SlideShare a Scribd company logo
1 of 44
Identity Theft
Protecting Your Personal Data
Eastham Public Library
March 2018
“Identity Theft Is Becoming the Third Certainty in Life.
It’s Prevalent, It’s Getting Worse.”
Adam K. Levin
Former Director, New Jersey Office of Consumer Affairs
At Some Point In Our Lives
Most Of Us Will Experience It To Some Degree.
WHAT MAKES UP YOUR IDENTITY?
IT’S YOUR PERSONALLY IDENTIFYING INFORMATION
• Name, Address
• Date of Birth
• Email Address
• Passport Number
• Biometrics
• Facial Recognition, Fingerprints, Retina Scanning, Voice
Recognition
• SOCIAL SECURITY NUMBER
Think For A Moment About All The Places This PDI May Be Stored!
There Are Many Things We Can Do To Protect Ourselves.
Some Are Easy, Others Are More Complicated.
We Should Do The Easy Things Diligently.
We Should Consider Which of the Complicated Things
Are Necessary For Our Lifestyle.
We Should Each Have In Place
A System of Data Protection
That Fits Our Lifestyle.
BOTH OFFLINE AND ONLINE ACTIONS CAN RESULT IN IDENTITY
THEFT OR DIRECT THEFT OF YOUR MONEY
DETECTIVE SERGEANT ADAM BOHANNON WILL FOCUS ON SCAMS THAT
ATTEMPT TO STEAL FROM YOU DIRECTLY ON APRIL 10
THIS PRESENTATION WILL FOCUS ON ONLINE
CAPTURE AND USE AND OF YOUR PERSONAL DATA
WHICH CAN LEAD TO ANNOYANCE AND
THEFT OF YOUR IDENTITY
WHAT WE’RE GOING TO DISCUSS TODAY
• Protecting Your Data From Tracking, Abuse and Theft
• Techniques And Tools For Protection In A Connected World
• A Few ‘Roberts Rules’ For Protecting Yourself, Your Devices
The Word ‘Online’ Chosen To Include
Internet, Mobile And Other Connected Devices
All Of This Applies to Both Internet And Mobile
• Most Of Your Account Settings Carry Over To Mobile
• Mobile Less Likely To Have Viruses and Malware
• Sadly, That Is Beginning To Change
WARNING SIGNS OF A VIRUS ON A MOBILE DEVICE
• Unwarranted Increase In Data Use
• Apps Crashing
• Pop-Up Ads Appearing Frequently
• App You Are Not Aware of Downloading (Don’t Open!)
• Significant Drop in Battery Life
You May Have To Format Your Phone
Ask Your Mobile Provider For Help!
!! MOST IMPORTANT-KEEP SETTINGS UPDATED !!
ALSO
• Turn On 2-Factor Authentication
• Enable Passcode In Case Phone
Lost Or Stolen (Each Sign-in)
• Both Protect Your Phone Number
• Don’t Download Unknown Apps
• Don’t Click On Unknown Links
PROTECTING THE DATA THAT’S ALREADY OUT THERE
Businesses
Health Care Providers, Financial Services Firms
Government
Educational Institutions
Charitable Organizations
According to Privacy Rights Clearinghouse
10,062,681,966 Accounts were Compromised in 2017
2017
• Equifax
• Recent info says tax and driver’s
license numbers as well as email
• Verizon
• Columbia Falls, Montana
• Indiana Medicaid, PA Women’s
Health Center, Washington St. U
Prior
• Yahoo (2013; Revealed 2016)
• Uber (2016)
• eBay (2014)
• Target (2013)
READ PRIVACY POLICIES
• On Websites
• When Mailed
• Financial Services, Health Care
• Pay Attention to Privacy Notices
If You Set Up Accounts--
With Retailers for Example—
Don’t Save Your Credit Card Number.
PREVENTING ADVERTISERS AND OTHERS
FROM TRACKING YOU
HOW IMPORTANT TO PREVENT EMAIL TRACKING?
• DO Protect Your Email Account
• 2 Step Verification (Every Sign In)
• 2 Factor Authentication
(When Account Changes Made)
• Should You Protect Your Email Content?
• Never Send Sensitive Information By Email
• Account Numbers, Passwords, etc.
• Then Don’t Worry About Encryption
PROTECTING YOURSELF WHILE BROWSING THE WEB
• There Are A Number Of Browser Extensions That Block Ads
• Some Are Open Source And Free
• All Work Differently/Work On Various Browsers
• Google Chrome Has A New Blocker
• Adblock Plus, Disconnect, Ublock Origin, Ghostery
• Protecting Against ISP Selling Web Use Data—Explained On
Privacy Policy
• HTTPS Everywhere
• Use a VPN
• Adjust DNS—Fairly Technical
• Will ISP Block Your Service If You Use Any Of These?
PROTECTING YOURSELF FROM UNWANTED PHONE CALLS
NOT ONLY ANNOYING, THEY ARE OFTEN SCAMMING
• Stopping Robo Calls on Your Land Line
• Sign Up For The Do Not Call Registry (FCC)
• Nomorobo
• Stopping Robo Calls on Your Smart Phone
• Most Carriers Offer An App To Block Robo Calls
PROTECTING YOUR DATA ON THE WEB
A Virtual Public Network Is A Secure Private Network Built
On Public Infrastructure (The Web).
It Encrypts The Data Traveling Over The Network
And Adds Other Security Measures.
Use A Highly Rated One.
