SlideShare a Scribd company logo
1 of 36
Download to read offline
Center for Identity! 
The University of Texas at Austin!
Protecting Your Identity in a More Connected World….! 
THE INTERNET OF THINGS!
A bit about myself….! 
• President of TransUnion Interactive, 
the consumer subsidiary of 
TransUnion since 2004 
• Chief Operating Officer of TrueLink 
from 2001-2004 before helping to 
manage the merger of TrueLink, Inc. 
with TransUnion. 
• 25+ years of experience in the 
financial services industry, including 
mortgage and home equity 
originations and servicing.
Who is TransUnion?!
Objectives ! 
In today’s webinar, we will answer the following 
questions: 
! How can we expect the Internet of Things to impact 
our lives in the near future? 
! Where and how is our personally identifiable 
information (PII) shared on the Internet of Things? 
! What new challenges to identity management, 
privacy, and security can we expect? 
! What are some tips and resources we can use to 
keep safe while actively engaging?
“The Internet of Things” – What is it?! 
Companies of all kinds – not just technology and telecommunications firms 
– are linking “things” as diverse as smartphones, cars and household 
appliances to industrial-strength sensors, each other and the Internet. 
Research shows by 2015, not only will 75 percent of the world’s population 
have access to the internet. So will some six billion devices. 
But … with great opportunity comes great responsibility. 
Along with its conveniences, the movement will unveil 
unprecedented security challenges: in data privacy, 
safety, governance and trust.
“The Internet of Things” – How it Works!
What are Sensors?! 
Many Internet devices have 
sensors that can register changes 
in temperature, light, pressure, 
sound and motion. 
Nearly everything we do with one 
of our connected devices, sends 
out personal identifiable 
information – from our retail 
shopping habits, to social media 
presence to even how we control 
the temperature in our homes.
An Example: The Nest, 
Other Appliances and Sensors !
The Pros and Cons 
Pros 
• More efficient, saves time. 
• Saves money 
• Enhances daily living 
• Can reduce stress 
Cons 
• Information shared can reveal 
intimate, personal details about 
their lives, such as their 
medical needs, interactions 
with others, and personal 
habits 
• The more information 
available, the more likely 
personal information can be 
compromised
Biggest Challenges of the Internet of Things! 
Data storage investments 
• With all the billions of devices coming online, more and more 
data needs to be stored. 
• To facilitate all of this data storage, new and bigger data centers 
need to be built in the coming years. 
Security management & privacy 
• While the number of connected devices is growing, the Internet 
of Things will collect and store more and more personal 
information. 
• All this data is attractive for hackers and we will see more 
security breaches in the future. 
• Analysts already warned that most new gadgets lack the most 
basic protection against hackers.
PII and Online Retailers!
Breaches Becoming Too Much the Norm! 
* As of August 2014
How Data Breaches Occur!
For Example: Target!
Consumers Worried About 
Identity Theft and Stolen PII!
Yet, Fail to Take Action! 
• TransUnion survey results show that nearly half of Americans (49 
percent) do not have a password protection set up on their phones, 
leaving personal information stored in mobile applications easily 
accessible for thieves. 
• Nearly 40 percent of respondents said they conduct personal 
business, like emailing, shopping, checking bank accounts, and 
applying for a loan while connected to a public Wi-Fi network. 
• These types of activities make consumers more susceptible to Wi- 
Fi “sniffing,” where cyber criminals can intercept data as it travels 
through the air between the device and the Wi-Fi access point.
Institutions Partner with Organizations 
Like TransUnion to Minimize Breach!
What Can Consumers Do To Minimize 
Exposure to their PII at Retailers?!
1. Emerging Trend: Some cyber 
criminals are now using more advanced 
techniques, creating what is known as 
"ransomware," which actually installs an 
application (typically occurring on 
Android phones) and steals personal 
information from photos, personal calls 
and banking applications on the device. 
2. Emerging Trend: Identity thieves 
don’t necessarily need direct access to 
a consumer’s phone to steal confidential 
information. Many will pose as bank or 
credit card agents to gain sensitive data 
such as birth date, address and/or 
social security numbers. 
! 
! 
TransUnion Tip: Use caution when 
downloading smartphone 
applications. Many criminals have 
abandoned spam and antivirus 
frauds for fraudulent mobile 
applications. Be cautious when 
downloading third-party 
applications. 
TransUnion Tip: Don’t reply to text 
messages or voicemails from 
unknown numbers. Only respond to 
people you know, or banking and 
credit institutions after verifying the 
contact information is correct. 
! 
!
3. Emerging Trend: Phishing 
