Ready to avoid crowded stores and online scammers during the holidays? Join Michele Chubirka as she goes through:
-Tips for safe online shopping and securing your banking information
-Protecting yourself from internet scams, phishing and fraud
Safeguard your personal information against identity theft
-How to use Anti-virus and other security software to keep your digital information safe.
4. • Michele Chubirka, aka "Mrs.
Y.”
• Analyst, blogger, tech writer,
podcaster and Security Jedi
Knight.
• Focuses on topics such as
security vulnerabilities and
best practices.
• Twitter: @MrsYisWhy
Bio
5. You’re a Mean One, Mr. Grinch
• In 2014, multiple, large retailers hacked, including
Target, with 40M credit cards compromised and Home
Depot with 56M credit card numbers stolen.
• Sony Pictures breached, corporate data including
employee personal information (including SSNs)
compromised and email posted on Wikileaks.
• Office of Personnel Management (OPM) hacked,
records of 22.1M federal workers and contractors
compromised.
• IRS online application exploited to steal 334K taxpayer
records.
• Anthem Blue Cross, 78M records breached.
7. Identity Theft
• According to TransUnion,
fastest growing crime in the
US with 9.9M incidents per
year.
• Every minute 19 people are
victimized
• Everyone is vulnerable.
8. • How to shop online safely.
• Protecting yourself from internet
scams, phishing, and fraud.
• Safeguarding your personal
information against identity theft.
• Security tools and tricks to keep
your digital information safe.
8
Today you’ll learn about:
9. Data Has Value
Personally Identifiable Information(PII)
– Payment card information
– Social Security Number
– Email address
– Home address
– Birth date
– Passwords
– Health information
10. Comparison: Online vs. In-Store
In-Store Online
Credit card skimmers or vulnerable point-
of-sale (PoS) system.
Insecure web site application.
Must trust employees who handle
payment cards to protect data.
Dependent upon ecommerce company IT
staff to follow “best practices.”
Must follow PCI DSS compliance
standards.
Must follow PCI DSS compliance
standards.
Safe protection and disposal of paper
records.
Safe protection and disposal of electronic
records.
17. Other Shopping Tips
• Don’t save payment card info with
an online retailer.
• Don’t provide your credit card
number over the phone.
• Never use your bank’s debit card for
online or PoS transactions.
• Consider using a digital payment
service such as Paypal or
prepaid/reloadable cards.
• Check your bills regularly for
fraudulent charges.
30. Useful Tips
Verify the email address matches the name of the
sender.
Check spelling, grammar and punctuation.
Hover over links & review the URL- does it
match?
If it’s not personalized to you, then it’s suspicious.
No one should ask you for credentials (pin or
password) via email.
When in doubt- DON’T CLICK!!!
42. Protecting Yourself From Phishing and Fraud
• Email Links are bad. Run away.
• Don’t open attachments you aren’t
expecting.
• Be careful when sharing ANY information
on social media.
• Never send passwords in email.
• Avoid using public computers in libraries
or hotels.
• Never leave passwords, credit card
numbers or your SSN unencrypted in
email, in the cloud or on your computer.
• Shred, shred, shred anything with your
data before throwing away.
43. Securing Your Browser (and Your Privacy)
• Web browsers can be dangerous. Information
they collect and store can be used by malicious
actors.
• Helpful tools:
– Privacy Badger
– Ghostery privacy extension
– Incognito mode in Chrome or private browsing in
Firefox.
– DuckDuckGo - search engine without personalization
or tracking.
44. Adding Extensions in Firefox
• Open Firefox
• Click Tools
• Click Add-ons
• Search for the
Add-On
• Install the Add-On
45. Adding Extensions in Chrome
• Open Chrome
• Click Tools
• Click More Tools
• Extensions
• Get More
Extensions
49. Be Proactive
• Use a password safe for storing credentials securely.
• Enable multi-factor authentication options and regularly change
passwords.
• Check your credit reports and/or use credit monitoring services.
• Use anti-virus and patch your computers and mobile devices
regularly.
• Secure your home network (i.e. encrypt your wireless, change the
default password on your router, configure the firewall).
• Never use unencrypted wireless.
• Consider an automatically renewing fraud alert or a security freeze
on your credit file. http://krebsonsecurity.com/2014/03/are-credit-
monitoring-services-worth-it/
• Enable privacy options in social media and in your browser.
• Stay informed.
Welcome everyone, My Name is Kim Haslam and I will be your moderator for today. Today’s webinar ……………….
Before we get started. I would like to review how to use the webinar platform. At the bottom of your screen you will see a toolbar.
The first icon is for questions and answers. Throughout the presentation today, we will be taking questions from our audience. You click the icon to open the q&a box, type your question and hit submit. We will also have a live q&a at the end of the presentation. If you experience any technical difficulties please let us know by using the QA feature.
The next icon that is blue is the Speaker Bio
Following that is the icon for the media player.
The yellow icon opens and closes the slide window.
The green icon is to share this webinar on social media or email.
The red icon with an image of a group of people is for our group chat which we will be using today. During the presentation we will pose a question to you and would like you to respond through the group chat.
Finally the green icon with a folder is resources that are available to you for download.
To open or close any of the icons you can click on the icon in the toolbar or use the minimize feature in each of the boxes.
To open or close any of the icons you can click on the icon in the toolbar or use the minimize feature in each of the boxes.
Now, lets get started.
Jimdo is a free website creator service.
Review this email- what makes this suspicious? Use the chat feature on your toolbar to respond.
Items to point out
Subject line: the title Open Enrollment is not all capital
Health Insurance savings for the email is suspicious & email address is for best buy
This type of reminder would typically come from the government not best buy- they also would not call it obamacare or promote a picture of the president
Has random word “newsletter”
When you hover over the links- the url is not for insurance
This is an email that was detected by a gmail account. WhatsApp is a text messaging app that is very popular. What are some signs that this email suspicious?
Email does not match WhatsApp
Whats App is spelled differently throughout the email
Voice message is spelling incorreclty
Warning from gmail
It is not personal (Dear Jim)
In summary – here are some best practices when reviewing emails
The Identity Theft Resource Center is a United States non-profit organization founded to provide victim assistance and consumer education through its toll-free call center, website and social media. The ITRC educates consumers, corporations, government agencies, and other organizations on best practices for fraud and identity theft detection, reduction and mitigation; and, serves as a relevant national resource on consumer issues related to cybersecurity, data breaches, social media, fraud, scams, and other issues. It was created in December 1999 in San Diego, California.
To educate and inform consumers about identity theft, fraud, scams, and cyber-crime.
Educate consumers, corporations, government agencies, and other organizations on best practices for fraud and identity theft detection, reduction and mitigation.
To guide and assist victims of identity theft in the process necessary to clear fraud caused by identity theft from their personal, financial, and criminal records.
Serve as a relevant national resource on consumer issues related to cybersecurity, data breaches, social media, fraud, scams and other issues.
And this webinar isn’t the only way you can learn more about technology. Visit AARPTEK.ORG – go to events to sign up for live workshops or visit Online seminars page for upcoming webinars.
You can also go to our Learn tab and find, short videos, articles, eLearning and tutorials about various topics. We have a number of TEK Talks with Mike Lee under Connected Life.
You can also explore Learning Advisor which has over 30,000 courses on various topics to help you expand your knowledge.
To wrap up, you have a great reason to post a link to Facebook… Just look below this webinar and check out the share buttons below this video player. Share a link to this webinar so more of your friends can learn about this training!