Most Have Free Trials, Even Free Plans, For Low Volume
Users.
ROBERTS’ RULES FOR FINDING A GOOD VPN—
OR ANY OTHER INTERNET TOOL
• Search “The Best”
• Consider Adding The Current Year To Your Search Term
• Read The Reviews
• In 2018 Don’t Consider Reviews Written Before 2017
• Choose The Tool That Best Meets Your Needs And Lifestyle
• Download The Tool
• Follow Instructions
• Carefully Examine The Settings
https://youtu.be/iynVbynSwOg
There Is Also The Tor Browser
It Uses Technology
That Significantly Slows Your Browsing
PREVENTING THEFT OF YOUR DATA
THE IMPORTANCE OF STRONG PASSWORDS
CANNOT BE OVERSTATED
• Never Reuse Passwords
• Passwords Should Be Long, Strong and Complex
• Don’t Use Obvious Terms—Address, Birthday, Children, Pets, etc.
• Be Careful Where You Store Them
• Use Multi-Factor Authentication Whenever Possible
TOO MUCH TROUBLE, RIGHT???
THERE IS AN ANSWER—
AN EFFECTIVE PASSWORD MANAGER!
A PASSWORD MANAGER HAS SEVERAL FUNCTIONS
• Secure Way To Keep Track Of All Your Passwords
• Can Build Strong Passwords For All Your Accounts
• Can Automatically Sign You Into Many Accounts
• Can Store Credit Card Info, Making Purchasing Online (Too?) Easy
• 1Password Can Now Determine If Your Password Has Been pwned (defeated)
• Again, Choose Carefully (Roberts’ Rules)
SECURITY PROGRAM ESSENTIAL
• Virus Protection
• Firewall
• Other Features
• Parental Controls; Gaming Protection; Protect Email Against
Spam, Spyware, Phishing
• Most ISPs Offer Free Security Program
• If You Choose Your Own, Use A Paid Program
MOST DATA THEFT IS RESULT OF SOME TYPE OF MALWARE
• “All The Bad Stuff”
• Viruses And More
• Good Security Program Will Get Most
• A Good Anti-Malware Package Will Catch A Few More
• There Are Free Versions
FOR SERIOUS PROBLEMS, HAVE YOUR COMPUTER PROFESSIONALLY CLEANED.
Potentially Unwanted Program
WHAT ABOUT THIRD-PARTY
IDENTITY PROTECTION SERVICES?
PROTECTING YOURSELF IN A CONNECTED WORLD
Anything Connected To The Internet Is Capable of
Collecting And Transmitting Data.
The Questions Are ‘What Data,’ ‘What Uses?’
If It’s Free, There’s A High Probability the App/Tool is Collecting Data.
This Also Applies To Advertising Supported Sites.
Anything Data Stored, By Any Service, Is Susceptible To Hacking.
ITEMS IN YOUR HOME THAT COLLECT DATA
THE QUESTION IS—DO THEY STORE IT, SELL IT?
HOW TO PROTECT YOUR ‘SMART HOME’ SYSTEM
• ALWAYS Change The Default Password Of Any New Device
• Update All Security Settings on Devices, Even New Ones
• Be Thoughtful About The Maker Of The Product
• Be Wary Of Public Wi-Fi
• Study The Settings Of Your Device--Can Do, Can’t Do
• Put Connected Devices on Separate Network From
Computer, Phone
Dojo By BullGuard Monitors A Home System
• Should Be Approved By One Of FTC-Approved Watchdogs
• Search Online, Especially News
• Read Privacy Policy Carefully
• If Third Parties Involved In Data Handling, Research Them
• Connect Toys Only To Secure Wi-Fi
• If It Uses Bluetooth, That Should Require PINs, Passwords
• Data Transmission To Wi-Fi Should Be Encrypted
• If It Can Receive Updates, Security Patches, Keep Them
Updated
How Old Should Children Be To Have A Toy With Such Capabilities?
• Devices Can Not Only Listen To You, The TV, But Potentially
All Conversations Within Range
• Use Voice Recognition
• Use A PIN With The Purchasing Function
• Recordings Are Sent To Storage; Listen And Then Delete Them
• Don’t Connect Speaker To Home Security - Smart Door Locks, etc.
• Don’t Store Sensitive Info – Bank Account, Credit Card, etc.
• Mute It When Leaving For Long Period Of Time
SOME MORE OF ROBERTS’ RULES
FOR LIVING SAFELY IN A CONNECTED WORLD
THE ESSENTIALS
• First, Think Carefully About How Connected You Want To Be
• Then Think About Who You Want To Share With
• Think About How Devices Can Make Your Life Safer, More
Convenient, More Enjoyable
• Add The Security Features That Fit Your Life
NEVER MAKE TWO CHANGES TO YOUR SYSTEM AT ONCE!
MAKE A CHANGE, WAIT A COUPLE OF WEEKS TO BE SURE IT’S
WORKING, THEN MAKE ANOTHER CHANGE.
THEN THINK ABOUT ADD-ONS
• Be Careful About Devices That Say They’ll Solve All Problems
• Don’t Believe Promises Unless They Are Backed In Writing
• Do You Know And Trust The Company?
• Don’t Throw Money At Unnecessary Solutions
• Do Your Own Homework – Especially Before Hiring Someone
Don’t Be Afraid To Call In Professional Help When Needed!
THANK YOU!
AND NOW FOR QUESTIONS!

More Related Content

What's hot

It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Deepak Khari
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationGoutama Bachtiar
 
Information security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaInformation security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaChandan Singh Ghodela
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technicalStephen Cobb
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Security In A Connected Society
Security In A Connected SocietySecurity In A Connected Society
Security In A Connected SocietyCentraComm
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crimevishalgohel12195
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessJohann Lo
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 

What's hot (20)

It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
Cyber security
Cyber security Cyber security
Cyber security
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
What is data privacy?
What is data privacy?What is data privacy?
What is data privacy?
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and Investigation
 
Information security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaInformation security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh Ghodela
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Security In A Connected Society
Security In A Connected SocietySecurity In A Connected Society
Security In A Connected Society
 
Dangers of Computer devices
Dangers of Computer devices Dangers of Computer devices
Dangers of Computer devices
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 

Similar to Protecting Yourself From Data and Identity Theft

Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)ameyjakate
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miismcgilla
 

Similar to Protecting Yourself From Data and Identity Theft (20)

Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 

More from Mary Lou Roberts

Organic Vegetable Gardening
Organic Vegetable GardeningOrganic Vegetable Gardening
Organic Vegetable GardeningMary Lou Roberts
 
Growing Berries and Small Fruits on Cape Cod
Growing Berries and Small Fruits on Cape CodGrowing Berries and Small Fruits on Cape Cod
Growing Berries and Small Fruits on Cape CodMary Lou Roberts
 
Wellfleet Harbor And Dermo
Wellfleet Harbor And DermoWellfleet Harbor And Dermo
Wellfleet Harbor And DermoMary Lou Roberts
 
Wellfleet’S Other Salt Marshes
Wellfleet’S Other Salt MarshesWellfleet’S Other Salt Marshes
Wellfleet’S Other Salt MarshesMary Lou Roberts
 
Science In The Cape Cod National Seashore
Science In The Cape Cod National SeashoreScience In The Cape Cod National Seashore
Science In The Cape Cod National SeashoreMary Lou Roberts
 
Herring River Restoration Project
Herring River Restoration ProjectHerring River Restoration Project
Herring River Restoration ProjectMary Lou Roberts
 
Investigation Of Common Eider Mortailty Events At Cape Cod Ellis, Courchesne...
Investigation Of Common Eider Mortailty Events At Cape Cod  Ellis, Courchesne...Investigation Of Common Eider Mortailty Events At Cape Cod  Ellis, Courchesne...
Investigation Of Common Eider Mortailty Events At Cape Cod Ellis, Courchesne...Mary Lou Roberts
 

More from Mary Lou Roberts (11)

Organic Vegetable Gardening
Organic Vegetable GardeningOrganic Vegetable Gardening
Organic Vegetable Gardening
 
Growing Berries and Small Fruits on Cape Cod
Growing Berries and Small Fruits on Cape CodGrowing Berries and Small Fruits on Cape Cod
Growing Berries and Small Fruits on Cape Cod
 
