Identity Theft: Protect Yourself. Overview Understand ID theft and how it happens Protect your computer Strong passwords Commonsense precautions.

Slides:



Advertisements
Similar presentations
The Hidden Costs of Identity Theft on American Business.
Advertisements

Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
E-Commerce: Security LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
Authentication and Constructing Strong Passwords.
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
LifeGuard LifeGuard Plus LifeGuard Premium Identity Theft protection that does its job. Welcome to LifeGuard Identity Theft Protection. Help protect yourself.
David Abarca, Instructor Del Mar College Computer Corner Phishing, Pharming, Spear-Phishing, and now…. Vishing.
Johnson Logistics Solutions Office of Systems and Information Technology.
Remote On-line Backup Service. How safe is your business data?
Government Databases and You or How I Learned to Stop Worrying and Love Information Loss. By Patrick Fahey Mis 304.
Password Best Practices.  Never share your login ids and/or passwords  Remember: you are responsible for any activities associated with your login and.
K-2. Today’s Objective: I will create a strong, private password.
Today’s Objective: I will create a strong, private password.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
Online Job Applications. Course Outline Review resources & information needed to complete an online application Practice filling out a job application.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
What is E-commerce Safety Precautions Password Strengths
Password Management PA Turnpike Commission
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Data Representation A series of eight bits is called a byte. A byte can be used to represent a number or a character. As you’ll see in the following table,
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Identity Theft Project Erin L. Caraway Jacob Locke.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
STRONG PASSWORDS = SELF-PROTECTION. Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday,
Every computer along the path of your data can see what you send and receive. USERNAMES and PASSWORDS  Username can be assigned to you eg. Student ID.
2 nd Grade.  ______ make passwords eight or more characters long.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
NetTech Solutions Supporting Local Users and Groups Lesson Three.
How to Reset Your APICS Password Tutorial Also available at:
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
By :Mitchell Christie by :Mitchell Christie safety.
Has your been hacked (or hijacked)? 1.What a Spam looks like 2.How to change your password to a stronger one.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
 Computer News  Identity Guard  One meeting a month (2 nd Wednesday)  Website &  
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Confidentiality, Integrity, Awareness What Does It Mean To You.
Password Theft By: Markie Jones. Road Map Do’s Do Not’s What can someone do with it? How do they get it? Who’s most at risk? When & Where are consumers.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Identify Theft in the Cyber Age Ronald J. Leach. What we ’ re going to talk about – Identity Theft How bad is it? How bad is it? How vulnerable are you?
TYLER GROUP
CREATING A STRONG PASSWORD. PASSWORD DON’TS Single dictionary words (skydiving) Less than 8 characters (rj1977) Personal words/dates (samantha, ,
Fraud Protection.
Fraud protection.
Dove science academy Cyber Club
Identity Theft Austin Tyler Ramsey.
Protecting What’s Yours: Your Identity
Information Systems Desktop Support
October 26, 2017 Main Line Association for Continuing Education
2017 TCS SMT Training - Dallas
DOVE SCIENCE ACADEMY CYBER CLUB
Protecting Your Identity:
2017 TCS SMT Training - Dallas
Hundred Dollar Questions
Hundred Dollar Questions
what I know now about passwords…
Hundred Dollar Questions
Passwords Why all the bother?.
Identity Theft: What if You Are a Victim?
Indeed.com Creating an account.
Presentation transcript:

Identity Theft: Protect Yourself

Overview Understand ID theft and how it happens Protect your computer Strong passwords Commonsense precautions

How Serious Is Identity Theft? Over 10 million victims/year in the U.S. Over $15 billion/year in losses Resolving ID theft takes: Hundreds or thousands of dollars Weeks, months, or even years

What Is a Strong Password? At least eight characters No real words Nothing found in a dictionary No names—your own or your company’s Include Mixed upper- and lower-case characters Numbers as well as letters Symbol characters (#, $, &, =, _, etc.)

Creating a Strong Password ILoveMovieS IL0v3M0vi3S IL0^3M0^i3S I love movies

We Can Help KeepMeMine—Identity Theft Protection Monitor your identity Monitor your credit Monitor public records Contact us! KEEP