SlideShare a Scribd company logo
Certified Risk Management Consultant
• Protecting Families, Finances and Your Future •
Sponsored by Harvard Risk Management Corporation © 2013
Harvard Risk Management Corporation invites you to participate in a complimentary
webinar entitled Identity Theft in the Workplace and its Impact on HR. Mr. Kris Evans, a
Certified Risk Management Consultant, is a national expert on identity theft and corporate
data breaches. During this webinar, Mr. Evans will be discussing how this growing crime
is affecting businesses and their employees. Never before has there been a greater need for
HR professionals to understand identity theft and its impact on the workplace.
 ID theft is one of the fastest growing crimes
in the US.
 There are over 27,000 victims EVERY DAY!
 Every year businesses lose millions of dollars
because of identity theft and data breaches.
 The average cost of a data breach is 7.2
million dollars, up seven percent from last
year.
 There are five major types of identity theft.
 The average victim spends over 600 hours
in the process of restoration.
 Over three million children have already
become a victim of identity theft.
 Identity theft education can save employers
and employees thousands of dollars in
potential losses.
Register now at:
use access code:
Kris Evans
Nashville, TN
CRMC
IDT 265542
Anthony "Tony" Morales
Certified Risk Management Consultant: Cell Phone
(832) 593-3914:

More Related Content

Viewers also liked

Identity Theft Coverage - How are Insurers Protecting Their Customers
Identity Theft Coverage - How are Insurers Protecting Their CustomersIdentity Theft Coverage - How are Insurers Protecting Their Customers
Identity Theft Coverage - How are Insurers Protecting Their Customers
Corporate Insight
 
Guide for Assisting Identity Theft Victims
Guide for Assisting Identity Theft VictimsGuide for Assisting Identity Theft Victims
Guide for Assisting Identity Theft Victims
- Mark - Fullbright
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
Rob Taylor
 
Identity Theft Protection From Legalshield
Identity Theft Protection From LegalshieldIdentity Theft Protection From Legalshield
Identity Theft Protection From Legalshield
Rob Taylor
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Blinsink
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
Herring Consulting & Financial Group
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
- Mark - Fullbright
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
Ron Drew
 
Protecting Families, Finances, and Your Future
Protecting Families, Finances, and Your FutureProtecting Families, Finances, and Your Future
Protecting Families, Finances, and Your Future
Max Charles Alperstein
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
paulgundersen9
 
Understanding victims of identity theft
Understanding victims of identity theftUnderstanding victims of identity theft
Understanding victims of identity theft
savelkoul
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
Experian_US
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
ronwolfinger
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
Lisa Sosebee
 
PrePaid Legal Life Events Legal Plan, Legal Shield, Identity Theft Shield and...
PrePaid Legal Life Events Legal Plan, Legal Shield, Identity Theft Shield and...PrePaid Legal Life Events Legal Plan, Legal Shield, Identity Theft Shield and...
PrePaid Legal Life Events Legal Plan, Legal Shield, Identity Theft Shield and...
paulgundersen9
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
Rob Taylor
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
- Mark - Fullbright
 

Viewers also liked (17)

Identity Theft Coverage - How are Insurers Protecting Their Customers
Identity Theft Coverage - How are Insurers Protecting Their CustomersIdentity Theft Coverage - How are Insurers Protecting Their Customers
Identity Theft Coverage - How are Insurers Protecting Their Customers
 
Guide for Assisting Identity Theft Victims
Guide for Assisting Identity Theft VictimsGuide for Assisting Identity Theft Victims
Guide for Assisting Identity Theft Victims
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity Theft Protection From Legalshield
Identity Theft Protection From LegalshieldIdentity Theft Protection From Legalshield
Identity Theft Protection From Legalshield
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Protecting Families, Finances, and Your Future
Protecting Families, Finances, and Your FutureProtecting Families, Finances, and Your Future
Protecting Families, Finances, and Your Future
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Understanding victims of identity theft
Understanding victims of identity theftUnderstanding victims of identity theft
Understanding victims of identity theft
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
PrePaid Legal Life Events Legal Plan, Legal Shield, Identity Theft Shield and...
PrePaid Legal Life Events Legal Plan, Legal Shield, Identity Theft Shield and...PrePaid Legal Life Events Legal Plan, Legal Shield, Identity Theft Shield and...
PrePaid Legal Life Events Legal Plan, Legal Shield, Identity Theft Shield and...
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 

