SlideShare a Scribd company logo
Brought to you by : ProtectMyID™



        IDENTITY THEFT IN VIEW

                                         Identity Theft

                                                                     The FTC
                                                                     estimates that as many as
                                                                     9 million Americans
                                                                     have their identities stolen each year.




     REPORTED COMPLAINTS IN 2010
                                              As reported to the FTC
                 #1 IDENTITY THEFT
              Complaint
               11 Years
               in a Row




                                     11% Debt Collection




                                   5% Internet Services and Prizes, Sweepstakes and Lotteries
                                  4% Shop-at-Home, Catalog Sales, Impostor Scams and Internet Auction
                                  3% Foreign Money Offers, Counterfeit Check Scams and Telephone/Mobile Services
                                 2% Credit Cards




                                                          cyber security
                                            Survey Results



                                                                         50%                       ACCESS AMAZON
                                                                                                   AND THEIR BANK ACCOUNT

                                                                         $ITES WITH CONSIDERABLE
                                                                         PERSONAL FINANTIAL DATA
                                                                         BY MOBILE PHONE AND/OR TABLET
              90%
             OWN A LAPTOP OR PC
                                              49%
                                              OWN A
                                              SMART                                                Set Passcode
                                              PHONE


          SIXTY SIX PERCENT                                                                  54%
                                                                                           DO NOT USE A PASSWORD
          REPORT USING THE SAME                                                            TO LOCK THEIR PHONE AND/OR TABLET



            P A S 5 W O R D                                                               AMONG THE
                                                                                          LEAST LIKELY
                                                                                          TO REPORT 55
                                                                                                           60%

                                                                                                          AGES
                                                                                                                 59%

                                                                                                              + WHITES
                                                                                                                         58%
                                                                                                                         MAKING
                                                                                                                         MORE


           FOR AT LEAST TWO ACCOUNTS
                                                                                                                         THAN
                                                                                          USING A                        $50K
                                                                                                                         PER YEAR



                                                                                          PASSWORD




                 50%
                                                       of people do not click
        OVER




                                                       the LOG OUT BUTTON
                                                       when they are finished                      LOG OUT!
                                                       using accounts
                                                       like Facebook or Twitter




                                     Home                       Profile                    Account

                                                       18%            of survey respondents
                                                                      proactively manage
                                                                      their privacy settings
                                                                      on an ongoing basis.




                                                50%
                                  Provide their birth date
                                  educational background
                                  and email address on social media

                   WHAT IS THE FIRST STEP YOU SHOULD TAKE
                   IF YOU SUSPECT SOMEONE HAS HACKED INTO
                   ONE OF YOUR ONLINE ACCOUNTS                                                                           ?
     MOST PEOPLE DID NOT SAY
                CALLREPORTING AGENCY
                OR CREDIT
                          A BANK

                                                                types of
                                             Identity Theft



                           is the state with the highest per capita rate of
                                                                             FLORIDA
                          reported identity theft complaints, followed by
                                                                                   ARIZONA &
                                                                                  CALIFORNIA


SOURCES:
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html
http://www.ftc.gov/opa/2011/03/topcomplaints.shtm
Consumer Sentinel Network Data Book for January - December 2010 for the Federal Trade Commission
Internet Use and Privacy Analysis - September 16, 2011, conducted by Strategy One

More Related Content

Viewers also liked

Symantec Infographic - The State of Cyber Security
Symantec Infographic - The State of Cyber SecuritySymantec Infographic - The State of Cyber Security
Symantec Infographic - The State of Cyber Security
CheapSSLsecurity
 
The Connors Group Cyber Security Infographic
The Connors Group Cyber Security Infographic The Connors Group Cyber Security Infographic
The Connors Group Cyber Security Infographic
The Connors Group
 
Cyber Security Regulations in Europe
Cyber Security Regulations in EuropeCyber Security Regulations in Europe
Cyber Security Regulations in Europe
IDG Connect
 
Cyber liability and public entities infographic
Cyber liability and public entities infographic Cyber liability and public entities infographic
Cyber liability and public entities infographic
Glatfelter Public Practice Insurance
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
PaloAltoNetworks
 

Viewers also liked (6)

Symantec Infographic - The State of Cyber Security
Symantec Infographic - The State of Cyber SecuritySymantec Infographic - The State of Cyber Security
Symantec Infographic - The State of Cyber Security
 
