FRAUD PROTECTION AND ONLINE SAFETY 2015 EDITION

Size: px
Start display at page:

Download "FRAUD PROTECTION AND ONLINE SAFETY 2015 EDITION"

Transcription

1 FRAUD PROTECTION AND ONLINE SAFETY 2015 EDITION 1

2 Table of Contents Mobile Device Settings Creating & Managing Passwords Phishing & Imposter Scams Healthcare, Charity, and Lottery Scams Identity Theft Fighting Fraud AARP TEK Notes AARP TEK, along with the AARP Fraud Watch Network, want to help ensure that you are doing what you can to be SAFE online. This course is designed to help you identify scams and threats to your online security. During this hands-on workshop, you'll be given tips for identifying and avoiding scams, protecting your identity, and shown how to choose and manage passwords. You will also be advised on how to set up your mobile devices and locate them if they are missing. AARP TEK has a goal of making your online life as safe and secure as possible so that you may have a fulfilling and enjoyable online experience. 2 Real Possibilities is a trademark of AARP. Android is a trademark of Google, Inc. Apple is a trademark of Apple, Inc. This program is not in any way affiliated, endorsed, or sponsored by Google, Inc. or Apple, Inc.

3 Mobile Device Settings There are risks associated with any technology. Like desktop computers, mobile devices are vulnerable to viruses and malicious software. The theft of mobile devices is on the rise across the country. Smartphones have a high resale value, and often contain personal information that can be used by identity thieves. This makes mobile devices an appealing target for robbers and identity thieves. Protecting yourself from these threats will allow you to enjoy the benefits of modern technology. The first step towards protecting yourself is locking your device with a passcode, password, swipe pattern, or biometric code. Securing Your ios Device To Turn on Passcode Lock in ios Passcode Lock requires you to enter a 4 digit code each time you unlock your device, helping keep your information secure. Tap the Settings App Tap Passcode Tap Turn Passcode On Tap Simple Passcode Enter a 4-digit number to be used as your code Re-enter number confirm. You're now protected! All iphones since the model 5s include Touch ID, a sensor which allows you to unlock your phone using just your fingerprint. This is an example of a biometric code. If your iphone has a metal circle around the home button, then it has Touch ID. ios Lock Screen Securing Your Android Device To Turn on Pattern Lock on Android Tap the Settings app Tap Security Tap Screen Lock Tap Pattern Draw a pattern with your fingertip Tap Continue Draw the same pattern again Tap Confirm. That's it, you secured your phone! In addition to the Pattern Lock, Android phones can use a PIN (like ios) or a password for protection. Android Pattern Lock TEK TIP: Only download apps from the Apple App Store or Google Play Store. These apps are safe from malware. It's a good practice to read user reviews before downloading new software. 3

4 Mobile Device Settings Updating Your Device's Operating System Your mobile device is a powerful computer, and should be maintained just like a desktop computer. It's important to keep your software up to date, especially your device's operating system. How to Update ios Tap the Settings App Tap General Tap Software Update If there is an update available, tap Download and Install Note: Connect to Wi-Fi to download the update. How to Update Android Tap the Settings app Tap About Phone or About Tablet Tap System Updates You will be asked if you want to install any update Tap Yes. Note: Connect to Wi-Fi to download the update. Protecting Your Mobile Device & Data It's important to know how to protect your data and prevent it from falling into the wrong hands. If a thief steals your mobile device, then they could have access to the data stored on it. You can track your mobile device, and remotely delete the data off of it before any harm is done. Here's how: How to Locate Your ios Device To Turn on Find My iphone in ios Tap the Settings App Tap icloud Sign in with your Apple ID Tap Find My iphone to the on position Tap Send Last Location to the on position. If your ios device is missing, log onto icloud.com/find to locate it, play a sound to help find it (if nearby), lock it, prevent purchases being made from it, or erase your data. How to Locate Your Android Device To Turn on Android Device Manager Tap the Google Settings app Tap Security Tap Remotely locate this device to on position Tap Allow remote lock and erase to on position. If your Android device is missing, log onto android.com/ devicemanager to locate it, ring it (if nearby), lock it, or erase your data. Note: Your device needs to be signed into your Google Account and also have location services turned on for Device Manager to work. 4

5 Mobile Device Settings Backing Up Your Information It's important to back up your data and device settings. This protects you from losing your data if theft or loss occur, and also helps if you damage or upgrade your device. protect your Privacy by setting your location services To Use Android Backup Service Tap the Settings App Tap Backup & reset Tap Back up my data to on position. Tap Backup account to assign a Google account if you don't already have one. TEK TIP: Your backup data includes calendar info, Wi-Fi passwords, settings and more, making it easy to restore your data if you switch to a new device! To Backup Using Apple icloud Tap the Settings App Tap icloud Tap Backup Tap icloud Backup to on position. Note: icloud Backup stores documents, photos, and settings in a large file. This requires your device to be plugged in and connected to Wi-Fi in order to backup. Location Services There are many positive reasons for allowing apps to access your location. For instance, you can get weather alerts, view directions, find nearby restaurant locations, and locate your device if it's lost. The potential downsides of using location services include unintentionally broadcasting your location through geo-tagged photos, or inadvertently allowing apps to track your location when you're not using them. Consider controlling which apps get to use your location, and when they have access to it. How to Change Location Services Tap the Settings App Tap Privacy Tap Location Services Choose which apps can access your location and to what degree. You choose whether they Never have access, Only when using app, or Always have access. How to Change Location Services Tap the Settings app Tap Location to toggle location services on or off Tap Recent location requests to see individual app settings. Note: Location services can affect battery life. Limiting the accuracy of the service can preserve battery life. 5