Birding With Henry Beston
Birding With Henry BestonBirding With Henry Beston
Birding With Henry Beston
 
Monitoring Cape Cod Bay
Monitoring Cape Cod BayMonitoring Cape Cod Bay
Monitoring Cape Cod Bay
 
Wellfleet Harbor And Dermo
Wellfleet Harbor And DermoWellfleet Harbor And Dermo
Wellfleet Harbor And Dermo
 
Wellfleet’S Other Salt Marshes
Wellfleet’S Other Salt MarshesWellfleet’S Other Salt Marshes
Wellfleet’S Other Salt Marshes
 
Science In The Cape Cod National Seashore
Science In The Cape Cod National SeashoreScience In The Cape Cod National Seashore
Science In The Cape Cod National Seashore
 
Wastewater on Cape Cod
Wastewater on Cape CodWastewater on Cape Cod
Wastewater on Cape Cod
 
Herring River Restoration Project
Herring River Restoration ProjectHerring River Restoration Project
Herring River Restoration Project
 
Management of Alewife
Management of AlewifeManagement of Alewife
Management of Alewife
 
Investigation Of Common Eider Mortailty Events At Cape Cod Ellis, Courchesne...
Investigation Of Common Eider Mortailty Events At Cape Cod  Ellis, Courchesne...Investigation Of Common Eider Mortailty Events At Cape Cod  Ellis, Courchesne...
Investigation Of Common Eider Mortailty Events At Cape Cod Ellis, Courchesne...
 

Recently uploaded

Ladies kitty party invitation messages and greetings.pdf
Ladies kitty party invitation messages and greetings.pdfLadies kitty party invitation messages and greetings.pdf
Ladies kitty party invitation messages and greetings.pdfShort Good Quotes
 
Style Victorious Cute Outfits for Winners
Style Victorious Cute Outfits for WinnersStyle Victorious Cute Outfits for Winners
Style Victorious Cute Outfits for Winnersolva0212
 
Top 10 Moisturising Cream Brands In India - Stelon Biotech
Top 10 Moisturising Cream Brands In India - Stelon BiotechTop 10 Moisturising Cream Brands In India - Stelon Biotech
Top 10 Moisturising Cream Brands In India - Stelon BiotechStelon Biotech
 
Lesotho history, Basotho languages, Basotho mode of transport
Lesotho history, Basotho languages, Basotho mode of transportLesotho history, Basotho languages, Basotho mode of transport
Lesotho history, Basotho languages, Basotho mode of transporttobatsitlotliso004
 
UNIVERSAL HUMAN VALUES - INTRODUCTION TO VALUE EDUCATION
 UNIVERSAL HUMAN VALUES - INTRODUCTION TO VALUE EDUCATION UNIVERSAL HUMAN VALUES - INTRODUCTION TO VALUE EDUCATION
UNIVERSAL HUMAN VALUES - INTRODUCTION TO VALUE EDUCATIONChandrakantDivate1
 
2024_Rupantara Jogare Namajapa II Nishitharanjan
2024_Rupantara Jogare Namajapa II Nishitharanjan2024_Rupantara Jogare Namajapa II Nishitharanjan
2024_Rupantara Jogare Namajapa II NishitharanjanNishitharanjan Rout
 
Shining Bright: Diya Jain Represents Delhi As Miss Teen India Finalist-2024
Shining Bright: Diya Jain Represents Delhi As Miss Teen India Finalist-2024Shining Bright: Diya Jain Represents Delhi As Miss Teen India Finalist-2024
Shining Bright: Diya Jain Represents Delhi As Miss Teen India Finalist-2024DK PAGEANT
 
UNIVERSAL HUMAN VALUES - Harmony in the Family and Society
UNIVERSAL HUMAN VALUES - Harmony in the Family and SocietyUNIVERSAL HUMAN VALUES - Harmony in the Family and Society
UNIVERSAL HUMAN VALUES - Harmony in the Family and SocietyChandrakantDivate1
 
SINGLE PARENTS LONE PARENTHOOD: RESPONSIBILITY
SINGLE PARENTS LONE PARENTHOOD: RESPONSIBILITYSINGLE PARENTS LONE PARENTHOOD: RESPONSIBILITY
SINGLE PARENTS LONE PARENTHOOD: RESPONSIBILITYNgcNguyn951014
 
Navigating Hypnotherapy Training: 7 Essential Considerations
Navigating Hypnotherapy Training: 7 Essential ConsiderationsNavigating Hypnotherapy Training: 7 Essential Considerations
Navigating Hypnotherapy Training: 7 Essential Considerationsrenewed edge
 