Similar to IDT Webinar Flyer Anthony (1)

Harvard Risk Management Corporation: 2014 Benefits Presentation
Harvard Risk Management Corporation: 2014 Benefits PresentationHarvard Risk Management Corporation: 2014 Benefits Presentation
Harvard Risk Management Corporation: 2014 Benefits Presentation
James Snow
 
Equifax Data Breach
Equifax Data BreachEquifax Data Breach
Life Lock Customer Selling
Life Lock Customer SellingLife Lock Customer Selling
Life Lock Customer Selling
Charles Seay
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
- Mark - Fullbright
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
Case IQ
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
 
Risky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and TomorrowRisky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Digiliti Money
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
CBIZ, Inc.
 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overview
bpeacher
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
Declan Winston Ramsaran
 
HRs emerging role in workplace violence prevention
HRs emerging role in workplace violence preventionHRs emerging role in workplace violence prevention
HRs emerging role in workplace violence prevention
Rnelson881_2
 
Cyber Security Protection
Cyber Security ProtectionCyber Security Protection
Cyber Security Protection
Mark Cook
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyID
jonaspatrick12
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
Bala Guntipalli ♦ MBA
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Peter1020
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
DWP Information Architects Inc.
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
Inspiring Women
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
Guise Bule
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
Wynyard Group
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Randall Chase
 

Similar to IDT Webinar Flyer Anthony (1) (20)

Harvard Risk Management Corporation: 2014 Benefits Presentation
Harvard Risk Management Corporation: 2014 Benefits PresentationHarvard Risk Management Corporation: 2014 Benefits Presentation
Harvard Risk Management Corporation: 2014 Benefits Presentation
 
Equifax Data Breach
Equifax Data BreachEquifax Data Breach
Equifax Data Breach
 
Life Lock Customer Selling
Life Lock Customer SellingLife Lock Customer Selling
Life Lock Customer Selling
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Risky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and TomorrowRisky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and Tomorrow
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overview
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
HRs emerging role in workplace violence prevention
HRs emerging role in workplace violence preventionHRs emerging role in workplace violence prevention
HRs emerging role in workplace violence prevention
 
Cyber Security Protection
Cyber Security ProtectionCyber Security Protection
Cyber Security Protection
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyID
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 

IDT Webinar Flyer Anthony (1)

  • 1. Certified Risk Management Consultant • Protecting Families, Finances and Your Future • Sponsored by Harvard Risk Management Corporation © 2013 Harvard Risk Management Corporation invites you to participate in a complimentary webinar entitled Identity Theft in the Workplace and its Impact on HR. Mr. Kris Evans, a Certified Risk Management Consultant, is a national expert on identity theft and corporate data breaches. During this webinar, Mr. Evans will be discussing how this growing crime is affecting businesses and their employees. Never before has there been a greater need for HR professionals to understand identity theft and its impact on the workplace.  ID theft is one of the fastest growing crimes in the US.  There are over 27,000 victims EVERY DAY!  Every year businesses lose millions of dollars because of identity theft and data breaches.  The average cost of a data breach is 7.2 million dollars, up seven percent from last year.  There are five major types of identity theft.  The average victim spends over 600 hours in the process of restoration.  Over three million children have already become a victim of identity theft.  Identity theft education can save employers and employees thousands of dollars in potential losses. Register now at: use access code: Kris Evans Nashville, TN CRMC IDT 265542 Anthony "Tony" Morales Certified Risk Management Consultant: Cell Phone (832) 593-3914: