identity theft presentation

26
Identity Theft Prevention ISSA:Macon State College

Upload: charlesgarrett

Post on 02-Nov-2014

455 views

Category:

Documents


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Identity Theft Presentation

Identity Theft Prevention

ISSA:Macon State College

Page 2: Identity Theft Presentation

What is Identity Theft?

• Identity theft happens when someone uses your personally identifying information, like your name, social security number, or credit card number, without your permission, to commit fraud or other crimes.

Page 3: Identity Theft Presentation

What Can Thieves Do With Your Identity

• Credit Card Fraud: Open a CC in your name and or change the billing address for your cards.

• Phone and Utilities: Open a new accounts in your name or “run up” charges on your existing accounts.

• Bank/Financial: Create “fake” checks in your name or account number, write bad checks in your name, make a “fake” ATM card to impersonate yours, and or take a loan out in your name.

• Government: Use your DL information to get a DL with your name and their picture, use your SSN to get benefits, file fraudulent tax returns with your information.

Page 4: Identity Theft Presentation

Types of Fraud

Credit CardGovernment Doc/BenefitPhone and UtilityEmployee FraudBank FraudLoan FraudOther

Page 5: Identity Theft Presentation

Number of ID Theft Police Reports

Filled Police Report

Did Not File Report

Page 6: Identity Theft Presentation

Out of Pocket Expense ($631 per consumer)

Number of Identity Theft Victims

Cost to Consumers

Page 7: Identity Theft Presentation

Common Techniques Used By Thieves

• Dumpster Diving – Going through your trash to find mail or information with your name on it.

• Skimming – Stealing credit card numbers by using a special “hidden” device when you are processing a transaction on your card.

• Phishing – Make a “fake” website of a bank or a company and send emails asking for account information verification.

• Social Engineering – Using very special speaking techniques to get people to give out confidential information

Page 8: Identity Theft Presentation

Preventing Dumpster Diving

• Invest in a small paper shredder. They can be purchased at any local retail store.

• Ensure that everything that has your name and address or any other personal information is shredded.

• Make sure to not leave any mail with confidential information unattended in your mailbox for long periods of time.

• Use online “e-statements” for all your accounts.

Page 9: Identity Theft Presentation

How To Prevent Phishing

• Do not open any emails or attachments from anyone you do not know.

• Ensure that all banking websites you use have the “lock symbol” located at the bottom of the web browser (Firefox, Internet Explorer).

• Do not open links in emails. Type the address of the website your trying to access and not the link.

• Opt-Out of email newsletters or “junk mail

lists”.

• Bottom Line: If it looks suspicious, DON’T CLICK IT.

Page 10: Identity Theft Presentation

Credit Card and Debit Card Rights

• Credit Card Loss or Fraudulent Charges (FCBA)

• Max liability under federal law for unauthorized use of your credit card is $50.

• If you report the loss before the card is used the card issuer can not hold you liable.

• Also, if the loss involves your credit card number, but not the card itself, you have no liability for unauthorized use.

Page 11: Identity Theft Presentation

Credit Card and Debit Card RightsContinued

• ATM or Debit Card Loss or Fraudulent Transfers (EFTA).

• Your liability under federal law for unauthorized use of your ATM or debit card depends on how quickly you report the loss.

• If you report an ATM or debit card missing before it's used without your permission, the card issuer cannot hold you responsible for any unauthorized transfers.

•  If unauthorized use occurs before you report it, your liability under federal law depends on how quickly you report the loss.

Page 12: Identity Theft Presentation

EFTA Example• If you report the loss within two business days after

you realize your card is missing, you will not be responsible for more than $50 for unauthorized use. However, if you don't report the loss within two business days after you discover the loss, you could lose up to $500 because of an unauthorized transfer.

Page 13: Identity Theft Presentation

Reducing The Risk of Social Engineering

• Make sure you keep track of your personal information and do not give out your information freely on the internet. Make sure you shred any personal documents with confidential information.

• Social engineering can sometimes be very difficult to catch because of the simplicity of the attack. This is why many companies have implemented multiple forms of identity verification.

Page 14: Identity Theft Presentation

How To Protect Yourself Online

• Use strong complex passwords. Instead of “abc123” use a password like “S!lLy$linkys!0p&” (SillySlinkySlope)

• Keep your operating system (Windows) and your software programs up to date.

