Houston, We Have a Problem. When Things go Wrong Ed Carter & Steve Hoffer Information Security Office Ohio University.

Slides:



Advertisements
Similar presentations
Identity Theft If you are a victim of identity theft, take the following four steps as soon as possible!
Advertisements

Presented (insert date) By (insert organizations name)
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Prepared for: Presented by: Risky Business 2012 Conference Tony La Rosa, Manager Mid-Iowa Credit Counseling Park Fair Mall 100 E. Euclid Ave., Ste. 157.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
SEMINOLE COUNTY SHERIFF’S OFFICE
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
Protecting Personal Information Guidance for Business.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
Protecting Your Identity: What to Know, What to Do.
Identity Theft By Dominique Kekiwi Definition  A criminal uses another person’s information to take on that person’s identity for criminal activity.
Kimberly Castner-Scott. What is Identity Theft I Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully.
Identity Theft Stefany K. Watson Brandon K. Mosley.
1 Identity Theft and Phishing: What You Need to Know.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
Materials Developed By: CLARIFI CLARIFI ID Theft & Scams Don’t be a Victim.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
A ID Theft & ACCOUNT FRAUD Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Prevention & Clean Up © 2011.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Employee Law Module What you need to do to protect credit history and the documents that you will need for employment. The information in this module comes.
Internet Safety Dr. Steve Broskoske Misericordia University.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Military Sentinel Presentation November 19, 2008 John Krebs, Attorney Consumer Sentinel Network Program Manager Federal Trade Commission.
Security Awareness Identity Theft October Security Awareness. Identity Theft Someone acquires enough information about you to pose as you and.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
Identity Theft Andrew Schreiber Alex Demetriou Jessica Ferrell.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Identity Theft Project Erin L. Caraway Jacob Locke.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
+ Warm up In 3-5 words, define each of the following: 1. Phishing 2. Skimming 3. Pyramid scheme 4. Ponzi scheme Answer the following question: 1. How can.
Preventative Maintenance.  Obtain a free copy of your credit report annually by visiting or by calling
Jeff loses his identity! Lesson 8: Identity Theft.
Identity Theft By: Tiffany Goode and Jessica Jackson.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Identity Theft Project By: Timmy Townsend And Eric Fields.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
IDENTITY THEFT. WHAT IS IDENTITY THEFT? Identity theft refers to stealing someone else’s personal information in order to obtain credit or other benefits.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
Jeff loses his identity! Lesson 5: Identity Theft.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Fraud: Identity Theft G.1 List and explain consumer protection laws, including credit reporting, debt collection, and privacy. G.2 Define common, unfair.
Identity Theft How bad people get good credit. Lindsey Bertugli.
Beware! Identity Theft. Imagine getting a letter from the Internal Revenue Service (IRS) demanding that you pay $5,700 in back taxes. That’s what happened.
Identity Theft: When Bad Things Happen To Good... Geremy Ayers Independent Associate.
You’ve Been Hacked! What to do when your personal information has been compromised Paul T. Yoder, Information Systems Security Specialist.
ALL ABOUT THE FTC By: Brandon Baldwin.
Tax Identity Theft Presenter Date
Protecting Your Identity:
Protecting Personal Information Guidance for Business.
5.5 Consumer Protection Objective: Demonstrate how to be a responsible consumer in the 21st century.
Protecting Yourself from Fraud including Identity Theft
Identity Theft Presented by 72 Facility
BRENTWOOD POLICE IDENTITY FRAUD / THEFT INFORMATION PACKET
Identity Theft and Credit Safety
Presentation transcript:

Houston, We Have a Problem. When Things go Wrong Ed Carter & Steve Hoffer Information Security Office Ohio University

Identity Theft Ed Carter & Steve Hoffer Information Security Office Ohio University

The Federal Trade Commission The Federal Trade Commission The nation's consumer protection agency, collects complaints about companies, business practices, and identity theft. Ed Carter & Steve Hoffer Information Security Office Ohio University

If you receive an that you think might be a scam, forward it to the FTC and it will be stored in a database that law enforcement agencies use to generate legal cases. Ed Carter & Steve Hoffer Information Security Office Ohio University

The internet Crime Complaint Center The internet Crime Complaint Center The IC3 is a partnership between the FBI, the National White Collar Crime Center, and the Bureau of Justice Assistance, whose mission is to serve as a vehicle to receive, develop, and refer criminal complaints related to cyber crime. Ed Carter & Steve Hoffer Information Security Office Ohio University

Your State Attorney General Your State Attorney General In addition to the FTC, you can also file a complaint with your state Attorney General's office if you think you may be a victim of fraud. Your state Attorney General's office handles a wide range of complaints related to consumer protection. Ed Carter & Steve Hoffer Information Security Office Ohio University

– In addition to forwarding spam to you can also forward spam to The Anti-Phishing Working Group is a consortium of ISPs, security vendors, financial institutions and law enforcement agencies that use this to fight phishing. Ed Carter & Steve Hoffer Information Security Office Ohio University

The Better Business Bureau accepts complaints from consumers against businesses or services, and is dedicated to fostering an ethical business environment. Ed Carter & Steve Hoffer Information Security Office Ohio University

Identity Theft Place a "Fraud Alert" on your credit reports, and review those reports carefully. Notifying one of the three nationwide consumer reporting companies is sufficient. Place a "Fraud Alert" on your credit reports, and review those reports carefully. Notifying one of the three nationwide consumer reporting companies is sufficient. Close any accounts that have been tampered with or established fraudulently Close any accounts that have been tampered with or established fraudulently File a police report with local law enforcement officials. This is an essential step in claiming your rights File a police report with local law enforcement officials. This is an essential step in claiming your rights Report your theft to the Federal Trade Commission, online, by phone, or by mail. Report your theft to the Federal Trade Commission, online, by phone, or by mail.online More info check out More info check out TransUnion: www.transunion.com Experian: EXPERIAN ( ) Equifax: www.equifax.com Ed Carter & Steve Hoffer Information Security Office Ohio University

Virus Infection Do NOT panic!! 1.Distinguish between a virus and a "normal" hardware or software problem. 2.Identify the virus 3.Gather information 4.Locate the virus 5.Remove the virus 6.Verify the virus is gone Ed Carter & Steve Hoffer Information Security Office Ohio University

Trojan It is a harmful piece of software that looks legitimate. Ed Carter & Steve Hoffer Information Security Office Ohio University

Hard Drive Crash Very important to have a backup Call an expert!! Ed Carter & Steve Hoffer Information Security Office Ohio University

The Ohio University Information Security Office 160 West Union Street Athens, OH (740) 566-SAFE Ed Carter & Steve Hoffer Information Security Office Ohio University

Mission Laptop Security Mission Laptop Security Ed Carter & Steve Hoffer Information Security Office Ohio University

Visit OnGuradOnline.gov and click on “File a Complaint” to learn how to respond if problems occur when your online. Ed Carter & Steve Hoffer Information Security Office Ohio University