techniques have expanded to 
mobile devices. Now malicious links 
can not only come from email, but 
also from social networks and SMS-based 
spam. 
4. Emerging Trend: It is now 
common for most businesses to have 
a public WiFi network customers can 
access, but many customers may not 
know about WiFi sniffing, which 
intercepts data as it is traveling 
through the air between the device 
and the WiFi access point. 
! 
" 
TransUnion Tip: Don’t click on links 
you’re not familiar with, whether via a 
mobile site, email or text message. Also 
be aware of emails and text messages 
that look suspicious, especially those that 
ask for private information or ask if you’d 
like to download a new application. 
TransUnion Tip: Avoid public WiFi 
networks. Many applications and web 
pages do not use proper security 
measures, sending unencrypted data 
across the network that can be easily 
read by someone who is grabbing data 
as it travels. Save yourself the risk and 
avoid public WiFi networks. If you must 
use a public WiFi network, do not send 
any confidential information. 
! 
!
5. Emerging Trend: 
Manufacturers of Apple, 
Android and Blackberry 
devices have found flaws 
that affect how everything 
from network connections 
to user identities are 
managed, which enables 
attackers to remotely wipe 
devices, install malicious 
software and access all 
kinds of personal data. ! 
! 
TransUnion Tip: Be aware of 
software flaws in your 
smartphone device. Popular 
manufacturers of smartphones, 
including Apple, Android and 
Blackberry, have found flaws 
which give thieves a loophole 
to installing malicious software 
to steal your data. Watch for 
warnings from your 
smartphone manufacturer and 
immediately install any 
updates which are related to 
improved security. 
!
Even When You Take Caution, Identity 
Theft Can Still Happen!
PII and Social Media!
Identity Thieves Targeting Social Media! 
With a significantly high success rate….
What Information Do We 
Share On Social Media?! 
Enough to Lead to Identity Theft…"
How Thieves Get Our PII!
Weak Passwords = No Passwords!
What Can We Do to Minimize 
Exposure to Our PII on the Web?!
Less is More: Avoid giving out personal information on social media sites, 
such as address, phone number or your birth date. Identity thieves can 
open accounts and commit a number of financial crimes with just this 
information. 
Do Not Leave a Trail of Cookies: Do not save your password when you are 
on a public or work computer. Some social media sites automatically check 
this box under your sign in, so make sure it is never saved. If it saves, it may 
automatically bring up your account the next time someone else goes to 
that social media site. 
Lock It Up: Change your privacy settings on all your social media 
accounts, so that you have control of all the information that is posted. Set 
your profile to private, and make sure you have to approve any friend 
requests, comments, photo tags, links or posts that appear on your page. 
Get Creative: Create intricate passwords when you sign up for social 
media accounts. Change your passwords to social media accounts every 
one to three months.
Do Not Over-Share: Never give out your travel plans over social media 
sites. In many instances, social media thieves have become actual 
thieves, taking this data and using it to rob people when they are out of 
town. 
Home School Kids on Social Media: Go through these social media 
guidelines with your children. Although many young people are more 
adept at navigating the Internet, they may not fully understand the 
implications of posting private information, photos or potentially 
offensive material on the Internet. 
Monitor Your Credit: Make sure you periodically your credit reports for 
accuracy and consider signing up for a credit monitoring service, which 
can alert you by email to changes in your credit report -- a helpful way to 
prevent identity theft.
Summary! 
• As technology advances for our personal benefit, it also means more 
personal identifiable information (PII) is being shared. 
• With the benefits that the Internet of Things provides for us, it also provides 
identity thieves more access to our personal information. 
• From retailers to our own personal social media presence, we must take 
steps to minimize the exposure of our PII. 
• While there are many precautions we can take to minimize the risk of 
identity theft, monitoring products such as TransUnion, can alert you to 
identity theft and minimize the damage done by thieves.
IDWise and the Internet of Things! 
The Center for Identity’s IDWise resource center provides information and 
guidance to help you safely navigate the Internet of Things. 
• An Identity Theft and Management FAQ 
• Guidelines for using mobile devices safely 
• A downloadable toolkit with steps for protecting your identity 
• A downloadable toolkit with steps for recovering your stolen identity 
• And many, many more!
Want more great information like this?! 
Follow the Center for Identity. ! 
CenterforID! 
@UTCenterforID! 
The Center for Identity!

