Fraud Protection.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

Cyber Safety Assessment Review
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Banking. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Kimberly Siebott Lynn Yip. Definition  A crime in which the perpetrator develops a scheme using one or more elements of the Internet to deprive a person.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
How It Applies In A Virtual World
Beware! Consumer Fraud Module 9.1.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Telemarketing Fraud: It’s a Crime University of Georgia Cooperative Extension Service Georgia Governor’s Office of Consumer Affairs.
Scams & Schemes Common Sense Media.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Hertfordshire Trading Standards Scams Susie Helliwell Trading Standards Officer.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Cyber Safety Jamie Salazar.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Carly and Scott are targets Lesson 6: Scams Targeting Students.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Scams Awareness Month July 2016
#scamaware.
Protecting Your Assets By Preventing Identity Theft
Investing.
Mrs. Esman Computer Special
Scams & Schemes Common Sense Media.
Fraud protection.
Banking.
Learn how to protect yourself against common attacks
Scams & Schemes Scams and Schemes.
Digital Citizenship Middle School
Protecting What’s Yours: Your Identity
Lesson 3 Safe Computing.
Internet Fraud By (NAMES).
Appropriate Use of Technology
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
E SAFETY ASSEMBLY.
Internet Safety – Social Media
Lesson 2- Protecting Yourself Online
Protecting Yourself from Fraud including Identity Theft
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Fraud Protection

Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____   Please set phones to silent ring and answer outside of the room.

Fraud Awareness Quiz Answers Fraud artists usually target people with little education. True or false?

Fraud Awareness Quiz Answers Legitimate lotteries and sweepstakes charge fees to deliver your prize. True or false?

Fraud Awareness Quiz Answers The top method used to solicit Canadian consumers for mass marketing fraud in 2009 was: telephone email Internet.

Fraud Awareness Quiz Answers If a telemarketer offers you a low-interest credit card, you must send money before your card is activated. True or false?

Fraud Awareness Quiz Answers If you receive an email from an organization asking that you verify your account information within 24 hours or your account will be frozen, the best thing to do is: reply to the email asking them why they want this information reply to the email with the information asked for report the email to the actual organization and then delete the email.

Fraud Awareness Quiz Answers In 2009, the total reported dollar loss by victims of identity theft in Canada was about: $7 million $9 million $11 million

Fraud Awareness Quiz Answers Most fraud is committed by strangers who get your personal financial information through illegal means. True or false?

Fraud Protection This module covers: What the most common frauds and scams are, and how they work How to spot the warning signs that an offer or a communication may be fraudulent How to protect your money and your financial identity What to do if you, or someone you know, becomes a victim of fraud

How to Recognize Fraud

How to Recognize Fraud This section covers: What the most common frauds and scams are, and how they work How to spot the warning signs that an offer or a communication may be fraudulent

Why do people fall for financial frauds? Many of us want something for nothing We believe what people tell us Fraud artists are very convincing Fraud artists use pressure tactics Fraud artists play on our desire to support a good cause We’re embarrassed if we fall for a scam

Phishing

Brilliant Equity Marketing Associates

Item for Sale

Summary of Key Messages Fraud can target anyone Watch for many different types of fraud Be aware of the tricks that fraud artists use Never send money unless you know an offer is legitimate Never give personal information unless you know the person asking is legitimate

How to Protect Yourself

How to Protect Yourself This section covers: Steps to take to protect yourself and your family How to safeguard your passwords and PINs How to use social networking sites safely What to do if you are approached or become a victim of fraud

Password Do’s and Don’ts   Store PINs and passwords where anyone can find them Use the same PIN and password for different uses Use personal information that is easy to figure out Use a password that is the same as your account name Use PINs and passwords that are easy to spot while typing

Password Do’s and Don’ts (cont’d) Use at least eight characters Use at least: One capital letter One lowercase letter One number or special character No spaces Use many different characters Change PINs and passwords often

Create a Password Use the initials from a phrase you’ll remember Misspell the words Switch numbers or symbols for letters Use an online password tool E.g.: FCAC password tool Please refer to the How to Protect Yourself section of the Fraud Protection module, PIN and passwords do’s and don’ts

Tips for Social Networking Never post anything that scammers could use (date, birthplace, etc.) Set security and privacy options for maximum security Limit your “friends” to people you know Be alert for scam messages Don’t allow services to scan your addresses Watch out for apps that could read your data

If You Become A Victim Report frauds to stop the fraudsters

Summary of Key Messages Learn the steps to protect yourself from fraud Use strong PINs and passwords Limit personal data on social networking sites If you are a victim of fraud, contact the authorities right away

Fraud Protection Action Plan