Identity Theft Presentation
-
Upload
charlesgarrett -
Category
Documents
-
view
453 -
download
1
description
Transcript of Identity Theft Presentation
![Page 1: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/1.jpg)
Identity Theft Prevention
ISSA:Macon State College
![Page 2: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/2.jpg)
What is Identity Theft?
• Identity theft happens when someone uses your personally identifying information, like your name, social security number, or credit card number, without your permission, to commit fraud or other crimes.
![Page 3: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/3.jpg)
What Can Thieves Do With Your Identity
• Credit Card Fraud: Open a CC in your name and or change the billing address for your cards.
• Phone and Utilities: Open a new accounts in your name or “run up” charges on your existing accounts.
• Bank/Financial: Create “fake” checks in your name or account number, write bad checks in your name, make a “fake” ATM card to impersonate yours, and or take a loan out in your name.
• Government: Use your DL information to get a DL with your name and their picture, use your SSN to get benefits, file fraudulent tax returns with your information.
![Page 4: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/4.jpg)
Types of Fraud
Credit CardGovernment Doc/BenefitPhone and UtilityEmployee FraudBank FraudLoan FraudOther
![Page 5: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/5.jpg)
Number of ID Theft Police Reports
Filled Police Report
Did Not File Report
![Page 6: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/6.jpg)
Out of Pocket Expense ($631 per consumer)
Number of Identity Theft Victims
Cost to Consumers
![Page 7: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/7.jpg)
Common Techniques Used By Thieves
• Dumpster Diving – Going through your trash to find mail or information with your name on it.
• Skimming – Stealing credit card numbers by using a special “hidden” device when you are processing a transaction on your card.
• Phishing – Make a “fake” website of a bank or a company and send emails asking for account information verification.
• Social Engineering – Using very special speaking techniques to get people to give out confidential information
![Page 8: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/8.jpg)
Preventing Dumpster Diving
• Invest in a small paper shredder. They can be purchased at any local retail store.
• Ensure that everything that has your name and address or any other personal information is shredded.
• Make sure to not leave any mail with confidential information unattended in your mailbox for long periods of time.
• Use online “e-statements” for all your accounts.
![Page 9: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/9.jpg)
How To Prevent Phishing
• Do not open any emails or attachments from anyone you do not know.
• Ensure that all banking websites you use have the “lock symbol” located at the bottom of the web browser (Firefox, Internet Explorer).
• Do not open links in emails. Type the address of the website your trying to access and not the link.
• Opt-Out of email newsletters or “junk mail
lists”.
• Bottom Line: If it looks suspicious, DON’T CLICK IT.
![Page 10: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/10.jpg)
Credit Card and Debit Card Rights
• Credit Card Loss or Fraudulent Charges (FCBA)
• Max liability under federal law for unauthorized use of your credit card is $50.
• If you report the loss before the card is used the card issuer can not hold you liable.
• Also, if the loss involves your credit card number, but not the card itself, you have no liability for unauthorized use.
![Page 11: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/11.jpg)
Credit Card and Debit Card RightsContinued
• ATM or Debit Card Loss or Fraudulent Transfers (EFTA).
• Your liability under federal law for unauthorized use of your ATM or debit card depends on how quickly you report the loss.
• If you report an ATM or debit card missing before it's used without your permission, the card issuer cannot hold you responsible for any unauthorized transfers.
• If unauthorized use occurs before you report it, your liability under federal law depends on how quickly you report the loss.
![Page 12: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/12.jpg)
EFTA Example• If you report the loss within two business days after
you realize your card is missing, you will not be responsible for more than $50 for unauthorized use. However, if you don't report the loss within two business days after you discover the loss, you could lose up to $500 because of an unauthorized transfer.
![Page 13: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/13.jpg)
Reducing The Risk of Social Engineering
• Make sure you keep track of your personal information and do not give out your information freely on the internet. Make sure you shred any personal documents with confidential information.
• Social engineering can sometimes be very difficult to catch because of the simplicity of the attack. This is why many companies have implemented multiple forms of identity verification.
![Page 14: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/14.jpg)
How To Protect Yourself Online
• Use strong complex passwords. Instead of “abc123” use a password like “S!lLy$linkys!0p&” (SillySlinkySlope)
• Keep your operating system (Windows) and your software programs up to date.
• Keep your firewall turned ON.
• Enable your virus protection.