"Paltr Packaging: Streamlined Order Process for Seamless Deliveries"
"Paltr Packaging: Streamlined Order Process for Seamless Deliveries""Paltr Packaging: Streamlined Order Process for Seamless Deliveries"
"Paltr Packaging: Streamlined Order Process for Seamless Deliveries"Aarisha Shaikh
 
UNIVERSAL HUMAN VALUES -Harmony in the Human Being
UNIVERSAL HUMAN VALUES -Harmony in the Human BeingUNIVERSAL HUMAN VALUES -Harmony in the Human Being
UNIVERSAL HUMAN VALUES -Harmony in the Human BeingChandrakantDivate1
 
PRINCESS OF DESIRE: MISADVENTURES OF A YOUNG GIRL
PRINCESS OF DESIRE:  MISADVENTURES OF A YOUNG GIRLPRINCESS OF DESIRE:  MISADVENTURES OF A YOUNG GIRL
PRINCESS OF DESIRE: MISADVENTURES OF A YOUNG GIRLmarianasoeiro3
 
Call Girls In I.G.I Airport ( DELHI ) Contract US | , 8377O876O7
Call Girls In I.G.I Airport ( DELHI ) Contract US | , 8377O876O7Call Girls In I.G.I Airport ( DELHI ) Contract US | , 8377O876O7
Call Girls In I.G.I Airport ( DELHI ) Contract US | , 8377O876O7dollysharma2066
 
Borivali Escorts Service, 7738596112 Sakinaka Call Girls, Marol Call Girls
Borivali Escorts Service, 7738596112 Sakinaka Call Girls, Marol Call GirlsBorivali Escorts Service, 7738596112 Sakinaka Call Girls, Marol Call Girls
Borivali Escorts Service, 7738596112 Sakinaka Call Girls, Marol Call Girlsmitaliverma221
 

Recently uploaded (16)

Ladies kitty party invitation messages and greetings.pdf
Ladies kitty party invitation messages and greetings.pdfLadies kitty party invitation messages and greetings.pdf
Ladies kitty party invitation messages and greetings.pdf
 
Style Victorious Cute Outfits for Winners
Style Victorious Cute Outfits for WinnersStyle Victorious Cute Outfits for Winners
Style Victorious Cute Outfits for Winners
 
Top 10 Moisturising Cream Brands In India - Stelon Biotech
Top 10 Moisturising Cream Brands In India - Stelon BiotechTop 10 Moisturising Cream Brands In India - Stelon Biotech
Top 10 Moisturising Cream Brands In India - Stelon Biotech
 
Lesotho history, Basotho languages, Basotho mode of transport
Lesotho history, Basotho languages, Basotho mode of transportLesotho history, Basotho languages, Basotho mode of transport
Lesotho history, Basotho languages, Basotho mode of transport
 
UNIVERSAL HUMAN VALUES - INTRODUCTION TO VALUE EDUCATION
 UNIVERSAL HUMAN VALUES - INTRODUCTION TO VALUE EDUCATION UNIVERSAL HUMAN VALUES - INTRODUCTION TO VALUE EDUCATION
UNIVERSAL HUMAN VALUES - INTRODUCTION TO VALUE EDUCATION
 
2024_Rupantara Jogare Namajapa II Nishitharanjan
2024_Rupantara Jogare Namajapa II Nishitharanjan2024_Rupantara Jogare Namajapa II Nishitharanjan
2024_Rupantara Jogare Namajapa II Nishitharanjan
 
Shining Bright: Diya Jain Represents Delhi As Miss Teen India Finalist-2024
Shining Bright: Diya Jain Represents Delhi As Miss Teen India Finalist-2024Shining Bright: Diya Jain Represents Delhi As Miss Teen India Finalist-2024
Shining Bright: Diya Jain Represents Delhi As Miss Teen India Finalist-2024
 
UNIVERSAL HUMAN VALUES - Harmony in the Family and Society
UNIVERSAL HUMAN VALUES - Harmony in the Family and SocietyUNIVERSAL HUMAN VALUES - Harmony in the Family and Society
UNIVERSAL HUMAN VALUES - Harmony in the Family and Society
 
SINGLE PARENTS LONE PARENTHOOD: RESPONSIBILITY
SINGLE PARENTS LONE PARENTHOOD: RESPONSIBILITYSINGLE PARENTS LONE PARENTHOOD: RESPONSIBILITY
SINGLE PARENTS LONE PARENTHOOD: RESPONSIBILITY
 