More Related Content

What's hot

Infocom Security
Infocom SecurityInfocom Security
Infocom Securitymmavis
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02ITNet
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationBenjamin Morley
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesMary Rayme
 
Name parul
Name parulName parul
Name parulParul231
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime finalKudakwashe Shamu
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 

What's hot (20)

Infocom Security
Infocom SecurityInfocom Security
Infocom Security
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 
Cybe Crime & Its Type
Cybe Crime & Its TypeCybe Crime & Its Type
Cybe Crime & Its Type
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Name parul
Name parulName parul
Name parul
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 

Viewers also liked

Internet of things
Internet of thingsInternet of things
Internet of thingsNaseeba P P
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
​The Identity of Things
​The Identity of Things​The Identity of Things
​The Identity of ThingsSherry Jones
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everythingDr. Wilfred Lin (Ph.D.)
 
Paris Identity Tech Talk IoT
Paris Identity Tech Talk IoTParis Identity Tech Talk IoT
Paris Identity Tech Talk IoTBertrand Carlier
 
CIS 2015-Rationing Identity in the Internet of Things- Steve Wilson
CIS 2015-Rationing Identity in the  Internet of Things-  Steve WilsonCIS 2015-Rationing Identity in the  Internet of Things-  Steve Wilson
CIS 2015-Rationing Identity in the Internet of Things- Steve WilsonCloudIDSummit
 
Identity Relationship Management: The Community Revolution
Identity Relationship Management: The Community RevolutionIdentity Relationship Management: The Community Revolution
Identity Relationship Management: The Community RevolutionForgeRock
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityMark Diodati
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsForgeRock
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsPing Identity
 
Identity, the Internet of Things and the Blockchain
Identity, the Internet of Things and the Blockchain Identity, the Internet of Things and the Blockchain
Identity, the Internet of Things and the Blockchain David Birch
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of ThingsForgeRock
 
Lessons for the Industrial Internet (pdf with notes)
Lessons for the Industrial Internet (pdf with notes)Lessons for the Industrial Internet (pdf with notes)
Lessons for the Industrial Internet (pdf with notes)Tim O'Reilly
 
Winning with the Industrial Internet of Things: How to accelerate the journey...
Winning with the Industrial Internet of Things: How to accelerate the journey...Winning with the Industrial Internet of Things: How to accelerate the journey...
Winning with the Industrial Internet of Things: How to accelerate the journey...accenture
 
Big Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of ThingsBig Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of ThingsAnthony Chen
 
Internet of Things and Big Data: Vision and Concrete Use Cases
Internet of Things and Big Data: Vision and Concrete Use CasesInternet of Things and Big Data: Vision and Concrete Use Cases
Internet of Things and Big Data: Vision and Concrete Use CasesMongoDB
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Felix Grovit
 
Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Ian Beckett
 

Viewers also liked (20)

Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
​The Identity of Things
​The Identity of Things​The Identity of Things
​The Identity of Things
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everything
 
Paris Identity Tech Talk IoT
Paris Identity Tech Talk IoTParis Identity Tech Talk IoT
Paris Identity Tech Talk IoT
 
CIS 2015-Rationing Identity in the Internet of Things- Steve Wilson
CIS 2015-Rationing Identity in the  Internet of Things-  Steve WilsonCIS 2015-Rationing Identity in the  Internet of Things-  Steve Wilson
CIS 2015-Rationing Identity in the Internet of Things- Steve Wilson
 
Identity Relationship Management: The Community Revolution
Identity Relationship Management: The Community RevolutionIdentity Relationship Management: The Community Revolution
Identity Relationship Management: The Community Revolution
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern Identity
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of Things
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
 
Identity, the Internet of Things and the Blockchain
Identity, the Internet of Things and the Blockchain Identity, the Internet of Things and the Blockchain
Identity, the Internet of Things and the Blockchain
 
Capsim - Digby
Capsim - DigbyCapsim - Digby
Capsim - Digby
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of Things
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Lessons for the Industrial Internet (pdf with notes)
Lessons for the Industrial Internet (pdf with notes)Lessons for the Industrial Internet (pdf with notes)
Lessons for the Industrial Internet (pdf with notes)
 
Winning with the Industrial Internet of Things: How to accelerate the journey...
Winning with the Industrial Internet of Things: How to accelerate the journey...Winning with the Industrial Internet of Things: How to accelerate the journey...
Winning with the Industrial Internet of Things: How to accelerate the journey...
 
