What Identity Thieves, Hackers and Spammers Dont Want You to Know - PowerPoint PPT Presentation

1 / 38
About This Presentation
Title:

What Identity Thieves, Hackers and Spammers Dont Want You to Know

Description:

Verify e-cards. Emailpi.Com installs spy ware through the opening of ... Never accept an offer for free credit reports or monitoring. Protection Can Be Cheap ... – PowerPoint PPT presentation

Number of Views:117
Avg rating:3.0/5.0
Slides: 39
Provided by: Cay3
Category:

less

Transcript and Presenter's Notes

Title: What Identity Thieves, Hackers and Spammers Dont Want You to Know


1
What Identity Thieves, Hackers and Spammers Dont
Want You to Know
  • Caylen Tichenor
  • Oconee RESA
  • Sandersville GA

2
Topics Covered
  • How to protect against ID theft.
  • How to deal with it when it happens.
  • How thieves use hacking and spamming.

3
Establishing a Sense of Urgency
  • In 2000-2001 Georgia was ranked 10 in identity
    thefts.
  • For 2001-2002 Georgia was ranked 13th in identity
    theft.
  • 57 of Georgias population has been affected by
    some form of ID theft.

4
Top 5 Cities in GA
  • Atlanta
  • Marietta
  • Decatur
  • Alpharetta
  • Lawrenceville

5
Types of Identity Theft
  • Credit card fraud 43
  • Phone/utilities fraud 21
  • Bank fraud 20
  • Employment-related fraud 4.6
  • Gov. Documents/benefits fraud 3.2
  • Loan fraud - 7
  • Other ID theft 17
  • Attempted ID theft 9

6
Who is affected by ID Theft
7
Establishing a Sense of Urgency
  • On the average one year passes before the ID
    theft victim discovers it.
  • Victims spend an average of 175 hours per
    incident trying to unravel the problems caused by
    ID theft.
  • 7 million people were victims of ID theft in the
    last year.
  • Only 1 in 700 thieves were caught.
  • Victims typically spend 800 per incident trying
    to clear their name.

8
Are You In Danger?
  • Receive several offers of pre-approved credit
    every week. (5 points)___ add 5 points if you do
    not shred them before putting them in the trash.
  • ___ I carry my social security card in my wallet.
    (10 points).
  • ___ My state driver's license has my SSN printed
    on it, and I have not contacted the department of
    motor vehicles to request a different number. (10
    points).
  • ___ I do not have a PO box or a locked, secured
    mailbox. (5 points).

9
Are You In Danger?
  • ___ I use an unlocked, open box at work or at my
    home to drop off my outgoing mail. (10 pts.).
  • ___ I carry my military ID in my wallet at all
    times. (10 points).
  • ___ I do not shred or tear banking and credit
    information when I throw it in the trash. (10
    pts.).
  • ___ I provide my social security number (SSN)
    whenever asked, without asking questions as to
    how that information will be safeguarded. (10
    points)___ add 5 points if you provide it orally
    without checking to see who might be listening.

10
Are You In Danger?
  • ___ I am required to use my SSN at work as an
    employee ID or at college as a student ID number.
    (5 points).
  • ___ My SSN is printed on my employee badge that I
    wear at work or in public. Or it is posted on my
    time card in full view of others, or is on other
    documents frequently seen by many others in my
    workplace. (10 points).
  • ___ I have my SSN and/or driver's license number
    printed on my personal checks. (10 points).
  • ___ I am listed in a "who's who" guide. (5
    points).

11
Are You In Danger?
  • ___ I carry my insurance card in my wallet and
    either my SSN or that of my spouse is the ID
    number. (10 points).
  • ___ I have not ordered a copy of my credit
    reports for at least 2 years. (20 points).
  • __ I do not believe that people would root around
    in my trash looking for credit or financial
    information or looking for documents containing
    my SSN. (10 points).

