How to Protect Yourself from ID Theft and Social Engineering

Slides:



Advertisements
Similar presentations
What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
Advertisements

Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Staying Safe Online Keep your Information Secure.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Information Security Sharon Welna Information Security Officer.
Jeff loses his identity! Lesson 8: Identity Theft.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Protecting Your Identity From Fraud Clarissa Goins, VP Compliance Karen Osterhoudt, VP Operations.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Protecting Your Assets By Preventing Identity Theft
What’s a Credit Score? And how to use credit wisely.
You’ve Been Hacked! What to do when your personal information has been compromised Paul T. Yoder, Information Systems Security Specialist.
HIPAA Privacy and Security
Combating Identity Fraud In A Virtual World
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Digital Citizenship Middle School
Information Security.
Protecting Your Identity:
Multifactor Authentication
Cybersecurity Awareness
What you can do to protect yourself
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Protecting Your Identity:
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Multifactor Authentication & First Time Login
Staying safe on the internet
Protecting Yourself from Fraud including Identity Theft
9 ways to avoid viruses and spyware
Protecting Your Credit Identity
Internet Safety – Social Media
Gmail Password Recovery
MyLion Registration Website | Mobile device
Protecting Yourself from Fraud including Identity Theft
Identity Theft By Omer Ersen.
Employee Self-Service (ESS) Portal
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

How to Protect Yourself from ID Theft and Social Engineering Jeffrey Hall, CFI

Recent Data Breaches Equifax (2017) Anthem (2015) 143mm people impacted Customer names, SS numbers, birth dates, addresses Anthem (2015) 79mm people impacted Anthem Blue Cross and Blue Shield Customer names, birth dates, medical ID’s, SS numbers, addresses, and employment information JP Morgan Chase (2014) 83mm accounts (business and consumer) Customer names, email address, postal addresses, and phone numbers

Is My Personal Information Affected? Equifax web site is delivering inconsistent results to potentially impacted members https://www.equifaxsecurity2017.com/potential-impact Have I Been Pwned? https://haveibeenpwned.com/ Recommendation: Operate under the assumption that your personally identifiable information (PII) has been compromised either in the recent Equifax breach or other large past data and email compromises

Next Steps to Protect Against ID Theft Take advantage of the free identity-monitoring service (TrustedID Premier) that Equifax is offering Equifax has clarified that you give up no legal rights by enrolling with the service Contact the 3 credit bureaus to place a credit freeze on your credit file You can unfreeze your credit file when you legitimately apply for credit https://www.freeze.equifax.com/Freeze/jsp/SFF_PersonalIDInfo.jsp https://www.experian.com/freeze/center.html https://www.transunion.com/credit-freeze/place-credit-freeze Place a 90 day fraud alert on your credit file Equifax 1-888-766-0008 Experian 1-888-397-3742 TransUnion 1-800-680-7289 Get a free credit report from each agency https://www.annualcreditreport.com

Credit Freeze and Fraud Alert Don’t forget to include your phone number when placing an alert

Multifactor Authentication (MFA) Multifactor authentication (MFA) is a security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity for a login or other transaction. This is usually done by requiring something you know (password) and something you possess (a challenge code) Challenge code can be sent by SMS (text), email or voice I recommend SMS over the other two methods Drawbacks to voice challenge code If the phone is a landline, someone in the home can intercept the call I have seen examples of suspects forwarding/hijacking a phone line Drawbacks to email challenge code Breached data or malware can lead to hacked email If you use SMS, ensure that you don’t display message on locked screen

More MFA TIPS

What Applications Should Use MFA? Financial Services Online banking, investment and retirement accounts Mobile Banking may only require MFA when there is an unrecognized device Always have your cell phone screen lock set Email Social Media Health Care Medical and Dental insurance Online retailers that have your information stored Amazon Utilities To include broadband and cell service

Social Engineering following Data Breach Expect a big increase in targeted spear phishing campaigns Criminals will purchase compromised information on the dark web and than start building dossiers on the people who’s information they have purchased Do not ever click links in emails from untrusted sources Hover your cursor over any links to see the actual URL Do not ever click on links in text messages If you receive any links from unknown senders – delete immediately Confirm with your friends if they are the senders Clicking on a malicious link in your phone can result in the phone being hacked Do not ever release any PII over the telephone. If an organization calls you requesting information, instead go to the web and get their contact info and call them directly

Social Media Privacy Settings

Social Media Security and Login

Social Engineering on Social Media

Social Engineering on Social Media

Social Engineering on Social Media Social engineers will try to obtain personal information about you from social media posts Information that they are looking for could be answers for standard challenge questions: What is your favorite food? What is your favorite band? What was the color of your first car? Being able to identify your birthdate or family members will help social engineers locate you on free search websites Social Engineers will now be able to answer standard challenge questions or out of wallet verification questions from information they obtained from you on social media and free people search websites Protect your private information as if it were a valuable asset because it is