Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.

Similar presentations


Presentation on theme: "Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost."— Presentation transcript:

1 Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost anything online, apply for a job, make a financial transaction and have access to many effective tools to simplify life. Just like most things in life, there are pros and cons as our technology advances. As more and more information is shared online, identity theft also is growing. College students are becoming the new target for easy identity theft. Sharing overload has given power to a world of criminals. The following instructions will help you to ensure you have the tools and information necessary to protect your identity. Taking even these basic steps could save you from the financial nightmare of identity theft. Materials Needed: Materials Needed: Laptop, Tablet, PC, Mac, Cell Phone and a secure data or Wi-Fi connection

2 Social Media: Social Media: 1. Limit the personal information available in your profile. Never list full date of birth, phone number, or physical address. You can make these changes by clicking “edit profile” to minimize information shared. Make sure passwords don't include personal items such as birthdate, pet’s name, or any other information that could unintentionally provide password information. 2. Proactively manage your social networking account. Most social networking sites are configured to make it very easy for others to find you. Use your "privacy settings" by giving "only my friends" access. 3. Limit the amount of "time and place" data that you expose. Turn off your location data on a Facebook posting by clicking the “x” next to your provided location. This will help protect against providing identity thieves with your address. Free Wi-Fi Dangers: Free Wi-Fi Dangers: 1. NEVER use public Wi-Fi to log in to your financial sites. Public or free Wi-Fi makes you extremely vulnerable to hackers or a nosy neighbor. 2. When using public Wi-Fi ensure the site is using a secure encrypted connection. To determine if a website is encrypted, look for https at the start of the web address (the “s” is for secure). 3. Change default Wi-Fi connection settings on PC, Mac or phone. If you are a windows user, in the advanced settings of “Wireless Network Connection properties” (“Advanced“ button on “Wireless Networks” tab), choose “Access Point networks only”. The default is “Any available network” and this is not safe. If you are a Mac user: In Network Preferences, choose “By Default”, join “Preferred Networks” and edit your preferred Network to include only trusted sources.

3 Tools to Protect Against Identity Theft: Tools to Protect Against Identity Theft: 1. Have Anti-Virus software installed on your PC and Mac. There are many anti-virus software programs that will assist you in detecting any potential security risks and will provide any possible solutions to any problems that may be found. 2. Use Mobile Phone and Tablet Security. Cell phones need security because they are used to perform transmissions of personal information. Lookout Mobile Security is a tool you can use to scan your mobile device and computer for viruses and malware. It will also locate a missing device, lock personal files remotely and remote wipe all personal data from device. You can download the app at lookout.com 3. Ensure a password is installed on mobile phone, laptop or tablet. Passwords are a first line defense to identity theft. Not only do you need to password protect devices online, you also need to password protect you devices from any potential identity thefts sitting around you in a public area. Phishing Scams: Phishing Scams: 1. Do not provide personal information in response to a request via email. If a request has been made to provide personal information, initiate contact with the institution directly. Do not respond to the email. 2. Do not divulge personal information over the phone unless you initiate the call. Identity thieves will use convincing calls in attempts to gain personal information or financial payment. 3. Guard against spam. Be cautious of emails that come from unrecognized senders, ask for personal or financial information, make urgent requests for information, aren’t personalized, try to upset you into acting quickly by threatening you with frightening information. 4. Delete spam messages from email.

4 4. Check your credit report annually. You are allowed, by law, to receive one free credit report a year. Checking your credit report annually will provide you with any possibilities of identity theft. You will be able to view all active and or delinquent accounts open underneath your identity. For additional resources on identity theft protection, please view the websites listed below: https://www.consumer.ftc.gov https://www.idtheftcenter.org https://www.usa.gov/identity-theft https://www.ncpc.org/topics/fraud-and- identity-theft/tips-to-prevent-identity- theft For additional resources on software and tools to assist with managing the security of your identity, please view the websites listed below : https://www.lifelock.com https://www.identityguard.com https://www.Lookout.com https://www.IDCuffs.com https://www.mcafee.com


Download ppt "Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost."

Similar presentations


Ads by Google