How to Keep Your Personal and Financial Information Safe Online Cheryl Helget Mark Griffin.

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
S T R I C T L Y P R I V A T E A N D C O N F I D E N T I A LS T R I C T L Y P R I V A T E A N D C O N F I D E N T I A L © 2008 JPMorgan Chase & Co. All.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Social Networking Systems: Education Awareness Briefing.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
August 15 click! 1 Basics Kitsap Regional Library.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Threats to I.T Internet security By Cameron Mundy.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
ESCCO Data Security Training David Dixon September 2014.
Reliability & Desirability of Data
IT security By Tilly Gerlack.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Internet Safety.
Class Name: Online Safety & Privacy Basics
Phishing is a form of social engineering that attempts to steal sensitive information.
Cybersecurity Awareness
Protecting Your Identity:
Shopping experience! Is it safe to pay online? Ian Ramsey
Protecting Your Identity
Protecting Your Credit Identity
Internet Safety – Social Media
What is Phishing? Pronounced “Fishing”
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

How to Keep Your Personal and Financial Information Safe Online Cheryl Helget Mark Griffin

How does identity theft occur? Oh please, let me count the ways! 1) Keystroke logging software or hardware 2) Phishing scams via 3) Unsecure web sites 4) Social engineering 5) Dumpster diving 6) Random flash drives 7) Other

So, how can I protect myself?

Use good passwords and pins, and protect them! 1) Make password at least 7 characters long! 2) Use random letters, numbers and symbols (both upper & lower case) 3) DO NOT USE birthdays, addresses, anniversaries, or other personal information 4) DO NOT USE correct answers to challenge questions that can be answered through combing genealogy sites. For example, mother’s maiden name, father’s middle name, paternal grandfather’s first name can be easily learned through ancestry.com. 5) DO NOT SHARE passwords or pin numbers! 6) DO NOT WRITE DOWN passwords or pin numbers 7) Change your password at least every 6 months, and don’t reuse passwords 8) Develop a security mindset

Password Examples: 1234, 6666, sparky, password, , fhsu: BAD PASSWORDS B3tt3r1!, pr3TTyg00d, &00d3n0u&h: BETTER PASSWORDS IKJ0n Hi12ESr98gbtmal, 987weDF6743$khF98!: BEST PASSWORDS Time Magazine’s worst passwords for 2012: of-2012/ of-2012/ 1. password abc qwerty 6. monkey 7. letmein 8. dragon baseball 11. iloveyou 12. trustno sunshine 15. master welcome 18. shadow 19. ashley 20. football 21. jesus 22. michael 23. ninja 24. mustang 25. password1

What’s a Phishing scam? And, what do I do about them? Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Attackers try to get you (the fish) to hand over your information or money. They hook you with an message, IM, or some other form of communication (the bait) that looks as if it came from a legitimate source such as a bank or an online shopping site.passwords electronic communication The primary thing that you want to do with phishing s, instant messages, or texts, is DELETE THEM! Do not respond to a phishing scam, or click on any links in the message. Do Not provide ANY personal information. If you do anything with the message, simply report it to your administrator.

How will I know if it’s a scam, or if it might be a legitimate ? Phishing scams/ s tend to have one or more of these characteristics  Website links sound legitimate, but are not the real organizations link (eg. instead of  Website link says one thing, but the actual click through goes somewhere else!  Message will say it is from a local person, department, or entity, but reply goes to a totally different address  Messages will often be poorly worded or have misspelled words  Subject of message often makes it sound like it is an important notice  If you want to investigate, consider googling what might be the major content of the message to see if it has been flagged as a phishing attempt on any of the anti-phishing/anti-malware sites.  Bottom line, if you aren’t comfortable with the content or the subject, delete the message.

Phishing examples To: “Mark Griffin" From: Juanita Limas Date: 01/05/ :03AM Subject: From System Administrator Dear Webmail User, Your mailbox has exceeded the allocated storage limit as set by the administrator, you may not be able to send or receive new mail until you upgrade your allocated quota. To upgrade your quota, Please clickhere Thank you for your anticipated cooperation. System Administrator For Webmail Support Team.

Phishing examples cont. To: From: Fort Hays State University Sent: Saturday, June 09, :59 AM Subject: Emergency Verification Dear Fort Hays State University subscriber, We hereby announce to you that your account has exceeded its storage limit. You will be unable to send and receive mails and your account will be deleted from our server. To avoid this problem, you are advised to verify your account by clicking on the link below. Thank you. The Fort Hays State University IT Management Team.

Social Media Security Tips Watch for fake s that appear to come from Facebook If it seems unusual for a friend to write on your wall and post a link, that friend may have gotten phished Do Not enter your password through a link Do not use the same password for Facebook that you use elsewhere on the web Don’t share your password with anyone (Repeat!) Do not use your cellphone number to verify the results of a facebook game or survey without reading terms and conditions

What other stuff should I do, or be aware of online? Keep your computer operating system, anti-virus, and firewall software up to date. Free 3 rd party firewalls: ZoneAlarm or Comodo Firewall Free PC World’s top security picks of 2012: G Data InternetSecurity 2012 Norton Internet Security 2012 Bitdefender Internet Security 2012 Detected and removed the most baddies but slow Do Not access on-line accounts using public computers When shopping online, whenever possible use a secure online payment service (eg. Paypal or WorldPay) Use credit cards instead of debit cards! Credit cards are insured against fraudulent merchants, debit cards are not. Do not keep personal or financial information (including passwords) in a plain text file on your computer. Encrypt the documents (KeePass is a nice password storage utility and it is free) When submitting information online, make sure there is a “lock” icon on the browser’s status bar. Also make sure website begins https (the “s” means a secure, encrypted (SSL) connection.

The lock sign shows that there is an encrypted connection between your browser and the website you are visiting, allowing for private information to be transmitted without the problems of eavesdropping, data tampering, or message forgery. It is possible for every piece of data to be seen by others unless it is encrypted with the https communication rule that is signified by the lock sign.

What other stuff should I do, or be aware of online? Continued Do not give out personal or financial information to vendors over the phone, through the mail or , or anywhere online, unless you are ABSOLUTELY CERTAIN that your contact is legitimate. If you have a home wireless network, be sure to password protect it. When you are setting up the wireless router, it will ask you whether you want to use WEP, WPA, or WPA-2 encryption. Select WPA-2 for the best security. Also change your wireless router’s adminstrator’s default password. Keep a record of your transactions, and check your accounts online periodically to watch for suspicious activity. When traveling, do not keep all of your credit cards in one place, such as a wallet in your pocket. Split up your resources. If traveling with someone else you trust, perhaps have them carry at least one of your cards, or some of your cash. Keep a list of all your credit card numbers in a safe place (encrypted, if stored electronically), along with expiration dates and customer service phone numbers. Review your credit report periodically. You can obtain a free credit report annually at Shred any paper documents that contain personal or financial information, do not just throw this information in the trash

Twitter Dooz’n’Donts Don’t be too specific Say it, don’t spray it Call the police, don’t tweet about it Don’t tweet about changing passwords, or anything else that might compromise your security Never use your password on suspicious 3 rd party sites Do choose a strong password (Repeat!) Do use direct messages when appropriate, not everything is meant to said in the wild Consider having a private account separate from work

Removing your name from lists: Mail – Phone – Stop preapproved credit card offers: or OPTOUT To hold your mail: