SlideShare a Scribd company logo
1 of 26
Identity Theft Prevention

ISSA:Macon State College
What is Identity Theft?

• Identity theft happens when someone uses your personally
  identifying information, like your name, social security
  number, or credit card number, without your permission, to
  commit fraud or other crimes.
What Can Thieves Do With Your Identity

• Credit Card Fraud: Open a CC in your name and or change
  the billing address for your cards.
• Phone and Utilities: Open a new accounts in your name or
  “run up” charges on your existing accounts.
• Bank/Financial: Create “fake” checks in your name or
  account number, write bad checks in your name, make a
  “fake” ATM card to impersonate yours, and or take a loan
  out in your name.
• Government: Use your DL information to get a DL with your
  name and their picture, use your SSN to get benefits, file
  fraudulent tax returns with your information.
Types of Fraud
                 Credit Card

                 Government
                 Doc/Benefit
                 Phone and Utility

                 Employee Fraud

                 Bank Fraud

                 Loan Fraud

                 Other
Number of ID Theft Police Reports

                   Filled Police
                   Report




                   Did Not File
                   Report
Cost to Consumers

          Out of Pocket Expense
          ($631 per consumer)

          Number of Identity
          Theft Victims
Common Techniques Used By Thieves

• Dumpster Diving – Going through your trash to find mail or
  information with your name on it.

• Skimming – Stealing credit card numbers by using a special
  “hidden” device when you are processing a transaction on
  your card.

• Phishing – Make a “fake” website of a bank or a company
  and send emails asking for account information verification.

• Social Engineering – Using very special speaking techniques
  to get people to give out confidential information
Preventing Dumpster Diving
   • Invest in a small paper shredder. They can be
     purchased at any local retail store.

   • Ensure that everything that has your name and
     address or any other personal information is
     shredded.

   • Make sure to not leave any mail with
     confidential information unattended in your
     mailbox for long periods of time.

   • Use online “e-statements” for all your accounts.
How To Prevent Phishing
• Do not open any emails or attachments from anyone
  you do not know.

• Ensure that all banking websites you use have the
  “lock symbol” located at the bottom of the web
  browser (Firefox, Internet Explorer).

• Do not open links in emails. Type the address of the
  website your trying to access and not the link.

• Opt-Out of email newsletters or “junk mail lists”.

• Bottom Line: If it looks suspicious, DON’T CLICK IT.
Credit Card and Debit Card Rights
• Credit Card Loss or Fraudulent Charges (FCBA)

• Max liability under federal law for unauthorized
  use of your credit card is $50.

• If you report the loss before the card is used the
  card issuer can not hold you liable.

• Also, if the loss involves your credit card
  number, but not the card itself, you have no
  liability for unauthorized use.
Credit Card and Debit Card Rights
                            Continued

• ATM or Debit Card Loss or Fraudulent Transfers (EFTA).

• Your liability under federal law for unauthorized use of your
  ATM or debit card depends on how quickly you report the loss.

• If you report an ATM or debit card missing before it's used
  without your permission, the card issuer cannot hold you
  responsible for any unauthorized transfers.

• If unauthorized use occurs before you report it, your liability
  under federal law depends on how quickly you report the loss.
EFTA Example
• If you report the loss within two business days after you
  realize your card is missing, you will not be responsible for
  more than $50 for unauthorized use. However, if you don't
  report the loss within two business days after you discover the
  loss, you could lose up to $500 because of an unauthorized
  transfer.
Reducing The Risk of Social Engineering

• Make sure you keep track of your
  personal information and do not
  give out your information freely on
  the internet. Make sure you shred
  any personal documents with
  confidential information.

• Social engineering can sometimes
  be very difficult to catch because
  of the simplicity of the attack. This
  is why many companies have
  implemented multiple forms of
  identity verification.
How To Protect Yourself Online

• Use strong complex passwords. Instead
  of “abc123” use a password like
  “S!lLy$linkys!0p&” (SillySlinkySlope)

• Keep your operating system (Windows)
  and your software programs up to date.

• Keep your firewall turned ON.

• Enable your virus protection.

• Do not post any information on the
  internet that could be used to reset any
  of your online accounts.
Anti-virus and Malware Removal
Recommendations
• Microsoft Security Essentials

• Avast

• DOM32

• Malware Bytes
How to Protect Computer
 and Mobile Device Data
   • The process of deleting files is not enough. Ensure
     all sensitive information is removed.

   • Simply reinstalling the operating system DOES
     NOT ERASE YOUR FILES!

   • A free option for Windows based computers is
     Eraser.

   • For other operating systems, see Darik's Boot and
     Nuke (DBAN).

   • Ensure all your mobile device data is encrypted.
Mobile Device Security

• As mobile devices become as powerful as
  desktop computers it is vital invest in security.

• Invest in a remote lock remote wipe solution if
  the device is ever stolen.

• Enable virus, malware, and firewall on the
  device.

• Some solutions come with a siren or loud sound
  to “scare” thieves.

• Free solutions include: Apple’s Find My
  iPhone, F-Secure Anti-Theft for
  Mobile, Microsoft's find my phone.
Identities Can Be Stolen
             Without The Internet
• In 2007, The Washington Post
  published an article detailing a case
  of identity theft, the victim’s
  identity was obtained from the ID
  cards in a lost wallet.
  (Jackman, 2007).

• On July 19th Koco 5 from Oklahoma
  City reported a case of identity theft
  perpetrated by using information on
  discarded RX bottles.
      (RX bottles can lead., 2007)
If Your Identity Is Ever Stolen
         • File a police report with your local
           police department.

         • Check all of your credit reports, notify
           creditors, and make sure to dispute
           any unauthorized transactions on your
           accounts.

         • Swift action must be taken to restore
           your name. The faster you do this
           process the faster you can restore your
           good name.
Importance Of Filing A Police Report

• Filing a report entitles you to certain legal
  rights when you provided it to the three
  major credit reporting agencies or
  companies that the identity thief misused
  your information.

• Identity Theft Report can be used to
  PERMANENTLY block fraudulent information
  that results from an identity theft.

• It will ensure these debts do not reappear
  on your credit.
Importance of Filing A Police Report
                          Continued

• It prevents companies from continuing to collect on the debt
  that resulted from identity theft or selling the debt to
  others for collection.

• An Identity Theft Report is also needed to place an
  extended fraud alert on your credit report.

• In short: properly reporting the identity theft to the proper
  authorities will make the process run more smoothly.
How Long Can The Effects Of Identity
            Theft Last
• There are many different factors that determine how long it
  can last.

• Factors include: type of theft, whether the thief sold or
  passed your information on to other thieves, whether or not
  the thief was caught, and process to correct your credit
  report.

• Victims should monitor their credit report several months
  after to ensure it does not reoccur.

• Victims should check every three months during the first
  year and once a year after.
More Ways To Protect Yourself

• Protect your social security number.

• Verify sources before sharing information.

• Safeguard wallet or purse.

• Store private information in secure locations.

• Implement a credit freeze on your credit report.

• Invest in identity theft insurance or credit monitoring.
More Ways To Protect Yourself
                           Continued

• Never write down your password or share it with others.

• Change your passwords at least every six months.

• Only friend people you know and trust on your social media
  networks.

• When disposing your old computer, make sure you use data
  erasing software before you remove it.

• If you have multiple passwords you cannot remember make an
  encrypted file with a very strong password to protect it.

• Have the Postal Service hold your mail when you leave town.
Websites To Help You Stay Current
• Federal Trade Agency : Fighting Back Against Identity Theft
  http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers
  /about-identity-theft.html

• Clark Howard www.clarkhoward.com

• Ben Halpert CISSP www.benhalpert.com

• Symantec Education on Youtube

• http://www.idtheftcenter.org/
Resources
• Fighting Back Against Identity Theft: Federal Trade Commission
  http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/abou
  t-identity-theft.html

• Ben Halpert CISSP (Certified Information Security Professional)
  www.benhalpert.com

• http://www.ftc.gov/bcp/edu/pubs/consumer/credit/cre04.shtm

• http://bucks.blogs.nytimes.com/2011/02/09/the-rising-cost-of-
  identity-theft-for-consumers/