Navigating Hypnotherapy Training: 7 Essential Considerations
Navigating Hypnotherapy Training: 7 Essential ConsiderationsNavigating Hypnotherapy Training: 7 Essential Considerations
Navigating Hypnotherapy Training: 7 Essential Considerations
 
"Paltr Packaging: Streamlined Order Process for Seamless Deliveries"
"Paltr Packaging: Streamlined Order Process for Seamless Deliveries""Paltr Packaging: Streamlined Order Process for Seamless Deliveries"
"Paltr Packaging: Streamlined Order Process for Seamless Deliveries"
 
UNIVERSAL HUMAN VALUES -Harmony in the Human Being
UNIVERSAL HUMAN VALUES -Harmony in the Human BeingUNIVERSAL HUMAN VALUES -Harmony in the Human Being
UNIVERSAL HUMAN VALUES -Harmony in the Human Being
 
@Abortion clinic tablets Kuwait (+918133066128) Abortion Pills IN Kuwait
@Abortion clinic tablets Kuwait (+918133066128) Abortion Pills IN Kuwait@Abortion clinic tablets Kuwait (+918133066128) Abortion Pills IN Kuwait
@Abortion clinic tablets Kuwait (+918133066128) Abortion Pills IN Kuwait
 
PRINCESS OF DESIRE: MISADVENTURES OF A YOUNG GIRL
PRINCESS OF DESIRE:  MISADVENTURES OF A YOUNG GIRLPRINCESS OF DESIRE:  MISADVENTURES OF A YOUNG GIRL
PRINCESS OF DESIRE: MISADVENTURES OF A YOUNG GIRL
 
Call Girls In I.G.I Airport ( DELHI ) Contract US | , 8377O876O7
Call Girls In I.G.I Airport ( DELHI ) Contract US | , 8377O876O7Call Girls In I.G.I Airport ( DELHI ) Contract US | , 8377O876O7
Call Girls In I.G.I Airport ( DELHI ) Contract US | , 8377O876O7
 
Borivali Escorts Service, 7738596112 Sakinaka Call Girls, Marol Call Girls
Borivali Escorts Service, 7738596112 Sakinaka Call Girls, Marol Call GirlsBorivali Escorts Service, 7738596112 Sakinaka Call Girls, Marol Call Girls
Borivali Escorts Service, 7738596112 Sakinaka Call Girls, Marol Call Girls
 