• Keep your firewall turned ON.

• Enable your virus protection.

• Do not post any information on the internet that could be used to reset any of your online accounts.

Page 15: Identity Theft Presentation

Anti-virus and Malware Removal Recommendations• Microsoft Security Essentials

• Avast

• DOM32

• Malware Bytes

Page 16: Identity Theft Presentation

How to Protect Computerand Mobile Device Data

• The process of deleting files is not enough. Ensure all sensitive information is removed.

• Simply reinstalling the operating system DOES NOT ERASE YOUR FILES!

• A free option for Windows based computers is Eraser.

• For other operating systems, see Darik's Boot and Nuke (DBAN).

• Ensure all your mobile device data is encrypted.

Page 17: Identity Theft Presentation

Mobile Device Security

• As mobile devices become as powerful as desktop computers it is vital invest in security.

• Invest in a remote lock remote wipe solution if the device is ever stolen.

• Enable virus, malware, and firewall on the device.

• Some solutions come with a siren or loud sound to “scare” thieves.

• Free solutions include: Apple’s Find My iPhone, F-Secure Anti-Theft for Mobile, Microsoft's find my phone.

Page 18: Identity Theft Presentation

Identities Can Be StolenWithout The Internet

• In 2007, The Washington Post published an article detailing a case of identity theft, the victim’s identity was obtained from the ID cards in a lost wallet. (Jackman, 2007).

• On July 19th Koco 5 from Oklahoma City reported a case of identity theft perpetrated by using information on discarded RX bottles.      (RX bottles can lead., 2007)

     

Page 19: Identity Theft Presentation

If Your Identity Is Ever Stolen• File a police report with your local

police department.

• Check all of your credit reports, notify creditors, and make sure to dispute any unauthorized transactions on your accounts.

• Swift action must be taken to restore your name. The faster you do this process the faster you can restore your good name.

Page 20: Identity Theft Presentation

Importance Of Filing A Police Report

• Filing a report entitles you to certain legal rights when you provided it to the three major credit reporting agencies or companies that the identity thief misused your information.

• Identity Theft Report can be used to PERMANENTLY block fraudulent information that results from an identity theft.

• It will ensure these debts do not reappear on your credit.

Page 21: Identity Theft Presentation

Importance of Filing A Police Report Continued

• It prevents companies from continuing to collect on the debt that resulted from identity theft or selling the debt to others for collection.

• An Identity Theft Report is also needed to place an extended fraud alert on your credit report.

• In short: properly reporting the identity theft to the proper authorities will make the process run more smoothly.

Page 22: Identity Theft Presentation

How Long Can The Effects Of Identity Theft Last

• There are many different factors that determine how long it can last.

• Factors include: type of theft, whether the thief sold or passed your information on to other thieves, whether or not the thief was caught, and process to correct your credit report.

• Victims should monitor their credit report several months after to ensure it does not reoccur.

• Victims should check every three months during the first year and once a year after.

Page 23: Identity Theft Presentation

More Ways To Protect Yourself

• Protect your social security number.

• Verify sources before sharing information.

• Safeguard wallet or purse.

• Store private information in secure locations.

• Implement a credit freeze on your credit report.

• Invest in identity theft insurance or credit monitoring.

Page 24: Identity Theft Presentation

More Ways To Protect Yourself Continued

• Never write down your password or share it with others.

• Change your passwords at least every six months.

• Only friend people you know and trust on your social media networks.

• When disposing your old computer, make sure you use data erasing software before you remove it.

• If you have multiple passwords you cannot remember make an encrypted file with a very strong password to protect it.

• Have the Postal Service hold your mail when you leave town.

Page 25: Identity Theft Presentation

Websites To Help You Stay Current

• Federal Trade Agency : Fighting Back Against Identity Theft http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html

• Clark Howard www.clarkhoward.com

• Ben Halpert CISSP www.benhalpert.com

• Symantec Education on Youtube

• http://www.idtheftcenter.org/

Page 26: Identity Theft Presentation

Resources• Fighting Back Against Identity Theft: Federal Trade

Commission http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html

• Ben Halpert CISSP (Certified Information Security Professional)

www.benhalpert.com

• http://www.ftc.gov/bcp/edu/pubs/consumer/credit/cre04.shtm

• http://bucks.blogs.nytimes.com/2011/02/09/the-rising-cost-of-identity-theft-for-consumers/