Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20...

27

Transcript of Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20...

Page 1: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.
Page 2: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Victims of ID theft suffer much anguish

Nearly a billion personnel records were stolen in 2014

20 data breaches exposed one million records apiece

PII (Name, DOB, SSN) is easier to sell than credit card/banking information

http://www.csoonline.com/article/2847269/business-continuity/nearly-a-billion-records-were-compromised-in-2014.html

• 1 in 5 Americans had their Credit Card/Banking/SSN stolen in 2014

http://thinkprogress.org/home/2014/04/15/3426781/1-in-5-americans-have-had-their-social-security-number-or-credit-card-info-stolen /

• 50% of identity theft victims knew the person responsible for the theft

• Affects 10-16 million Americans annually

• Identity theft takes an average of 6 months and 220 hours to resolve http://www.identityhawk.com/identity-theft-recovery-time

Page 3: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Every 19 minutes a person becomes a victim by:

• Email Phishing

• Credit/debit card information stolen at stores or restaurants by hacking or card skimming

https://www.youtube.com/watch?v=U0w_ktMotlo&list=PLE979CF662C9EB337

• Social media - Criminals use these web sites to piece together your life, contacts, work information

• Telephone scams

• Computer remote access provides cybercriminals with unlimited access to anything in your computer

http://www.trusteer.com/glossary/remote-access-trojan-rat

Page 4: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Consequences

• Go to jail for someone else’s crime• IRS notifies you more than one tax return was filed under your name• Ruined credit• Bankruptcy filed in your name• Difficulty obtaining a loan or credit card• Citations• Rental vehicles damaged/stolen• Student loans taken out in your name• Higher interest rates• Merchants refuse checks• Debt collectors start calling your home, work, family, co-workers• Medical Identity Theft – Thief’s medical information gets comingled with your file (blood type, allergies,

illnesses)• Refused health claims because you have reached a limit

Page 5: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Signs Your Identity Has Been Stolen

• A sudden increase in an account balance• Declined credit card transaction• Your Credit Score rating plummets• Mysterious new account(s) within your credit report• Debt collectors start contacting you, co-workers, family

Page 6: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

How to preventTeach children as well

• Never give personal information over email/telephone/Internet web sites

• Don’t list your correct birthday on social media or PII on web site profiles

• Update anti-virus software weekly on your computer(s) and smartphone(s)

• Don’t use the same password for all user accounts

• Pick up mail in unlocked box daily

• Get free credit report annually from each of 3 credit reporting bureaus. Request one free report get one every 4 months

• Place outgoing mail in secure mailbox

Page 7: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Prevention, Part 2

• Opt out of pre-approved credit cards and loan offers.

• Remove name from marketing lists of 3 credit reporting agencies and call 1-888-5-OPTOUT or go to www.optoutprescreen.com to remove you from marketing lists.

• Shred credit card offers (using a cross-cut shredder)

• Cut up expired or unused credit cards

• Review credit reports annually

• Review your bank and credit card statements at least weekly

• Never keep your SS card in your wallet or purse

• Never use a password on an unsecured Wi-Fi connection

• Ask if there are options other than providing SSN as PII

http://blog.credit.com/2013/03/5-places-where-you-should-never-give-your-social-security-number-65328/

Page 8: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

What to do if your identity or banking/credit card information was stolen during a

data breach (e.g. Target, Home Depot, PF Changs, JP Morgan Chase)

• Security Freeze on Credit Report, small fee to initiate and remove if you need a credit check

• Protect my ID.com

• Apply for a new social security number

• Get “V” on back of your driver’s license

Page 9: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

What to do, part 2

• Call credit reporting companies and place a fraud alert on credit reports associated with your Social Security number.

• Dispute all fraudulent charges

• Have any account that has been tampered with or opened fraudulently closed immediately.

• Contact your local police and/or the police department in the community where the identity theft took place and file a report.

• File an official complaint with the Federal Trade Commission.

Page 10: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Number of spam/phishing emails UNM IT blocks DAILY

1-3 MILLION If one gets through, forward to:

[email protected] [email protected]

Page 11: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Antivirus softwarecan only protect you from known viruses

Kaspersky Lab is detecting 315,000 new malicious files every day

http://www.kaspersky.com/about/news/virus/2013/number-of-the-year

Page 12: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Phishing scams

• Never disclose your financial or personal information in response to an unsolicited e-mail regardless of who sent it. • If you get an email or phone call asking for personal information,

it is a scam 100% guaranteed• Call the institution directly if you have a concern (do not call the

number they provide in the email. Look it up yourself.) • Never click on a link embedded in an unsolicited e-mail, (regardless of

who sent you the email.)• Verify the authenticity of a website before entering financial or personal

information on that website

Page 13: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Google Malware stealing emails and accessing Google documents and any account with same password

http://www.cnbc.com/id/101668517#.

• The scam starts with an email that claims to be sent by Google with the phrase "Mail Notice" or "Lookout Notice" as the subject.

• The message in the email reads: "This is a reminder that your email will be locked out in 24 hours, due to not being able to increase your email storage quota. Go to the INSTANT INCREASE to increase your Email storage automatically."

• A link then redirects the user to a bogus Google login page where the user is prompted to put in their credentials.

• Once the hackers receive the credentials they have access to not just a victim's email, but to all Google documents, Google Play, Google+ profile, etc.

• If the person uses the same login information for multiple sites, the hacker will also have access to those.

