SlideShare a Scribd company logo
IDENTITY THEFTHow It Works, How To Protect Yourself, 

And What To Do If You Become A Victim
You’ve spent years building, managing, and securing your financial life.
Unfortunately, some people want to take the easy road, by “tapping in” and
leveraging this hard work by illegally using your personal information for their
own financial gain.
14.4 million Americans
(5.56% of consumers) 

had their identities stolen in
2018. Unfortunately, identity
theft is quite common.
https://www.javelinstrategy.com/coverage-area/2019-identity-fraud-report-fraudsters-seek-new-targets-and-victims-bear-brunt
Conventional and Synthetic
There are 2 basic identity theft strategies used today.
ConventionalConventional
With conventional identity theft,
the criminal pretends to be you,
gathering enough personal
information so that the financial
institution believes they are
working with you.
SyntheticSynthetic
With synthetic identity theft, the criminal
combines your real information with fake
or “dummy” personal information,
creating a new “synthetic” individual.
This “synthetic” person then opens lines
of credit using your information.
SyntheticSynthetic
Synthetic identity theft can be more
challenging as the fraudulent activity
does not show up on your account
statements.
Whether it’s a conventional or synthetic identity theft case,
perpetrators need to collect your personal information to get started.
There are 4 common tactics.
Dumpster DivingDumpster Diving
It’s a digital world, but we still
receive a mountain of personal
information in the mail each week.
Dumpster diving continues to be a
simple and effective way for
criminals to access bank, credit
card, and loan information.
PhishingPhishing
In this scheme, you actually take
part in providing your personal
information to identity thieves who
pretend to be from a financial
institution and call, email, or text
to ask for personal information
related to your account.
HackingHacking
Hacks can be very simple, like
guessing your passwords, or much
more complex, like installing
keystroke loggers and malware on
your computer.
Data BreData Breaches
In a data breach, a company that
holds your personal information is
hacked and your personal
information is stolen.
What to do if yoWhat to do if you are a Victim
There are eight steps to take immediately that can help mitigate damage
and get your financial life back on track.
determine the loDetermine the location or status of the account breach.
Quickly contact your financial institution
and shut down any account that has
been impacted. This may be an
individual bank account or a credit card.
O N E
review statemenReview statements for fraudulent activity
Connect with every institution
that you do business with, and
request six months’ worth of
transactional statements. Look
for fraudulent charges that you
might have missed.
T W O
get a current copGet a current copy of your credit report
The most important thing to look for
is new lines of credit that were
opened by a perpetrator.
T H R E E
report the crimeReport the crime to the Federal Trade Commission (FTC)
You will want a paper trail that
documents the fraud, and the first
step is to file a report with the FTC
at www.identitytheft.gov. The FTC will
provide you with a plan for recovery
and letters that can be used when
working with the police.
F O U R
file a police repoFile a police report
It’s likely that the person or group that
stole your identity doesn’t live in your
home town, so the police may have
limited ability to prosecute. However,
this can help strengthen your paper trail
and may help others.
Be ready for a few bureaucratic hoops,
as it may be unclear which jurisdiction
or law enforcement agency should
handle your case.  
F I V E
file a fraud alertFile a fraud alert on your credit reports
Once you’ve filed reports with the FTC
and local police, it’s time to circle
around with the credit agencies.
Placing a fraud alert on your credit
score will last for 90 days and notifies
financial institutions that your
identity has been compromised. This
means that they will take extra
precautions when opening new
accounts in your name.
S I X
work with instateWork with institutions on a path forward.
Call the fraud department of each
business and request that they close the
account. Send each business a copy of
your Identity Theft Report and/or
dispute form along with a letter of
explanation, and work with them to
determine what steps need to be taken
to secure your accounts. Ask for a letter
confirming that the account was
fraudulent, that you are not liable for it,
and that it has been removed from your
credit report.
S E V E N
file a fraud alertStay Vigilant
Unfortunately, once your identity has
been compromised it becomes more
likely that it will happen again. Consider
signing up for identity monitoring alerts
when your personal information – like
your bank account information, social
security number, driver’s license,
passport or medical ID number – is being
used in ways that may not show up on
your credit report.
E I G H T
For Additional Information
www.identitytheft.gov
CTS Financial Planning, Inc. (“CTS”) is an SEC registered investment adviser with its principal place of business in the State of Illinois. For additional information about CTS, please request our
disclosure brochure as set forth on Form ADV using the contact information set forth here in, or refer to the Investment Adviser Public Disclosure web site (www.adviserinfo.sec.gov). Please read the
disclosure statement carefully before you engage our firm for advisory services. Investing involves risk, including risk of loss.

