Financial (cyber) Security

Slides:



Advertisements
Similar presentations
What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
Advertisements

Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Protecting Your Identity: What to Know, What to Do.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
INTERNET SAFETY FOR STUDENTS
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
KEEPING YOUR FAMILY SAFE ONLINE Tips from a Parent Who is Paid to be Paranoid Aaron Ades AVP Cybersecurity at MetLife and Parent of Two Children of the.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
IT manuals and support Download a manual on how to get WiFi on your laptop/tablet/phone. Get IT support How to get there: fasos.info/study (click on My.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
By Kira Hall and Iliesa Sevudredre Do you guy’s know what Cyber Safety means? Well we are going to tell a story so you guys can understand what Cyber.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
INTRODUCTION & QUESTIONS.
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Team Electronics Automation & Machinery S-17, DLF Ind. Area, Phase-1, Sec-32, Faridabad ,
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Internet Safety.
Matthew Cooper January 26, 2012
Joshua Lorenzo January 26, 2012
Creating your online identity
Reduce Your Risk of Identity Theft
Done by… Hanoof Al-Khaldi Information Assurance
Unit 4 IT Security.
Digital Citizenship Middle School
Protecting What’s Yours: Your Identity
Information Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
How to use the internet safely and How to protect my personal data?
Protecting Your Identity:
What is Computer Security
Security in the Workplace: Information Assurance
Home Computer Security
ARE YOU A TARGET? YOU MAY NOT REALIZE IT, BUT YOU ARE A TARGET FOR CYBER CRIMINALS. IDENTITY THEFT IS ON THE RISE. BE AWARE AND TAKE PREVENTIVE ACTIONS.
Internet Safety.
Reduce Your Risk of Identity Theft
How to Protect your Identity Online PIYUSH HARSH
Information Security Awareness 101
Risk of the Internet At Home
Protecting Your Identity:
The Art of Deception.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
People: The Social Engineer’s Dream
Phishing Don’t fall for fake
Reduce Your Risk of Identity Theft
KEEP SAFE I will NOT give out personal information: Name -- create a screen name Address Phone number Password School address Pictures.
Bethesda Cybersecurity Club
Welcome to Liscio, our new client communication platform.
Bell Ringer How can you protect your self online?
Reduce Your Risk Of Identity Theft
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Privacy, Security, and Ethics
Cybercrime By: Kimberly Foreiter
Presentation transcript:

Financial (cyber) Security Lou Steinberg

What Your Clients Need to Know Welcome to the scary stuff

Identity Theft is Real A story of someone close to me…me!

Know your Adversary Organized crime

Know your Adversary Individual & small group ATM skimmer ID Theft Credit vs Debit card Know your Adversary Individual & small group

Where they log in to Wherever you go, there you are

Content filter at home

email- pfishing drive-by downloads Smartphone anti-virus

Where they log in from Context matters

Public places (wifi & ethernet) best must! better never! good Public places (wifi & ethernet)

Don’t Trust the Untrustworthy duh!

Seemed like a good idea at the time…

Weak links In the trust chain

MUST protect this! Password managers Passwords

Always Ask WHY? Run a (software) Firewall = Downloaded apps

As if that wasn’t enough…

What You need to know What should you be doing?

Clapton & Hendrix

Learn – Practice - Teach If they hack you, they hacked your clients COST Client education VALUE Learn – Practice - Teach

Common incident case studies

Parting thoughts Because I’m feeling vulnerable

Thanks! lou.steinberg@tdameritrade.com