Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

Cyber Safety Assessment Review
Investing. Agenda Start time: _____ Break time: _____ (10 minutes) End time: _____ Please set phones to silent ring and answer outside of the room.
Banking. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Internet.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
Lesson 11 Using Online Banking. Key Terms Account Transfer – online transfer of money; ex. Savings to checking acct. Fraud – using trickery to convince.
Katrina Lopes. Every time you log onto a website, you leave a mark saying “I was here”
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Internet Safety and Kids Ms. Lee’s Classroom Computers are NOT bad Computers can be used to help kids learn and play. They can be used safely, if parents.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Kimberly Siebott Lynn Yip. Definition  A crime in which the perpetrator develops a scheme using one or more elements of the Internet to deprive a person.
Scams awareness month.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
How It Applies In A Virtual World
Beware! Consumer Fraud Module 9.1.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Telemarketing Fraud: It’s a Crime University of Georgia Cooperative Extension Service Georgia Governor’s Office of Consumer Affairs.
Personal Finance Unit 2.02 Understand Threats to Financial Security.
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
Scams & Schemes Common Sense Media.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
By: Asfa Khan and Huda Mukhtar
Hertfordshire Trading Standards Scams Susie Helliwell Trading Standards Officer.
Cyber Safety Jamie Salazar.
1.3 Safeguarding Your Privacy Identity Theft is the illegal use of an individual’s personal information.
REACTION AND ACTION RESPONDING TO FRAUD 1. THE VICTIMS THE CON IS TAILORED TO THE PROSPECTIVE VICTIMS. 2.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
Protecting Your Identity From Fraud Clarissa Goins, VP Compliance Karen Osterhoudt, VP Operations.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Carly and Scott are targets Lesson 6: Scams Targeting Students.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Outline of this module By the end of this module, you will be able to: Understand what is meant by the term “advanced fee fraud”; Understand what is.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
#scamaware.
Fraud Protection.
Fraud protection.
Banking.
Learn how to protect yourself against common attacks
Digital Citizenship Middle School
Internet Fraud By (NAMES).
Internet Safety – Social Media
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Fraud Protection

Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.

Fraud Awareness Quiz Answers Fraud artists usually target people with little education. True or false?

Fraud Awareness Quiz Answers Legitimate lotteries and sweepstakes charge fees to deliver your prize. True or false?

Fraud Awareness Quiz Answers The top method used to solicit Canadian consumers for mass marketing fraud in 2009 was: telephone Internet.

Fraud Awareness Quiz Answers If a telemarketer offers you a low-interest credit card, you must send money before your card is activated. True or false?

Fraud Awareness Quiz Answers If you receive an from an organization asking that you verify your account information within 24 hours or your account will be frozen, the best thing to do is: reply to the asking them why they want this information reply to the with the information asked for report the to the actual organization and then delete the .

Fraud Awareness Quiz Answers In 2009, the total reported dollar loss by victims of identity theft in Canada was about: $7 million $9 million $11 million

Fraud Awareness Quiz Answers Most fraud is committed by strangers who get your personal financial information through illegal means. True or false?

Fraud Protection This module covers: What the most common frauds and scams are, and how they work How to spot the warning signs that an offer or a communication may be fraudulent How to protect your money and your financial identity What to do if you, or someone you know, becomes a victim of fraud

How to Recognize Fraud

This section covers: What the most common frauds and scams are, and how they work How to spot the warning signs that an offer or a communication may be fraudulent

Why do people fall for financial frauds? Many of us want something for nothing We believe what people tell us Fraud artists are very convincing Fraud artists use pressure tactics Fraud artists play on our desire to support a good cause We’re embarrassed if we fall for a scam

Phishing

Brilliant Equity Marketing Associates

Item for Sale

Summary of Key Messages Fraud can target anyone Watch for many different types of fraud Be aware of the tricks that fraud artists use Never send money unless you know an offer is legitimate Never give personal information unless you know the person asking is legitimate

How to Protect Yourself

This section covers: Steps to take to protect yourself and your family How to safeguard your passwords and PINs How to use social networking sites safely What to do if you are approached or become a victim of fraud

Password Do’s and Don’ts Don’t: Store PINs and passwords where anyone can find them Use the same PIN and password for different uses Use personal information that is easy to figure out Use a password that is the same as your account name Use PINs and passwords that are easy to spot while typing

Password Do’s and Don’ts (cont’d) Do: Use at least eight characters Use at least: o One capital letter o One lowercase letter o One number or special character o No spaces Use many different characters Change PINs and passwords often

Create a Password Use the initials from a phrase you’ll remember Misspell the words Switch numbers or symbols for letters Use an online password tool E.g.: FCAC password tool Please refer to the How to Protect Yourself section of the Fraud Protection module, PIN and passwords do’s and don’ts

Tips for Social Networking Never post anything that scammers could use (date, birthplace, etc.) Set security and privacy options for maximum security Limit your “friends” to people you know Be alert for scam messages Don’t allow services to scan your addresses Watch out for apps that could read your data

If You Become A Victim Report frauds to stop the fraudsters

Summary of Key Messages Learn the steps to protect yourself from fraud Use strong PINs and passwords Limit personal data on social networking sites If you are a victim of fraud, contact the authorities right away

Fraud Protection Action Plan