Big Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of ThingsBig Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of Things
 
Internet of Things and Big Data: Vision and Concrete Use Cases
Internet of Things and Big Data: Vision and Concrete Use CasesInternet of Things and Big Data: Vision and Concrete Use Cases
Internet of Things and Big Data: Vision and Concrete Use Cases
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017
 

Similar to Center for Identity Webcast: The Internet of Things

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxNavinKumarDewangan
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Smartphone and mobile device safety & security
Smartphone and mobile device safety & securitySmartphone and mobile device safety & security
Smartphone and mobile device safety & securityAlbanMichael
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)Jermaine Smith
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Jermaine Smith
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017CheapSSLsecurity
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber securitySlamet Ar Rokhim
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 

Similar to Center for Identity Webcast: The Internet of Things (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Smartphone and mobile device safety & security
Smartphone and mobile device safety & securitySmartphone and mobile device safety & security
Smartphone and mobile device safety & security
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Users guide
Users guideUsers guide
Users guide
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 

Recently uploaded

Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 

Recently uploaded (20)

Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 

Center for Identity Webcast: The Internet of Things

  • 1. Center for Identity! The University of Texas at Austin!
  • 2. Protecting Your Identity in a More Connected World….! THE INTERNET OF THINGS!
  • 3. A bit about myself….! • President of TransUnion Interactive, the consumer subsidiary of TransUnion since 2004 • Chief Operating Officer of TrueLink from 2001-2004 before helping to manage the merger of TrueLink, Inc. with TransUnion. • 25+ years of experience in the financial services industry, including mortgage and home equity originations and servicing.
  • 5. Objectives ! In today’s webinar, we will answer the following questions: ! How can we expect the Internet of Things to impact our lives in the near future? ! Where and how is our personally identifiable information (PII) shared on the Internet of Things? ! What new challenges to identity management, privacy, and security can we expect? ! What are some tips and resources we can use to keep safe while actively engaging?
  • 6. “The Internet of Things” – What is it?! Companies of all kinds – not just technology and telecommunications firms – are linking “things” as diverse as smartphones, cars and household appliances to industrial-strength sensors, each other and the Internet. Research shows by 2015, not only will 75 percent of the world’s population have access to the internet. So will some six billion devices. But … with great opportunity comes great responsibility. Along with its conveniences, the movement will unveil unprecedented security challenges: in data privacy, safety, governance and trust.
  • 7. “The Internet of Things” – How it Works!
  • 8. What are Sensors?! Many Internet devices have sensors that can register changes in temperature, light, pressure, sound and motion. Nearly everything we do with one of our connected devices, sends out personal identifiable information – from our retail shopping habits, to social media presence to even how we control the temperature in our homes.
  • 9. An Example: The Nest, Other Appliances and Sensors !
  • 10. The Pros and Cons Pros • More efficient, saves time. • Saves money • Enhances daily living • Can reduce stress Cons • Information shared can reveal intimate, personal details about their lives, such as their medical needs, interactions with others, and personal habits • The more information available, the more likely personal information can be compromised
  • 11. Biggest Challenges of the Internet of Things! Data storage investments • With all the billions of devices coming online, more and more data needs to be stored. • To facilitate all of this data storage, new and bigger data centers need to be built in the coming years. Security management & privacy • While the number of connected devices is growing, the Internet of Things will collect and store more and more personal information. • All this data is attractive for hackers and we will see more security breaches in the future. • Analysts already warned that most new gadgets lack the most basic protection against hackers.
  • 12. PII and Online Retailers!
  • 13. Breaches Becoming Too Much the Norm! * As of August 2014
  • 16.
  • 17.
  • 18. Consumers Worried About Identity Theft and Stolen PII!
  • 19. Yet, Fail to Take Action! • TransUnion survey results show that nearly half of Americans (49 percent) do not have a password protection set up on their phones, leaving personal information stored in mobile applications easily accessible for thieves. • Nearly 40 percent of respondents said they conduct personal business, like emailing, shopping, checking bank accounts, and applying for a loan while connected to a public Wi-Fi network. • These types of activities make consumers more susceptible to Wi- Fi “sniffing,” where cyber criminals can intercept data as it travels through the air between the device and the Wi-Fi access point.
  • 20. Institutions Partner with Organizations Like TransUnion to Minimize Breach!
  • 21. What Can Consumers Do To Minimize Exposure to their PII at Retailers?!