12
So What Should You Know????
13
1. Ignorance Is Not Bliss.
  • Ignorance of current trends and scams.
  • Know the vocabulary.
  • Shoulder surfer.
  • Phisher sites.
  • Dumpster divers.
  • Pre-texting.
  • Skimming.
  • Know the scams.

14
ID Theft Scams
  • Best Buy
  • Earthlink
  • AOL
  • EBay
  • Pay Pal

15
1. Ignorance Is Not Bliss.
16
1. Ignorance Is Not Bliss.
  • Good sources for keeping informed.
  • Consumer reports.
  • PC magazine.
  • USA today.
  • CNN.
  • Http//news.Com.Com.

17
1. Ignorance Is Not Bliss.
  • Ignorance of actions.
  • Who has your SS number.
  • Make a list of who has your number and ask
  • Why do you need I?
  • Who has access to it?
  • How is it safeguarded.
  • Before you give it out ask.
  • Why do you need it?
  • How will it be used?
  • What law requires me to give it to you?
  • What will happen if I dont?
  • Monitor your SS activity.

18
1. Ignorance Is Not Bliss.
  • Ask for alternative means of identification.
  • Only government agencies, employers or
    transactions that involve taxes can require your
    SS number.
  • Some businesses have other ways of verifying
    information but you have to ask.
  • Do not place your social security number or date
    of birth on resumes that you send out for jobs.
  • Support privacy efforts.
  • Show ID when using credit cards/checks.
  • Dont allow family members to use credit
    cards/checks if their name is not on it.
  • 5 percent of all ID thefts are perpetuated by
    family members.

19
1. Ignorance Is Not Bliss.
  • Who has your information.
  • Warranties, store cards etc.
  • Warranty cards do not have to be sent in to be
    valid.
  • Information recorded by store cards may be sold
    or shared.
  • Privacy statements.
  • Read all privacy statements carefully.
  • Once information is shared it becomes the
    property of the new holder. Privacy statements
    are not transferred.

20
1. Ignorance Is Not Bliss.
  • Ignorance of accounts.
  • Get a free credit report yearly.
  • Look for strange or unfamiliar accounts.
  • Look for unauthorized inquiries.
  • Examine all statements carefully.
  • Monitor your information.
  • After applying for a credit card, loan, etc.
    Request that your SS number be truncated or
    obliterated and that the original credit report
    be shredded or returned to you.
  • Use a service like www.privacyguard.com to inform
    you of any inquiries on your credit..

21
1. Ignorance Is Not Bliss.
  • Mail all transactions from the post office.
  • Place passwords on all accounts. (Avoid using
    easily available information for passwords).
  • Pay attention to your billing cycles.
  • Be wary of promotional scams.

22
2. Trash Is Treasure
  • Dumpster diving the act of taking bags of
    garbage off lawns or out of dumpsters to gain
    credit information.
  • Use a cross cut shredder to destroy any personal
    information. This includes but is not limited to
  • Credit statements.
  • Invitations for credit.
  • Insurance reports.
  • Any correspondence with your customer or account
    .
  • Be cautious about putting out trash the night
    before.

23
3. Its Ok to Be Rude.
  • Never give credit card numbers or information
    over the phone unless you have initiated the
    call.
  • Secure personal information in your home.
  • Before giving out personal information demand to
    know why it is required and what will be done
    with it.
  • Ask to see the actual credit card transaction
    take place.
  • Ask how your workplace safeguards ID records.

24
4. Hermits Have the Right Idea.
  • Remove your name from marketing lists.
  • Opt out wherever possible.
  • Remain unlisted.
  • Keep it to yourself.
  • Lower your profile.
  • Get phone smart.

25
5. Convenience Is Not Always Safe
  • Be leery of using public computers.
  • Check for spy programs before using.
  • Erase your tracks.
  • Delete cookies and history.
  • Protect your passwords.
  • Clear AutoComplete boxes from tools and internet
    options.
  • After surfing click AutoComplete boxes for clear
    forms and passwords.
  • Copy and paste the letters of your password into
    the password blank.
  • Dont rely on encryption.
  • Use common sense.