More Related Content

What's hot

Scams 0710
Scams 0710Scams 0710
Scams 0710
KEIRO2
 
Writing Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft NoteWriting Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft Note
Chris Sleeper
 
Advice iq safeguards against id theft
Advice iq safeguards against id theftAdvice iq safeguards against id theft
Advice iq safeguards against id theft
Better Financial Education
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
legalshieldofficial
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
Vasundhara Singh Gautam
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
- Mark - Fullbright
 
How Organisation Can Fight Scam | CIO Advisor Apac
How Organisation Can Fight Scam | CIO Advisor Apac How Organisation Can Fight Scam | CIO Advisor Apac
How Organisation Can Fight Scam | CIO Advisor Apac
JackMathew4
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
- Mark - Fullbright
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
mullarkea
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
Rob Taylor
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
Lisa Sosebee
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
poojakalra10
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
Quicken Loans Zing Blog
 
Understanding Phishing E-Mail Scams
Understanding Phishing E-Mail ScamsUnderstanding Phishing E-Mail Scams
Understanding Phishing E-Mail Scams
John Poster
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
Springboard
 
SOME FACTS ABOUT IDENTITY THEFT AND TAXES - Advance Tax Relief
SOME FACTS ABOUT IDENTITY THEFT AND TAXES - Advance Tax ReliefSOME FACTS ABOUT IDENTITY THEFT AND TAXES - Advance Tax Relief
SOME FACTS ABOUT IDENTITY THEFT AND TAXES - Advance Tax Relief
NOAH DANIELS EA
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
mbachnak
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
hewie
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
ronwolfinger
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
efandeye
 

What's hot (20)

Scams 0710
Scams 0710Scams 0710
Scams 0710
 
Writing Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft NoteWriting Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft Note
 
Advice iq safeguards against id theft
Advice iq safeguards against id theftAdvice iq safeguards against id theft
Advice iq safeguards against id theft
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
How Organisation Can Fight Scam | CIO Advisor Apac
How Organisation Can Fight Scam | CIO Advisor Apac How Organisation Can Fight Scam | CIO Advisor Apac
How Organisation Can Fight Scam | CIO Advisor Apac
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Understanding Phishing E-Mail Scams
Understanding Phishing E-Mail ScamsUnderstanding Phishing E-Mail Scams
Understanding Phishing E-Mail Scams
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
SOME FACTS ABOUT IDENTITY THEFT AND TAXES - Advance Tax Relief
SOME FACTS ABOUT IDENTITY THEFT AND TAXES - Advance Tax ReliefSOME FACTS ABOUT IDENTITY THEFT AND TAXES - Advance Tax Relief
SOME FACTS ABOUT IDENTITY THEFT AND TAXES - Advance Tax Relief
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 

Similar to Identity Theft

Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
- Mark - Fullbright
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
- Mark - Fullbright
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
Sandy Kleinhenz
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
- Mark - Fullbright
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
- Mark - Fullbright
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Barry Caplin
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
Ron Drew
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Springboard
 
Fight Back Against Identity Theft 98160
Fight Back Against Identity Theft  98160Fight Back Against Identity Theft  98160
Fight Back Against Identity Theft 98160
Mindy W Gilbert 937.206.7973 megilbert@firstam.com
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
City of Griffin
 
Identity Theft
Identity TheftIdentity Theft
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
- Mark - Fullbright
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise Hunt
 
How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SIN
EmilyMoar
 
Identity theft
Identity theftIdentity theft
Identity theft
Muncie_Library
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
sarakr00
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
Randall Chesnutt
 
Guarding Vanderbilt information
Guarding Vanderbilt informationGuarding Vanderbilt information
Guarding Vanderbilt information
Vanderbilt University
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
- Mark - Fullbright
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Alan Greggo
 

Similar to Identity Theft (20)

Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Fight Back Against Identity Theft 98160
Fight Back Against Identity Theft  98160Fight Back Against Identity Theft  98160
Fight Back Against Identity Theft 98160
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
 
How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SIN
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Guarding Vanderbilt information
Guarding Vanderbilt informationGuarding Vanderbilt information
Guarding Vanderbilt information
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 

Recently uploaded

Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
Stephen Cashman
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Operational Excellence Consulting
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
CLIVE MINCHIN
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
SEOSMMEARTH
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 
Structural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for BuildingsStructural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for Buildings
Chandresh Chudasama
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 

Recently uploaded (20)

Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 
Structural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for BuildingsStructural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for Buildings
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 

