Identity Theft: Protect Yourself Ronald J. Leach.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Mary Burger Owner ComputerDiva, LLC Vancouver, WA
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Scams Stevie's Scam School videos
Viruses & Destructive Programs
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Identity theft: Real or Virtual? By: Alex Metzler.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Be Cautious of Identity Theft By: Sydney Langley.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Identity Theft: Protect Yourself By Rachel Gaines.
Information Security Sharon Welna Information Security Officer.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
How to protect your computer By: Emily, Jackie and Kathleen.
INTERNET: The Good, The Bad and The Ugly
Internet Security and Your Computer Welcome to Boot Camp.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Internet Safety Internet Safety LPM
All about viruses, hacking and backups By Harriet Thomas.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Any criminal action perpetrated primarily through the use of a computer.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
GUIDE TO INTERNET SAFETY A VISUAL WALKTHROUGH TO SAFE INTERNET BROWSING.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
Computer Security Keeping you and your computer safe in the digital world.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Unit 4 IT Security.
Information Security 101 Richard Davis, Rob Laltrello.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Things To Avoid: 1-Never your password to anyone.
Protecting Your Identity:
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Identity Theft: Protect Yourself Ronald J. Leach

How to protect your computer records

on-line messages You really did not win the lottery You really did not win the lottery No widow of a foreign dictator wants to put illegal funds in you bank account No widow of a foreign dictator wants to put illegal funds in you bank account Can’t avoid taxes on these “earnings” Can’t avoid taxes on these “earnings”

on-line messages, cont. Don’t reply – it tells sender (a program) that this is a valid address Don’t reply – it tells sender (a program) that this is a valid address Don’t unsubscribe (same reason) Don’t unsubscribe (same reason) More about web sites later More about web sites later

How can you protect your computer? Password protect your machine Password protect your machine Use strong passwords Use strong passwords Hackers are ALWAYS running password matching programs Hackers are ALWAYS running password matching programs Different passwords for different web sites Different passwords for different web sites

How can you protect your computer? Update your operating system Update your operating system Have virus checking software Have virus checking software – update it – run scans often Have adware detection software Have adware detection software

How can you protect your computer? Watch where you go – don’t just click on a link – links can be spoofed easily Watch where you go – don’t just click on a link – links can be spoofed easily

How can you protect your computer? The code is as simple as: The code is as simple as: You think you’re going here You think you’re going here

Didier Stevens’ experiment Purchased Google adword “drive by download” Purchased Google adword “drive by download” Display ad: “is your PC virus-free. Get it infected here” Display ad: “is your PC virus-free. Get it infected here” Got 259,723 hits, 409 clicks Got 259,723 hits, 409 clicks Cost him $23 Cost him $23 6 cents per infected computer 6 cents per infected computer

Can’t protect computers completely Keep it in a locked room Keep it in a locked room Don’t install software Don’t install software No network access No network access

Can’t protect computers completely Seemed safe, but… Seemed safe, but… – I found a file named secretmail on a new machine – File not readable – Who put it there?

Copy machines

How to protect your portable data

Protect your computer Protect your laptop from theft Protect your laptop from theft Perhaps have separate laptop for travel, with very little personal stuff on it Perhaps have separate laptop for travel, with very little personal stuff on it Destroy hard disk, rather than giving it away Destroy hard disk, rather than giving it away – difficult to remove all traces of personal data

How to protect your paper records

Shred it!

How to protect your paper records When you recycle, remove address from everything. When you recycle, remove address from everything.

How to protect your old credit cards Shred them Shred them

How to protect your new credit cards Check statements, even the merchant descriptions! Check statements, even the merchant descriptions!

How much does an annual credit report cost?

Nothing! Nothing! Federal Trade Commission Federal Trade Commission

How much does an annual credit report cost? Nothing! AnnualCreditReport.com AnnualCreditReport.com

Thank you!