Download presentation
Presentation is loading. Please wait.
Published byPaul Holland Modified over 8 years ago
2
1
3
Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of “identity crime”; – Understand the public nature of the internet; – Understand the different ways a person’s identity can be stolen; – Know what strategies will help protect your identity; and – Know who to contact if you think you have become a victim. 2
4
Important information A copy of this presentation and the accompanying training booklet are available for download at: www.pcyc.org.au/Clubs/Carindale/SeniorsOnlineSecurity.aspx 3
5
Meet Beryl and Alan
6
Getting started… Why do you think it is important to protect your identity? What contributes to a person’s identity? 5
7
What is identity crime? 6
8
Losing control of your identity There are several ways in which your identity can be compromised: Posting too much information on the internet Fraudulent emails Malware However, these can be overcome with a few simple steps. 7
9
Posting information on the internet One of the biggest threats to our identity is our need to post excessive amounts and levels of information on the internet. The internet isn’t as private as we might think, and our posts can be viewed by people other than our contacts. Posting high levels of information on the internet and inadequate security settings can increase the risk of identity crime. 8
10
Fraudulent emails These types of emails will appear in your inbox and can look genuine. They might come from your bank or another organisation that you do business with and ask you for personal information. They might ask you to reply to their email or they might provide a link to provide your personal details. 9
11
Malware Short for “malicious software”, malware is designed to disrupt the normal running of your computer. Malware comes in many forms, and can be used to obtain your personal details. You might not know your computer is infected. 10
12
Revision questions 11
13
Revision questions 12
14
Revision questions 13
15
Revision questions 14
16
How well did you do?
17
How to protect your identity There are several strategies which can help you protect your identity. By following these simple steps, you will greatly reduce the likelihood that your identity is compromised. 16
18
Steps to protect your identity 1)Limit what details you put on the internet Carefully consider the amount and type of information that you make available to others. 2)Never reply to an email with personal details Fraudulent emails will not always be obvious. Personal details should be guarded in the same way as money. Talk to someone if you are unsure of an email. Don’t feel pressured to respond. 17
19
Steps to protect your identity 3)Knowing and using security settings Make sure that you have security setting activated on all your accounts and profiles. Don’t rely on the default setting as this may not be as secure as you think it is. 4)Use a strong password Try to use different passwords, that contain at least 8 characters and a combination of letters, numbers and symbols. 18
20
Steps to protect your identity 5)Use antivirus protection and have an active firewall Install and regularly update antivirus protection and a firewall. 6)Avoid using public computers Wherever possible, use your own secured network, which you have control over. If using a public network, avoid doing things like internet banking. 19
21
Steps to protect your identity 7)Carefully select the websites you use The internet is a great resource, but try to stick to reputable websites particularly when giving over personal information (such as credit card details). 8)Monitor your accounts and statements Regularly check your accounts to ensure that the only transactions which appear are those which you have authorised. 20
22
Steps to protect your identity 9)Destroy your personal information appropriately Keep valuable documents with personal details on them in a safe place. Shred all of your documents before placing them in the rubbish. 21
23
If you think you are a fraud victim There are steps you can take if you think that you may have become a victim of identity crime. Don’t panic or ignore it! 1) Your personal details have been compromised Contact relevant agencies to cancel accounts of change passwords. 22
24
If you think you are a fraud victim 2)You have noticed suspicious/unauthorised activity on your account Contact the relevant organisation immediately to cancel your cards and change your passwords. 3)You receive a bill or statement which isn’t yours Contact the relevant agency immediately to find out what has happened. 23
25
Reporting Fraud You can report fraudulent emails to the Australian Communications and Media Authority via email at: report@submit.spam.acma.gov.au You can report cybercrime to the Australian Cybercrime Online Reporting Network (ACORN): www.acorn.gov.au 24
26
ID theft support service If you have experienced identity theft there is a free support service available – www.idcare.org www.idcare.org – AUS toll free number 1300 432 273 iDcare can assist with information on who you should contact and assist you to put together a recovery plan. 25
27
Conclusion The internet is a great way of sharing and storing personal information, however care must be taken when doing this. By following the steps outlined in this presentation, you should be able to enjoy the internet in a safe and confident manner, knowing that your identity is secure. 26
28
Revision scenario 27
29
Revision scenario 28
30
Revision scenario 29
31
Revision scenario 30
32
Questions?
33
Further information… For more information about other modules in this series: www.pcyc.org.au/Clubs/Carindale/SeniorsOnlineSecurity.aspx For more information about reporting cybercrime: www.acorn.gov.au For more information about online security issues: www.scamwatch.gov.auwww.scamwatch.gov.au or www.cybersmart.gov.auwww.cybersmart.gov.au For more information about computers and technology: www.ascca.org.au 32
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.