The Connors Group Cyber Security Infographic
The Connors Group Cyber Security Infographic The Connors Group Cyber Security Infographic
The Connors Group Cyber Security Infographic
 
Cyber Security Regulations in Europe
Cyber Security Regulations in EuropeCyber Security Regulations in Europe
Cyber Security Regulations in Europe
 
Cyber liability and public entities infographic
Cyber liability and public entities infographic Cyber liability and public entities infographic
Cyber liability and public entities infographic
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 

Recently uploaded

^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Duba...
^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Duba...^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Duba...
^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Duba...
mayaclinic18
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
DOT TECH
 
BONKMILLON Unleashes Its Bonkers Potential on Solana.pdf
BONKMILLON Unleashes Its Bonkers Potential on Solana.pdfBONKMILLON Unleashes Its Bonkers Potential on Solana.pdf
BONKMILLON Unleashes Its Bonkers Potential on Solana.pdf
coingabbar
 
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
University of Calabria
 
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptxSWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Tdasx: Unveiling the Trillion-Dollar Potential of Bitcoin DeFi
Tdasx: Unveiling the Trillion-Dollar Potential of Bitcoin DeFiTdasx: Unveiling the Trillion-Dollar Potential of Bitcoin DeFi
Tdasx: Unveiling the Trillion-Dollar Potential of Bitcoin DeFi
nimaruinazawa258
 
Analyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar modelAnalyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar model
ManthanBhardwaj4
 
Patronage and Good Governance 5.pptx pptc
Patronage and Good Governance 5.pptx pptcPatronage and Good Governance 5.pptx pptc
Patronage and Good Governance 5.pptx pptc
AbdulNasirNichari
 
where can I find a legit pi merchant online
where can I find a legit pi merchant onlinewhere can I find a legit pi merchant online
where can I find a legit pi merchant online
DOT TECH
 
This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...
lamluanvan.net Viết thuê luận văn
 
WhatsPump Thriving in the Whirlwind of Biden’s Crypto Roller Coaster
WhatsPump Thriving in the Whirlwind of Biden’s Crypto Roller CoasterWhatsPump Thriving in the Whirlwind of Biden’s Crypto Roller Coaster
WhatsPump Thriving in the Whirlwind of Biden’s Crypto Roller Coaster
muslimdavidovich670
 
1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf
Neal Brewster
 
在线办理(GU毕业证书)美国贡萨加大学毕业证学历证书一模一样
在线办理(GU毕业证书)美国贡萨加大学毕业证学历证书一模一样在线办理(GU毕业证书)美国贡萨加大学毕业证学历证书一模一样
在线办理(GU毕业证书)美国贡萨加大学毕业证学历证书一模一样
5spllj1l
 
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
obyzuk
 
G20 summit held in India. Proper presentation for G20 summit
G20 summit held in India. Proper presentation for G20 summitG20 summit held in India. Proper presentation for G20 summit
G20 summit held in India. Proper presentation for G20 summit
rohitsaxena882511
 
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
sameer shah
 
Donald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptxDonald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptx
SerdarHudaykuliyew
 
一比一原版(UCL毕业证)伦敦大学|学院毕业证如何办理
一比一原版(UCL毕业证)伦敦大学|学院毕业证如何办理一比一原版(UCL毕业证)伦敦大学|学院毕业证如何办理
一比一原版(UCL毕业证)伦敦大学|学院毕业证如何办理
otogas
 
Instant Issue Debit Cards
Instant Issue Debit CardsInstant Issue Debit Cards
Instant Issue Debit Cards
egoetzinger
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
DOT TECH
 

Recently uploaded (20)

^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Duba...
^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Duba...^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Duba...
^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Duba...
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
 
BONKMILLON Unleashes Its Bonkers Potential on Solana.pdf
BONKMILLON Unleashes Its Bonkers Potential on Solana.pdfBONKMILLON Unleashes Its Bonkers Potential on Solana.pdf
BONKMILLON Unleashes Its Bonkers Potential on Solana.pdf
 
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
 
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptxSWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
 
Tdasx: Unveiling the Trillion-Dollar Potential of Bitcoin DeFi
Tdasx: Unveiling the Trillion-Dollar Potential of Bitcoin DeFiTdasx: Unveiling the Trillion-Dollar Potential of Bitcoin DeFi
Tdasx: Unveiling the Trillion-Dollar Potential of Bitcoin DeFi
 
Analyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar modelAnalyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar model
 
Patronage and Good Governance 5.pptx pptc
Patronage and Good Governance 5.pptx pptcPatronage and Good Governance 5.pptx pptc
Patronage and Good Governance 5.pptx pptc
 
where can I find a legit pi merchant online
where can I find a legit pi merchant onlinewhere can I find a legit pi merchant online
where can I find a legit pi merchant online
 
This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...
 
