20. Importance Of Filing A Police Report• Filing a report entitles you to certain legal rights when you provided it to the three major credit reporting agencies or companies that the identity thief misused your information.• Identity Theft Report can be used to PERMANENTLY block fraudulent information that results from an identity theft.• It will ensure these debts do not reappear on your credit.
  21. 21. Importance of Filing A Police Report Continued• It prevents companies from continuing to collect on the debt that resulted from identity theft or selling the debt to others for collection.• An Identity Theft Report is also needed to place an extended fraud alert on your credit report.• In short: properly reporting the identity theft to the proper authorities will make the process run more smoothly.
  22. 22. How Long Can The Effects Of Identity Theft Last• There are many different factors that determine how long it can last.• Factors include: type of theft, whether the thief sold or passed your information on to other thieves, whether or not the thief was caught, and process to correct your credit report.• Victims should monitor their credit report several months after to ensure it does not reoccur.• Victims should check every three months during the first year and once a year after.
  23. 23. More Ways To Protect Yourself• Protect your social security number.• Verify sources before sharing information.• Safeguard wallet or purse.• Store private information in secure locations.• Implement a credit freeze on your credit report.• Invest in identity theft insurance or credit monitoring.
  24. 24. More Ways To Protect Yourself Continued• Never write down your password or share it with others.• Change your passwords at least every six months.• Only friend people you know and trust on your social media networks.• When disposing your old computer, make sure you use data erasing software before you remove it.• If you have multiple passwords you cannot remember make an encrypted file with a very strong password to protect it.• Have the Postal Service hold your mail when you leave town.
  25. 25. Websites To Help You Stay Current• Federal Trade Agency : Fighting Back Against Identity Theft http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers /about-identity-theft.html• Clark Howard www.clarkhoward.com• Ben Halpert CISSP www.benhalpert.com• Symantec Education on Youtube• http://www.idtheftcenter.org/
  26. 26. Resources• Fighting Back Against Identity Theft: Federal Trade Commission http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/abou t-identity-theft.html• Ben Halpert CISSP (Certified Information Security Professional) www.benhalpert.com• http://www.ftc.gov/bcp/edu/pubs/consumer/credit/cre04.shtm• http://bucks.blogs.nytimes.com/2011/02/09/the-rising-cost-of- identity-theft-for-consumers/

×