Page 14: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Pharming Scams

“Pharmers” redirect Internet users from legitimate commercial websites to counterfeit web pages to trick them to disclose their vital

financial and personal information

Page 15: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Check the URL even if you typed name in

• Always make sure the Internet web site (aka:URL) is the correct one. Hackers will sometimes register a web domain that is spelled slightly differently (e.g. swapped letters; an extended URL name)

• A secure web site must have a URL that begins with ‘https’: and display a padlock icon on the bottom page

Page 16: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Holding your computer hostage for money

http://krqe.com/2015/02/04/ransomware-rakes-in-millions-from-average-computer-users/

They may have already encrypted your data

Paying the ransom fee does not guarantee you will get it back or that it won’t happen again

Using your credit card only compounds your problem

Page 17: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Phone fraudsters recycle approachhttp://www.abqjournal.com/531300/biz/phone-fraudsters-recycle-approach.html

• Calls representing IRS, threatening arrest if you don’t send money immediately. IRS does not email or call – they send you a letter

• Calls representing police departments claiming you must pay and outstanding warrant via a phone payment

• Calls stating you missed jury duty.

Call 841-8141 to confirm your jury duty status

• Calls stating a family member has been kidnapped and they demand money for their safe return. These types of calls are made from a disposable cell.

Page 18: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Child/Student Identity Theft on the RiseGoes undetected for years

http://www.equifax.com/specs/child-identity-protection-kit/child-kit.pdf

• Use the child’s SSN as the family SSN due to the inability of a parent to obtain an SSN

• Pay off debt and create new lines of credit• Avoid a criminal record on the perpetrator’s file • Avoid a medical record with the perpetrator’s file

information (perhaps for insurance purposes or to hide a medical condition)

• Fraudulently receive welfare, unemployment or medical benefits

Page 19: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

College students on scammer’s radar

FBI warns of fictitious “Work-From-Home Scam” targeting university students http://www.ic3.gov/media/2015/150113-1.aspx

• If a job offer sounds too good to be true, it probably is

• Never accept a job that requires the depositing of funds into your account and wiring them to different accounts

• Never provide credentials, passwords or personal information in response to a recruitment email

• Forward emails to [email protected] and then warn your friends to be on the lookout for the scam

Page 20: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

I ate Thanksgiving with my Identity Thief for 19 years

http://time.com/money/3607328/identity-theft-i-ate-thanksgiving-dinner-with-my-identity-thief-for-19-years/?xid=time_readnext

Page 21: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Man’s ID stolen by killer, with lingering effects

http://www.abqjournal.com/524390/biz/bogus-health-fitness-claims-should-raise-red-flags.html

• Ted Bundy was also an identity thief• Victim had to prove he was not Ted Bundy even after he was put to death

Page 22: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Scammed BBB president shares lessons learned

http://www.abqjournal.com/506835/biz/bbb-chief-falls-prey-to-intrusion.html

• Was closing on a Farmington building the BBB was donating to Big Brothers Big Sisters

• Received email from Big Brothers email titled “Kindly Review the Attached Document”.

• Clicked the attachment which was blank and then prompted to enter his Google email username/password.

• He complied. BIG mistake.

• Once in his email, hackers sent the identical bogus email to every email account in his address book

• Scam was designed to infiltrate friends via a trusted email account to steal personal information, bank and cc accounts

• Contained his usual signature but an incorrect phone number so if his contacts suspected something about the email, they would call a bogus phone number.

• Created an email rule so that all responding emails would go directly to the email trash can.

• Lessons learned:

Do not store personal information within your email

Do not let your guard down or logon information even if email seems to be from someone you know

Page 23: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Medical Identity TheftConsequences of having medical insurance card stolen

http://patients.about.com/od/yourmedicalrecords/a/

•Suppose the person who steals your medical identity is discovered to have a disease or condition you don’t have? AIDS, or cancer, or Alzheimers or Parkinsons disease or any other life-long diagnosis -- when you later seek medical assistance, that problem would show up on your records, and your care would be affected. •Perhaps you have a diagnosis of a chronic disease or condition that the imposter doesn't have, so you don't get the treatment appropriate to your health. •Suppose you apply for life insurance, and you get turned down because they think you have Alzheimer's disease or cancer. •Even something as simple as a blood test can have negative consequences if the imposter’s blood type gets recorded, and it’s different from your blood type. •It can mean you won’t be hired for a job, since some companies check medical records prior to hiring. •The impact to your credit record, and the legal costs of recovering your own identification could be huge since the medical bills would end up coming to you, and you would be expected to pay for them

Page 24: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

Protect Passport/CC/Cash

• RFID Blocking Wallet https://www.youtube.com/watch?v=hcSss9BHPFo

• Unless country mandates carrying passport, leave original passport in hotel safe and carry a copy in passport holders inside your pants• Carry cash in money belts inside your pants

Page 25: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

NM and FTC Victim Resources

http://identitytheftnetwork.org/resource-map/new-mexico

Federal Trade Commission: Step by step instructionshttp://www.consumer.ftc.gov/articles/pdf-0009-taking-charge.pdf

Page 26: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

OTHER TRAINING OFFERED

• Cyber Security – Phishing: How Not To Become a Victim of Email Fraud• Social Networking Security• Laptop and Cell phone Security• International Travel Security• Workplace Violence• Identity Theft

Page 27: Victims of ID theft suffer much anguish Nearly a billion personnel records were stolen in 2014 20 data breaches exposed one million records apiece PII.

If you think you have been a victim of identity theft or want further information, please contact Deb Kuidis at 277-0732 or

[email protected]

http://researchcompliance.unm.edu/industrialsecurity-home