  • 22. 1. Emerging Trend: Some cyber criminals are now using more advanced techniques, creating what is known as "ransomware," which actually installs an application (typically occurring on Android phones) and steals personal information from photos, personal calls and banking applications on the device. 2. Emerging Trend: Identity thieves don’t necessarily need direct access to a consumer’s phone to steal confidential information. Many will pose as bank or credit card agents to gain sensitive data such as birth date, address and/or social security numbers. ! ! TransUnion Tip: Use caution when downloading smartphone applications. Many criminals have abandoned spam and antivirus frauds for fraudulent mobile applications. Be cautious when downloading third-party applications. TransUnion Tip: Don’t reply to text messages or voicemails from unknown numbers. Only respond to people you know, or banking and credit institutions after verifying the contact information is correct. ! !
  • 23. 3. Emerging Trend: Phishing techniques have expanded to mobile devices. Now malicious links can not only come from email, but also from social networks and SMS-based spam. 4. Emerging Trend: It is now common for most businesses to have a public WiFi network customers can access, but many customers may not know about WiFi sniffing, which intercepts data as it is traveling through the air between the device and the WiFi access point. ! " TransUnion Tip: Don’t click on links you’re not familiar with, whether via a mobile site, email or text message. Also be aware of emails and text messages that look suspicious, especially those that ask for private information or ask if you’d like to download a new application. TransUnion Tip: Avoid public WiFi networks. Many applications and web pages do not use proper security measures, sending unencrypted data across the network that can be easily read by someone who is grabbing data as it travels. Save yourself the risk and avoid public WiFi networks. If you must use a public WiFi network, do not send any confidential information. ! !
  • 24. 5. Emerging Trend: Manufacturers of Apple, Android and Blackberry devices have found flaws that affect how everything from network connections to user identities are managed, which enables attackers to remotely wipe devices, install malicious software and access all kinds of personal data. ! ! TransUnion Tip: Be aware of software flaws in your smartphone device. Popular manufacturers of smartphones, including Apple, Android and Blackberry, have found flaws which give thieves a loophole to installing malicious software to steal your data. Watch for warnings from your smartphone manufacturer and immediately install any updates which are related to improved security. !
  • 25. Even When You Take Caution, Identity Theft Can Still Happen!
  • 26. PII and Social Media!
  • 27. Identity Thieves Targeting Social Media! With a significantly high success rate….
  • 28. What Information Do We Share On Social Media?! Enough to Lead to Identity Theft…"
  • 29. How Thieves Get Our PII!
  • 30. Weak Passwords = No Passwords!
  • 31. What Can We Do to Minimize Exposure to Our PII on the Web?!
  • 32. Less is More: Avoid giving out personal information on social media sites, such as address, phone number or your birth date. Identity thieves can open accounts and commit a number of financial crimes with just this information. Do Not Leave a Trail of Cookies: Do not save your password when you are on a public or work computer. Some social media sites automatically check this box under your sign in, so make sure it is never saved. If it saves, it may automatically bring up your account the next time someone else goes to that social media site. Lock It Up: Change your privacy settings on all your social media accounts, so that you have control of all the information that is posted. Set your profile to private, and make sure you have to approve any friend requests, comments, photo tags, links or posts that appear on your page. Get Creative: Create intricate passwords when you sign up for social media accounts. Change your passwords to social media accounts every one to three months.
  • 33. Do Not Over-Share: Never give out your travel plans over social media sites. In many instances, social media thieves have become actual thieves, taking this data and using it to rob people when they are out of town. Home School Kids on Social Media: Go through these social media guidelines with your children. Although many young people are more adept at navigating the Internet, they may not fully understand the implications of posting private information, photos or potentially offensive material on the Internet. Monitor Your Credit: Make sure you periodically your credit reports for accuracy and consider signing up for a credit monitoring service, which can alert you by email to changes in your credit report -- a helpful way to prevent identity theft.
  • 34. Summary! • As technology advances for our personal benefit, it also means more personal identifiable information (PII) is being shared. • With the benefits that the Internet of Things provides for us, it also provides identity thieves more access to our personal information. • From retailers to our own personal social media presence, we must take steps to minimize the exposure of our PII. • While there are many precautions we can take to minimize the risk of identity theft, monitoring products such as TransUnion, can alert you to identity theft and minimize the damage done by thieves.
  • 35. IDWise and the Internet of Things! The Center for Identity’s IDWise resource center provides information and guidance to help you safely navigate the Internet of Things. • An Identity Theft and Management FAQ • Guidelines for using mobile devices safely • A downloadable toolkit with steps for protecting your identity • A downloadable toolkit with steps for recovering your stolen identity • And many, many more!
  • 36. Want more great information like this?! Follow the Center for Identity. ! CenterforID! @UTCenterforID! The Center for Identity!