WhatsPump Thriving in the Whirlwind of Biden’s Crypto Roller Coaster
WhatsPump Thriving in the Whirlwind of Biden’s Crypto Roller CoasterWhatsPump Thriving in the Whirlwind of Biden’s Crypto Roller Coaster
WhatsPump Thriving in the Whirlwind of Biden’s Crypto Roller Coaster
 
1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf
 
在线办理(GU毕业证书)美国贡萨加大学毕业证学历证书一模一样
在线办理(GU毕业证书)美国贡萨加大学毕业证学历证书一模一样在线办理(GU毕业证书)美国贡萨加大学毕业证学历证书一模一样
在线办理(GU毕业证书)美国贡萨加大学毕业证学历证书一模一样
 
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
 
G20 summit held in India. Proper presentation for G20 summit
G20 summit held in India. Proper presentation for G20 summitG20 summit held in India. Proper presentation for G20 summit
G20 summit held in India. Proper presentation for G20 summit
 
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
 
Donald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptxDonald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptx
 
一比一原版(UCL毕业证)伦敦大学|学院毕业证如何办理
一比一原版(UCL毕业证)伦敦大学|学院毕业证如何办理一比一原版(UCL毕业证)伦敦大学|学院毕业证如何办理
一比一原版(UCL毕业证)伦敦大学|学院毕业证如何办理
 
Instant Issue Debit Cards
Instant Issue Debit CardsInstant Issue Debit Cards
Instant Issue Debit Cards
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
 

Cyber Security Infographic | ProtectMyID

  • 1. Brought to you by : ProtectMyID™ IDENTITY THEFT IN VIEW Identity Theft The FTC estimates that as many as 9 million Americans have their identities stolen each year. REPORTED COMPLAINTS IN 2010 As reported to the FTC #1 IDENTITY THEFT Complaint 11 Years in a Row 11% Debt Collection 5% Internet Services and Prizes, Sweepstakes and Lotteries 4% Shop-at-Home, Catalog Sales, Impostor Scams and Internet Auction 3% Foreign Money Offers, Counterfeit Check Scams and Telephone/Mobile Services 2% Credit Cards cyber security Survey Results 50% ACCESS AMAZON AND THEIR BANK ACCOUNT $ITES WITH CONSIDERABLE PERSONAL FINANTIAL DATA BY MOBILE PHONE AND/OR TABLET 90% OWN A LAPTOP OR PC 49% OWN A SMART Set Passcode PHONE SIXTY SIX PERCENT 54% DO NOT USE A PASSWORD REPORT USING THE SAME TO LOCK THEIR PHONE AND/OR TABLET P A S 5 W O R D AMONG THE LEAST LIKELY TO REPORT 55 60% AGES 59% + WHITES 58% MAKING MORE FOR AT LEAST TWO ACCOUNTS THAN USING A $50K PER YEAR PASSWORD 50% of people do not click OVER the LOG OUT BUTTON when they are finished LOG OUT! using accounts like Facebook or Twitter Home Profile Account 18% of survey respondents proactively manage their privacy settings on an ongoing basis. 50% Provide their birth date educational background and email address on social media WHAT IS THE FIRST STEP YOU SHOULD TAKE IF YOU SUSPECT SOMEONE HAS HACKED INTO ONE OF YOUR ONLINE ACCOUNTS ? MOST PEOPLE DID NOT SAY CALLREPORTING AGENCY OR CREDIT A BANK types of Identity Theft is the state with the highest per capita rate of FLORIDA reported identity theft complaints, followed by ARIZONA & CALIFORNIA SOURCES: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html http://www.ftc.gov/opa/2011/03/topcomplaints.shtm Consumer Sentinel Network Data Book for January - December 2010 for the Federal Trade Commission Internet Use and Privacy Analysis - September 16, 2011, conducted by Strategy One