26
5. Convenience Is Not Always Safe
  • Dont conduct financial transactions on cordless
    or cell phones.
  • Beware strange ATMs.

27
6. Protection Can Be Cheap
  • Email.
  • Never purchase email advertised products.
  • Never respond to personal requests for personal
    information via e-mail.
  • Verify every transaction.
  • Beware of get rich quick schemes.
  • Refrain from replying to any Spam, especially to
    take your name off the list.
  • Set up a public e-mail address for use online.

28
6. Protection Can Be Cheap
  • Email.
  • Use an e-mail filter to eliminate unwanted spam.
  • Scrutinize e-mail addresses.
  • Verify e-cards.
  • Emailpi.Com installs spy ware through the
    opening of greeting cards on computer.
  • Disable the preview pane to keep Spam from
    reporting back to the sender that youve seen it.

29
6. Protection Can Be Cheap
  • General technology
  • Backup your system
  • Be certain of BOTH the source AND content of each
    file you download!
  • Be cautious of dealing with pop-ups
  • Beware of hidden file extensions!
  • Don't be lulled into a false sense of security
    just because you run anti-virus programs.
  • If you are an online multi-gamer type, do not
    publish your I.P. Address on websites or
    newsgroups, unless you are very sure that you are
    fully protected.
  • Keep your anti-virus, firewall and operating
    systems updated. Run an update at least every two
    weeks.
  • Look for website privacy policies.
  • Download an anti-spy ware like Lavasofts
    ad-aware utility.
  • Turn off your computer when not in use

30
6. Protection Can Be Cheap
  • Non technical.
  • Have to post office hold your mail during
    vacation.
  • Be on the lookout for shoulder surfers when
    using ATM machines.
  • Use prepaid phone cards instead of calling cards.
  • Prepare for the worst.
  • Never accept an offer for free credit reports or
    monitoring.

31
Protection Can Be Cheap
  • Laptops
  • Dont store financial information on a laptop.
  • Use a strong password
  • Upper and lower case number and letters
  • Dont use an automatic log in feature.
  • Log off when youre finished.

32
7. Some Protection Is Worth the Cost.
  • Install a firewall especially if you have a DSL
    or T-1 connection.
  • Install reputable anti-spam and anti-virus
    software.
  • Keep your anti-virus, firewall and operating
    systems updated. Run an update at least every two
    weeks.

33
What to do when it happens
The Three C's
34
1. Communicate
  • Contact the fraud departments of each of the
    three major credit bureaus.
  • Order copies of your credit reports from all
    three agencies.
  • Contact the FTC online and begin filling out the
    ID theft affidavit.

35
2. Close
  • Immediately close any accounts you believe have
    been tampered with or opened up illegally.
  • Ask the representative to send either the fraud
    dispute form or to accept the ID theft affidavit
    form from the FTC.
  • Cancel all bank cards.
  • Stop payments on checks and them to notify the
    check verification company they use.

36
Complain
  • File a police report.
  • Provide documentation.
  • Be persistent.
  • Be a motivating force.
  • Know the law.
  • Ga. Code ann. 16-9-120 through 128.

37
The Best Way to Avoid ID Theft Is SCAM
  • Be Stingy about giving out personal information.
  • Check your financial information on a regular
    basis.
  • Ask for a free copy of your credit report.
  • Maintain careful records of your accounts.

38
How Well Are You Protected?
  • 100 points recent surveys indicate that 7-10
    million people were victims of ID theft last
    year. You are at high risk. We recommend you
    purchase a paper shredder, become more
    security-aware in document handling, and start to
    question why people need your personal data.
  • 50-100 points - your odds of being victimized are
    about average. Higher if you have good credit.
  • 0-50 points - congratulations. You have a high
    "IQ." Keep up the good work and don't let your
    guard down now.
Write a Comment
User Comments (0)
About PowerShow.com