• Do not post any information on the internet that could be used to reset any of your online accounts.
![Page 15: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/15.jpg)
Anti-virus and Malware Removal Recommendations• Microsoft Security Essentials
• Avast
• DOM32
• Malware Bytes
![Page 16: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/16.jpg)
How to Protect Computerand Mobile Device Data
• The process of deleting files is not enough. Ensure all sensitive information is removed.
• Simply reinstalling the operating system DOES NOT ERASE YOUR FILES!
• A free option for Windows based computers is Eraser.
• For other operating systems, see Darik's Boot and Nuke (DBAN).
• Ensure all your mobile device data is encrypted.
![Page 17: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/17.jpg)
Mobile Device Security
• As mobile devices become as powerful as desktop computers it is vital invest in security.
• Invest in a remote lock remote wipe solution if the device is ever stolen.
• Enable virus, malware, and firewall on the device.
• Some solutions come with a siren or loud sound to “scare” thieves.
• Free solutions include: Apple’s Find My iPhone, F-Secure Anti-Theft for Mobile, Microsoft's find my phone.
![Page 18: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/18.jpg)
Identities Can Be StolenWithout The Internet
• In 2007, The Washington Post published an article detailing a case of identity theft, the victim’s identity was obtained from the ID cards in a lost wallet. (Jackman, 2007).
• On July 19th Koco 5 from Oklahoma City reported a case of identity theft perpetrated by using information on discarded RX bottles. (RX bottles can lead., 2007)
![Page 19: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/19.jpg)
If Your Identity Is Ever Stolen• File a police report with your local
police department.
• Check all of your credit reports, notify creditors, and make sure to dispute any unauthorized transactions on your accounts.
• Swift action must be taken to restore your name. The faster you do this process the faster you can restore your good name.
![Page 20: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/20.jpg)
Importance Of Filing A Police Report
• Filing a report entitles you to certain legal rights when you provided it to the three major credit reporting agencies or companies that the identity thief misused your information.
• Identity Theft Report can be used to PERMANENTLY block fraudulent information that results from an identity theft.
• It will ensure these debts do not reappear on your credit.
![Page 21: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/21.jpg)
Importance of Filing A Police Report Continued
• It prevents companies from continuing to collect on the debt that resulted from identity theft or selling the debt to others for collection.
• An Identity Theft Report is also needed to place an extended fraud alert on your credit report.
• In short: properly reporting the identity theft to the proper authorities will make the process run more smoothly.
![Page 22: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/22.jpg)
How Long Can The Effects Of Identity Theft Last
• There are many different factors that determine how long it can last.
• Factors include: type of theft, whether the thief sold or passed your information on to other thieves, whether or not the thief was caught, and process to correct your credit report.
• Victims should monitor their credit report several months after to ensure it does not reoccur.
• Victims should check every three months during the first year and once a year after.
![Page 23: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/23.jpg)
More Ways To Protect Yourself
• Protect your social security number.
• Verify sources before sharing information.
• Safeguard wallet or purse.
• Store private information in secure locations.
• Implement a credit freeze on your credit report.
• Invest in identity theft insurance or credit monitoring.
![Page 24: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/24.jpg)
More Ways To Protect Yourself Continued
• Never write down your password or share it with others.
• Change your passwords at least every six months.
• Only friend people you know and trust on your social media networks.
• When disposing your old computer, make sure you use data erasing software before you remove it.
• If you have multiple passwords you cannot remember make an encrypted file with a very strong password to protect it.
• Have the Postal Service hold your mail when you leave town.
![Page 25: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/25.jpg)
Websites To Help You Stay Current
• Federal Trade Agency : Fighting Back Against Identity Theft http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html
• Clark Howard www.clarkhoward.com
• Ben Halpert CISSP www.benhalpert.com
• Symantec Education on Youtube
• http://www.idtheftcenter.org/
![Page 26: Identity Theft Presentation](https://reader033.fdocuments.us/reader033/viewer/2022061111/5455a37faf7959d8748b72a6/html5/thumbnails/26.jpg)
Resources• Fighting Back Against Identity Theft: Federal Trade
Commission http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html
• Ben Halpert CISSP (Certified Information Security Professional)
www.benhalpert.com
• http://www.ftc.gov/bcp/edu/pubs/consumer/credit/cre04.shtm
• http://bucks.blogs.nytimes.com/2011/02/09/the-rising-cost-of-identity-theft-for-consumers/