Protecting Yourself From Data and Identity Theft

  • 1. Identity Theft Protecting Your Personal Data Eastham Public Library March 2018
  • 2. “Identity Theft Is Becoming the Third Certainty in Life. It’s Prevalent, It’s Getting Worse.” Adam K. Levin Former Director, New Jersey Office of Consumer Affairs At Some Point In Our Lives Most Of Us Will Experience It To Some Degree.
  • 3. WHAT MAKES UP YOUR IDENTITY? IT’S YOUR PERSONALLY IDENTIFYING INFORMATION • Name, Address • Date of Birth • Email Address • Passport Number • Biometrics • Facial Recognition, Fingerprints, Retina Scanning, Voice Recognition • SOCIAL SECURITY NUMBER Think For A Moment About All The Places This PDI May Be Stored!
  • 4. There Are Many Things We Can Do To Protect Ourselves. Some Are Easy, Others Are More Complicated. We Should Do The Easy Things Diligently. We Should Consider Which of the Complicated Things Are Necessary For Our Lifestyle.
  • 5. We Should Each Have In Place A System of Data Protection That Fits Our Lifestyle.
  • 6. BOTH OFFLINE AND ONLINE ACTIONS CAN RESULT IN IDENTITY THEFT OR DIRECT THEFT OF YOUR MONEY DETECTIVE SERGEANT ADAM BOHANNON WILL FOCUS ON SCAMS THAT ATTEMPT TO STEAL FROM YOU DIRECTLY ON APRIL 10 THIS PRESENTATION WILL FOCUS ON ONLINE CAPTURE AND USE AND OF YOUR PERSONAL DATA WHICH CAN LEAD TO ANNOYANCE AND THEFT OF YOUR IDENTITY
  • 7. WHAT WE’RE GOING TO DISCUSS TODAY • Protecting Your Data From Tracking, Abuse and Theft • Techniques And Tools For Protection In A Connected World • A Few ‘Roberts Rules’ For Protecting Yourself, Your Devices
  • 8. The Word ‘Online’ Chosen To Include Internet, Mobile And Other Connected Devices All Of This Applies to Both Internet And Mobile • Most Of Your Account Settings Carry Over To Mobile • Mobile Less Likely To Have Viruses and Malware • Sadly, That Is Beginning To Change
  • 9. WARNING SIGNS OF A VIRUS ON A MOBILE DEVICE • Unwarranted Increase In Data Use • Apps Crashing • Pop-Up Ads Appearing Frequently • App You Are Not Aware of Downloading (Don’t Open!) • Significant Drop in Battery Life You May Have To Format Your Phone Ask Your Mobile Provider For Help!
  • 10. !! MOST IMPORTANT-KEEP SETTINGS UPDATED !! ALSO • Turn On 2-Factor Authentication • Enable Passcode In Case Phone Lost Or Stolen (Each Sign-in) • Both Protect Your Phone Number • Don’t Download Unknown Apps • Don’t Click On Unknown Links
  • 11. PROTECTING THE DATA THAT’S ALREADY OUT THERE Businesses Health Care Providers, Financial Services Firms Government Educational Institutions Charitable Organizations
  • 12. According to Privacy Rights Clearinghouse 10,062,681,966 Accounts were Compromised in 2017 2017 • Equifax • Recent info says tax and driver’s license numbers as well as email • Verizon • Columbia Falls, Montana • Indiana Medicaid, PA Women’s Health Center, Washington St. U Prior • Yahoo (2013; Revealed 2016) • Uber (2016) • eBay (2014) • Target (2013)
  • 13.
  • 14.
  • 15. READ PRIVACY POLICIES • On Websites • When Mailed • Financial Services, Health Care • Pay Attention to Privacy Notices
  • 16. If You Set Up Accounts-- With Retailers for Example— Don’t Save Your Credit Card Number.
  • 17. PREVENTING ADVERTISERS AND OTHERS FROM TRACKING YOU
  • 18. HOW IMPORTANT TO PREVENT EMAIL TRACKING? • DO Protect Your Email Account • 2 Step Verification (Every Sign In) • 2 Factor Authentication (When Account Changes Made) • Should You Protect Your Email Content? • Never Send Sensitive Information By Email • Account Numbers, Passwords, etc. • Then Don’t Worry About Encryption
  • 19. PROTECTING YOURSELF WHILE BROWSING THE WEB • There Are A Number Of Browser Extensions That Block Ads • Some Are Open Source And Free • All Work Differently/Work On Various Browsers • Google Chrome Has A New Blocker • Adblock Plus, Disconnect, Ublock Origin, Ghostery • Protecting Against ISP Selling Web Use Data—Explained On Privacy Policy • HTTPS Everywhere • Use a VPN • Adjust DNS—Fairly Technical • Will ISP Block Your Service If You Use Any Of These?
  • 20. PROTECTING YOURSELF FROM UNWANTED PHONE CALLS NOT ONLY ANNOYING, THEY ARE OFTEN SCAMMING • Stopping Robo Calls on Your Land Line • Sign Up For The Do Not Call Registry (FCC) • Nomorobo • Stopping Robo Calls on Your Smart Phone • Most Carriers Offer An App To Block Robo Calls
  • 21. PROTECTING YOUR DATA ON THE WEB A Virtual Public Network Is A Secure Private Network Built On Public Infrastructure (The Web). It Encrypts The Data Traveling Over The Network And Adds Other Security Measures. Use A Highly Rated One. Most Have Free Trials, Even Free Plans, For Low Volume Users.