More Related Content

What's hot

Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft Rahmat Inggi
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime typeskiran yadav
 

What's hot (20)

Unit 1
Unit 1Unit 1
Unit 1
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 

Similar to Identity Theft Presentation

Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Barbara O'Neill
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theftnewsusa01
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Barbara O'Neill
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Themmilfamln
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 

Similar to Identity Theft Presentation (20)

What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft
 
Protect Your Identity
Protect Your IdentityProtect Your Identity
Protect Your Identity
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 

Identity Theft Presentation

  • 2. What is Identity Theft? • Identity theft happens when someone uses your personally identifying information, like your name, social security number, or credit card number, without your permission, to commit fraud or other crimes.
  • 3. What Can Thieves Do With Your Identity • Credit Card Fraud: Open a CC in your name and or change the billing address for your cards. • Phone and Utilities: Open a new accounts in your name or “run up” charges on your existing accounts. • Bank/Financial: Create “fake” checks in your name or account number, write bad checks in your name, make a “fake” ATM card to impersonate yours, and or take a loan out in your name. • Government: Use your DL information to get a DL with your name and their picture, use your SSN to get benefits, file fraudulent tax returns with your information.
  • 4. Types of Fraud Credit Card Government Doc/Benefit Phone and Utility Employee Fraud Bank Fraud Loan Fraud Other
  • 5. Number of ID Theft Police Reports Filled Police Report Did Not File Report
  • 6. Cost to Consumers Out of Pocket Expense ($631 per consumer) Number of Identity Theft Victims
  • 7. Common Techniques Used By Thieves • Dumpster Diving – Going through your trash to find mail or information with your name on it. • Skimming – Stealing credit card numbers by using a special “hidden” device when you are processing a transaction on your card. • Phishing – Make a “fake” website of a bank or a company and send emails asking for account information verification. • Social Engineering – Using very special speaking techniques to get people to give out confidential information
  • 8. Preventing Dumpster Diving • Invest in a small paper shredder. They can be purchased at any local retail store. • Ensure that everything that has your name and address or any other personal information is shredded. • Make sure to not leave any mail with confidential information unattended in your mailbox for long periods of time. • Use online “e-statements” for all your accounts.
  • 9. How To Prevent Phishing • Do not open any emails or attachments from anyone you do not know. • Ensure that all banking websites you use have the “lock symbol” located at the bottom of the web browser (Firefox, Internet Explorer). • Do not open links in emails. Type the address of the website your trying to access and not the link. • Opt-Out of email newsletters or “junk mail lists”. • Bottom Line: If it looks suspicious, DON’T CLICK IT.
  • 10. Credit Card and Debit Card Rights • Credit Card Loss or Fraudulent Charges (FCBA) • Max liability under federal law for unauthorized use of your credit card is $50. • If you report the loss before the card is used the card issuer can not hold you liable. • Also, if the loss involves your credit card number, but not the card itself, you have no liability for unauthorized use.
  • 11. Credit Card and Debit Card Rights Continued • ATM or Debit Card Loss or Fraudulent Transfers (EFTA). • Your liability under federal law for unauthorized use of your ATM or debit card depends on how quickly you report the loss. • If you report an ATM or debit card missing before it's used without your permission, the card issuer cannot hold you responsible for any unauthorized transfers. • If unauthorized use occurs before you report it, your liability under federal law depends on how quickly you report the loss.
  • 12. EFTA Example • If you report the loss within two business days after you realize your card is missing, you will not be responsible for more than $50 for unauthorized use. However, if you don't report the loss within two business days after you discover the loss, you could lose up to $500 because of an unauthorized transfer.
  • 13. Reducing The Risk of Social Engineering • Make sure you keep track of your personal information and do not give out your information freely on the internet. Make sure you shred any personal documents with confidential information. • Social engineering can sometimes be very difficult to catch because of the simplicity of the attack. This is why many companies have implemented multiple forms of identity verification.
  • 14. How To Protect Yourself Online • Use strong complex passwords. Instead of “abc123” use a password like “S!lLy$linkys!0p&” (SillySlinkySlope) • Keep your operating system (Windows) and your software programs up to date. • Keep your firewall turned ON. • Enable your virus protection. • Do not post any information on the internet that could be used to reset any of your online accounts.
  • 15. Anti-virus and Malware Removal Recommendations • Microsoft Security Essentials • Avast • DOM32 • Malware Bytes
  • 16. How to Protect Computer and Mobile Device Data • The process of deleting files is not enough. Ensure all sensitive information is removed. • Simply reinstalling the operating system DOES NOT ERASE YOUR FILES! • A free option for Windows based computers is Eraser. • For other operating systems, see Darik's Boot and Nuke (DBAN). • Ensure all your mobile device data is encrypted.
  • 17. Mobile Device Security • As mobile devices become as powerful as desktop computers it is vital invest in security. • Invest in a remote lock remote wipe solution if the device is ever stolen. • Enable virus, malware, and firewall on the device. • Some solutions come with a siren or loud sound to “scare” thieves. • Free solutions include: Apple’s Find My iPhone, F-Secure Anti-Theft for Mobile, Microsoft's find my phone.
  • 18. Identities Can Be Stolen Without The Internet • In 2007, The Washington Post published an article detailing a case of identity theft, the victim’s identity was obtained from the ID cards in a lost wallet. (Jackman, 2007). • On July 19th Koco 5 from Oklahoma City reported a case of identity theft perpetrated by using information on discarded RX bottles. (RX bottles can lead., 2007)
  • 19. If Your Identity Is Ever Stolen • File a police report with your local police department. • Check all of your credit reports, notify creditors, and make sure to dispute any unauthorized transactions on your accounts. • Swift action must be taken to restore your name. The faster you do this process the faster you can restore your good name.
  • 20. Importance Of Filing A Police Report • Filing a report entitles you to certain legal rights when you provided it to the three major credit reporting agencies or companies that the identity thief misused your information. • Identity Theft Report can be used to PERMANENTLY block fraudulent information that results from an identity theft. • It will ensure these debts do not reappear on your credit.
  • 21. Importance of Filing A Police Report Continued • It prevents companies from continuing to collect on the debt that resulted from identity theft or selling the debt to others for collection. • An Identity Theft Report is also needed to place an extended fraud alert on your credit report. • In short: properly reporting the identity theft to the proper authorities will make the process run more smoothly.
  • 22. How Long Can The Effects Of Identity Theft Last • There are many different factors that determine how long it can last. • Factors include: type of theft, whether the thief sold or passed your information on to other thieves, whether or not the thief was caught, and process to correct your credit report. • Victims should monitor their credit report several months after to ensure it does not reoccur. • Victims should check every three months during the first year and once a year after.
  • 23. More Ways To Protect Yourself • Protect your social security number. • Verify sources before sharing information. • Safeguard wallet or purse. • Store private information in secure locations. • Implement a credit freeze on your credit report. • Invest in identity theft insurance or credit monitoring.
  • 24. More Ways To Protect Yourself Continued • Never write down your password or share it with others. • Change your passwords at least every six months. • Only friend people you know and trust on your social media networks. • When disposing your old computer, make sure you use data erasing software before you remove it. • If you have multiple passwords you cannot remember make an encrypted file with a very strong password to protect it. • Have the Postal Service hold your mail when you leave town.
  • 25. Websites To Help You Stay Current • Federal Trade Agency : Fighting Back Against Identity Theft http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers /about-identity-theft.html • Clark Howard www.clarkhoward.com • Ben Halpert CISSP www.benhalpert.com • Symantec Education on Youtube • http://www.idtheftcenter.org/
  • 26. Resources • Fighting Back Against Identity Theft: Federal Trade Commission http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/abou t-identity-theft.html • Ben Halpert CISSP (Certified Information Security Professional) www.benhalpert.com • http://www.ftc.gov/bcp/edu/pubs/consumer/credit/cre04.shtm • http://bucks.blogs.nytimes.com/2011/02/09/the-rising-cost-of- identity-theft-for-consumers/