Identity Theft

  • 1. IDENTITY THEFTHow It Works, How To Protect Yourself, 
 And What To Do If You Become A Victim
  • 2. You’ve spent years building, managing, and securing your financial life. Unfortunately, some people want to take the easy road, by “tapping in” and leveraging this hard work by illegally using your personal information for their own financial gain.
  • 3. 14.4 million Americans (5.56% of consumers) 
 had their identities stolen in 2018. Unfortunately, identity theft is quite common. https://www.javelinstrategy.com/coverage-area/2019-identity-fraud-report-fraudsters-seek-new-targets-and-victims-bear-brunt
  • 4. Conventional and Synthetic There are 2 basic identity theft strategies used today.
  • 5. ConventionalConventional With conventional identity theft, the criminal pretends to be you, gathering enough personal information so that the financial institution believes they are working with you.
  • 6. SyntheticSynthetic With synthetic identity theft, the criminal combines your real information with fake or “dummy” personal information, creating a new “synthetic” individual. This “synthetic” person then opens lines of credit using your information.
  • 7. SyntheticSynthetic Synthetic identity theft can be more challenging as the fraudulent activity does not show up on your account statements.
  • 8. Whether it’s a conventional or synthetic identity theft case, perpetrators need to collect your personal information to get started. There are 4 common tactics.
  • 9. Dumpster DivingDumpster Diving It’s a digital world, but we still receive a mountain of personal information in the mail each week. Dumpster diving continues to be a simple and effective way for criminals to access bank, credit card, and loan information.
  • 10. PhishingPhishing In this scheme, you actually take part in providing your personal information to identity thieves who pretend to be from a financial institution and call, email, or text to ask for personal information related to your account.
  • 11. HackingHacking Hacks can be very simple, like guessing your passwords, or much more complex, like installing keystroke loggers and malware on your computer.
  • 12. Data BreData Breaches In a data breach, a company that holds your personal information is hacked and your personal information is stolen.
  • 13. What to do if yoWhat to do if you are a Victim There are eight steps to take immediately that can help mitigate damage and get your financial life back on track.
  • 14. determine the loDetermine the location or status of the account breach. Quickly contact your financial institution and shut down any account that has been impacted. This may be an individual bank account or a credit card. O N E
  • 15. review statemenReview statements for fraudulent activity Connect with every institution that you do business with, and request six months’ worth of transactional statements. Look for fraudulent charges that you might have missed. T W O
  • 16. get a current copGet a current copy of your credit report The most important thing to look for is new lines of credit that were opened by a perpetrator. T H R E E
  • 17. report the crimeReport the crime to the Federal Trade Commission (FTC) You will want a paper trail that documents the fraud, and the first step is to file a report with the FTC at www.identitytheft.gov. The FTC will provide you with a plan for recovery and letters that can be used when working with the police. F O U R
  • 18. file a police repoFile a police report It’s likely that the person or group that stole your identity doesn’t live in your home town, so the police may have limited ability to prosecute. However, this can help strengthen your paper trail and may help others. Be ready for a few bureaucratic hoops, as it may be unclear which jurisdiction or law enforcement agency should handle your case.   F I V E
  • 19. file a fraud alertFile a fraud alert on your credit reports Once you’ve filed reports with the FTC and local police, it’s time to circle around with the credit agencies. Placing a fraud alert on your credit score will last for 90 days and notifies financial institutions that your identity has been compromised. This means that they will take extra precautions when opening new accounts in your name. S I X
  • 20. work with instateWork with institutions on a path forward. Call the fraud department of each business and request that they close the account. Send each business a copy of your Identity Theft Report and/or dispute form along with a letter of explanation, and work with them to determine what steps need to be taken to secure your accounts. Ask for a letter confirming that the account was fraudulent, that you are not liable for it, and that it has been removed from your credit report. S E V E N
  • 21. file a fraud alertStay Vigilant Unfortunately, once your identity has been compromised it becomes more likely that it will happen again. Consider signing up for identity monitoring alerts when your personal information – like your bank account information, social security number, driver’s license, passport or medical ID number – is being used in ways that may not show up on your credit report. E I G H T
  • 22. For Additional Information www.identitytheft.gov CTS Financial Planning, Inc. (“CTS”) is an SEC registered investment adviser with its principal place of business in the State of Illinois. For additional information about CTS, please request our disclosure brochure as set forth on Form ADV using the contact information set forth here in, or refer to the Investment Adviser Public Disclosure web site (www.adviserinfo.sec.gov). Please read the disclosure statement carefully before you engage our firm for advisory services. Investing involves risk, including risk of loss.