  • 22. ROBERTS’ RULES FOR FINDING A GOOD VPN— OR ANY OTHER INTERNET TOOL • Search “The Best” • Consider Adding The Current Year To Your Search Term • Read The Reviews • In 2018 Don’t Consider Reviews Written Before 2017 • Choose The Tool That Best Meets Your Needs And Lifestyle • Download The Tool • Follow Instructions • Carefully Examine The Settings
  • 24. There Is Also The Tor Browser It Uses Technology That Significantly Slows Your Browsing
  • 25. PREVENTING THEFT OF YOUR DATA
  • 26. THE IMPORTANCE OF STRONG PASSWORDS CANNOT BE OVERSTATED • Never Reuse Passwords • Passwords Should Be Long, Strong and Complex • Don’t Use Obvious Terms—Address, Birthday, Children, Pets, etc. • Be Careful Where You Store Them • Use Multi-Factor Authentication Whenever Possible TOO MUCH TROUBLE, RIGHT???
  • 27. THERE IS AN ANSWER— AN EFFECTIVE PASSWORD MANAGER!
  • 28. A PASSWORD MANAGER HAS SEVERAL FUNCTIONS • Secure Way To Keep Track Of All Your Passwords • Can Build Strong Passwords For All Your Accounts • Can Automatically Sign You Into Many Accounts • Can Store Credit Card Info, Making Purchasing Online (Too?) Easy • 1Password Can Now Determine If Your Password Has Been pwned (defeated) • Again, Choose Carefully (Roberts’ Rules)
  • 29.
  • 30. SECURITY PROGRAM ESSENTIAL • Virus Protection • Firewall • Other Features • Parental Controls; Gaming Protection; Protect Email Against Spam, Spyware, Phishing • Most ISPs Offer Free Security Program • If You Choose Your Own, Use A Paid Program
  • 31. MOST DATA THEFT IS RESULT OF SOME TYPE OF MALWARE • “All The Bad Stuff” • Viruses And More • Good Security Program Will Get Most • A Good Anti-Malware Package Will Catch A Few More • There Are Free Versions FOR SERIOUS PROBLEMS, HAVE YOUR COMPUTER PROFESSIONALLY CLEANED.
  • 33. WHAT ABOUT THIRD-PARTY IDENTITY PROTECTION SERVICES?
  • 34. PROTECTING YOURSELF IN A CONNECTED WORLD
  • 35. Anything Connected To The Internet Is Capable of Collecting And Transmitting Data. The Questions Are ‘What Data,’ ‘What Uses?’ If It’s Free, There’s A High Probability the App/Tool is Collecting Data. This Also Applies To Advertising Supported Sites. Anything Data Stored, By Any Service, Is Susceptible To Hacking.
  • 36. ITEMS IN YOUR HOME THAT COLLECT DATA THE QUESTION IS—DO THEY STORE IT, SELL IT?
  • 37. HOW TO PROTECT YOUR ‘SMART HOME’ SYSTEM • ALWAYS Change The Default Password Of Any New Device • Update All Security Settings on Devices, Even New Ones • Be Thoughtful About The Maker Of The Product • Be Wary Of Public Wi-Fi • Study The Settings Of Your Device--Can Do, Can’t Do • Put Connected Devices on Separate Network From Computer, Phone
  • 38. Dojo By BullGuard Monitors A Home System
  • 39. • Should Be Approved By One Of FTC-Approved Watchdogs • Search Online, Especially News • Read Privacy Policy Carefully • If Third Parties Involved In Data Handling, Research Them • Connect Toys Only To Secure Wi-Fi • If It Uses Bluetooth, That Should Require PINs, Passwords • Data Transmission To Wi-Fi Should Be Encrypted • If It Can Receive Updates, Security Patches, Keep Them Updated How Old Should Children Be To Have A Toy With Such Capabilities?
  • 40. • Devices Can Not Only Listen To You, The TV, But Potentially All Conversations Within Range • Use Voice Recognition • Use A PIN With The Purchasing Function • Recordings Are Sent To Storage; Listen And Then Delete Them • Don’t Connect Speaker To Home Security - Smart Door Locks, etc. • Don’t Store Sensitive Info – Bank Account, Credit Card, etc. • Mute It When Leaving For Long Period Of Time
  • 41. SOME MORE OF ROBERTS’ RULES FOR LIVING SAFELY IN A CONNECTED WORLD
  • 42. THE ESSENTIALS • First, Think Carefully About How Connected You Want To Be • Then Think About Who You Want To Share With • Think About How Devices Can Make Your Life Safer, More Convenient, More Enjoyable • Add The Security Features That Fit Your Life NEVER MAKE TWO CHANGES TO YOUR SYSTEM AT ONCE! MAKE A CHANGE, WAIT A COUPLE OF WEEKS TO BE SURE IT’S WORKING, THEN MAKE ANOTHER CHANGE.
  • 43. THEN THINK ABOUT ADD-ONS • Be Careful About Devices That Say They’ll Solve All Problems • Don’t Believe Promises Unless They Are Backed In Writing • Do You Know And Trust The Company? • Don’t Throw Money At Unnecessary Solutions • Do Your Own Homework – Especially Before Hiring Someone Don’t Be Afraid To Call In Professional Help When Needed!
  • 44. THANK YOU! AND NOW FOR QUESTIONS!

Editor's Notes

  1. The SIM card/port scam
  2. http://www.information-age.com/10-biggest-hacks-rocked-business-world-2017-123469857/ http://www.healthcareitnews.com/slideshow/biggest-healthcare-breaches-2017-so-far?page=22
  3. https://arstechnica.com/information-technology/2018/02/new-tool-safely-checks-your-passwords-against-a-half-billion-pwned-passwords/
  4. Kaspersky
  5. Roomba w wifi 9 mo and up
  6. Smart TV can listen to conversations, but can turn that off