2nd Annual Financial Wellness Conference by Money Management Counselors Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO a subsidiary of the Wisconsin.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
Protecting Your Identity: What to Know, What to Do Sherry Daniels Family Living Educator Portage County UW Extension 1462 Strongs Ave., Stevens Point,
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Modules 9.1.  When someone knowingly deceives you for their own personal gain.  They convince you that something is true when it isn’t.  They make.
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
© FIPCO More about the Digital PickPocket November 2, 2013 Preventing Abuse in Technology & not so technical People Ken M. Shaurette, CISSP, CISM,
Internet Safety Dr. Steve Broskoske Misericordia University.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Scams & Schemes Common Sense Media.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
What is Spam? d min.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Jeff loses his identity! Lesson 8: Identity Theft.
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
REACTION AND ACTION RESPONDING TO FRAUD 1. THE VICTIMS THE CON IS TAILORED TO THE PROSPECTIVE VICTIMS. 2.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Jeff loses his identity! Lesson 5: Identity Theft.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Fraud Protection.
Scams & Schemes Common Sense Media.
Fraud protection.
When a collector calls:
Digital Citizenship Middle School
Phishing is a form of social engineering that attempts to steal sensitive information.
Internet Fraud By (NAMES).
Protecting Your Identity:
Jeff loses his identity!
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
What is Phishing? Pronounced “Fishing”
Phishing 101.
Protecting Yourself from Fraud including Identity Theft
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

2nd Annual Financial Wellness Conference by Money Management Counselors Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO a subsidiary of the Wisconsin Bankers Association Stop, Think, Connect - Beware the Digital Pickpocket

© FIPCO Video Value of Banking Banking Video….. CLICK HERE CLICK HERE

© FIPCO

4 The 5 Most Attacked Industries

© FIPCO

6 Most Common Attack Account for over 60 Percent of Attacks!!

© FIPCO  Students at a middle school in Alaska managed to trick teachers into providing their credentials. – About 18 students were 12 and 13 years old, used to take over student computers. No Confidential data.  High school senior in Seattle plead guilty that he installed spyware on school computers in order to boost his grades. – Passwords gave him access to the tests and the ability to boost his grades.  April 2013 Oshkosh, WI Police warn about ATM skimming devices Real Incidents

© FIPCO Physical versus Cyber If We can see value when something is tangible – physical….. You’d never hand over your credit card number or bankcard and pin to a friend Why can’t We see value when something isn’t – physical? Shared , Facebook, Twitter, and LinkedIn passwords; cell phone account password…

© FIPCO November 1, 2013 Imagine getting a phone message like this: (or ) This is the Civil Investigations Unit. We are contacting you in regards to a complaint being filed against you, pursuant to claim and affidavit number D00D-2932, where you have been named a respondent in a court action and must appear… Please forward this information to your attorney in that the order to show cause contains a restraining order. You or your attorney will have 24 to 48 hours to oppose this matter… Call

© FIPCO What to Do ? Know your rights! Ask the debt collector to provide official "validation notice" of the debt. Hang up if they won’t provide!! Fake? Ask for name, company, street address, and telephone number. Then, confirm that the collection agency is real. Do not provide or confirm any bank account, credit card or other personal information over the phone (or in an ) until you have verified the call. Don’t ever send it in an unsecure !!

© FIPCO What to Do ? Know your rights! Banks and legitimate organization do not typically collect confidential information using . You can always go direct to the organization like your bank to make sure it is legitimate. Be Cautious, Be Paranoid, Be Careful!! Beware & Be Aware

© FIPCO What to Do ? Know your rights! Check your credit report annualcreditreport.com or calling (877) annualcreditreport.com If the scammer has a great deal of personal information about you, be safe and place a fraud alert on your credit report. File a complaint with the Federal Trade Commission if the caller uses threats. The Fair Debt Collection Practices Act prohibits debt collections from being abusive, unfair or deceptive. File a complaint with the Federal Trade Commission

© FIPCO Preventing Scam Losses….. Do you sell items on Ebay, Craigslist, etc..? CLICK HERE Fox Contact 6: Spear Phishing

© FIPCO Spying with Your Web Camera The Remote Administration Tool (RAT) is the revolver of the Internet's Wild Wild West. Webcam spying goes mainstream as Miss Teen USA describes hack – August 2013

© FIPCO Preventing CyberSpying….. Look around you right now. Do you have a camera or your laptop nearby? How about your cell phone? If so, who’s watching you? CLICK HERE Fox Contact 6: Cyber Spying

© FIPCO Credit Card Theft….. Do you have a credit card? Look at your Credit Cards now. CLICK HERE Snoopes: Digital Pickpockets Roughly 50% in some states the Credit Cards are RFID equipped. Latest Cell Phones can steal the information.

© FIPCO Phishing Tips to avoid being hooked on a Phishing scam, Don't: – Reply to or pop-up messages asking you for personal or banking information. – personal or banking information. – Click on s or messages you don’t expect or need.

© FIPCO Answers – Caution & Paranoia Hopefully you weren’t looking for an answer to protect you from you. The industry doesn’t have a technology answer yet, but you can be either part of the solution or part of the challenge. Be Aware & Beware