6 Creating & Managing Passwords Creating Passwords A password is a secret word, phrase, or string of characters used to prove identity or gain access to a resource. Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. A password's strength is an estimate of how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability. How to Create a Strong Password Make your password long and strong, with a minimum of eight characters and a mix of upper and lowercase letters, numbers and symbols. Never share your password with others. If you suspect someone knows your password, change it. Make your password unique to your life and not something that is easily guessed. Don't use the names of any family members or pets, birthdays, or single short words. Avoid using an easy to research password that is publicly associated with you. Are there clues to your password on your social media pages, genealogy websites or on classmates.com? Use memorable phrases such as: Remember2buymilk&12eggs! You can use the first letter of words in a long phrase: R2bm&12e! Have a different password for each online account. Consider using one good password for all low risk accounts. Those are accounts that would have little consequence if someone else gained access (such as online news or magazines). Write your password down and store it in a safe place away from your computer. Change your password several times per year. Don't allow your browser to remember passwords to sites where you transfer sensitive information, such as banking, medical, or shopping sites. Password Managers are secure and easy to use! Managing Passwords It can be difficult to keep track of multiple passwords. Many people choose to use a password manager. A password manager creates strong, unique passwords for every website and app and keeps track of them for you. All of your passwords are protected by a single master password that only you know. When you visit a website, it will fill in your login information. Some examples of password managers include: 6 1Password Dashlane LastPass Two Factor Authentication Two factor authentication (2FA) is a process that requires you to log in to an account using a back up code in addition to using your password. 2FA provides an additional layer of security. It requires both something you know (like a password) and something you have (your mobile phone). When you log in on a site with 2FA, they will often send you a code by text message that you have to enter before you can access the site.

7 Phishing & Imposter Scams Phishing Scams Phishing is attempting to acquire sensitive information such as usernames, passwords, banking information, or credit card details by masquerading as a trustworthy entity. When sent through , scammers may attempt to replicate the look of reputable businesses. Scammers have a goal of trying to fool the recipient to click or tap on a link, enter info on a website, or open an attachment. By clicking links, the recipient s computer can be infected by malicious software called malware. Malware can give attackers access to the recipient's device, including their , hard drive, and files. How to to Create Identify a Strong a Phishing Password Scam They get your attention through alarmist messages and threats of account closures. Never click or open a link in a suspicious or text! They often make promises of easy money. They entice you with deals that sound too good to be true that you have to act fast to get. They often capitalize on newsworthy events like natural disasters to ask for donations. Many of the s use bad grammar and have poor spelling. If you suspect an may be fraudulent, then check the URL (web address) of any links that it contains or call the company to verify its authenticity. The sender's address does not come from the entity's domain. For example, an from Amazon should be sender@amazon.com not Amazonhelp@bitbybit3712.com. Imposter Scams An Imposter contacts you asking for personal information or money, while pretending to be somebody else. These scams can occur through , calls, texts, social media, or online pop-ups. Be Aware of These Common Imposter Scams Romance & Dating The imposter manipulates their intended victim into feelings of love and friendship, then asks for money. Tech Support Someone pretends to be tech support that wants to repair your computer online. Grandparent The imposter calls or s claiming to be your grandchild or friend and in need of money. Fake Government Agency The imposter pretends to be from a Government Agency, most commonly the IRS, and needs personal information or settlement. Friend Request from Duplicate Friend on Facebook The imposter pretends to be one of your friends to get access to your personal information or ask you for money. 7

8 8 Healthcare, Charity, & Lottery Scams Healthcare Scams Healthcare scams typically involve a criminal contacting you and saying that you need a new Medicare Card, a new Health Insurance Card, or he tries to sell you discounted Health Insurance. How to Avoid a Healthcare Scam If you think you may be getting scammed, hang up the phone. If you think it may not be legitimate, delete the . Simply ignore it. Don't engage the scammer at all. If you think it's a Medicare scam, contact the Medicare office using the phone number on your Medicare card to check your status. Stay current with Medicare coverage by visiting Lottery Scams In a lottery scam, someone contacts you by , mail, or phone and tells you that you've won something. Often, they'll tell you that you need to confirm personal information or pay fees before receiving your prize. They may ask you to wire money or give them credit card information and tell you that it's urgent. How to Avoid a Lottery Scam Never wire money or give a credit card. Don't share any personal information. Ignore the request. Charity Scams Charity scams defraud people by soliciting help with natural disaster relief, cancer, or other public health emergencies. There are many charitable organizations that were formed with the intent of creating wealth not health. If you're thinking of donating to a charity, there are several steps you should first take to assure that your generosity benefits the people you intend to help. How to Avoid a Charity Scam Check the charity's score on Charity Navigator ( Find out what percentage of donations go to the actual program, versus administrative and fundraising costs. Get detailed information about the charity, including all contact info and written descriptions of the programs that they support. Don't be fooled by a name of a respected charity or one that sounds like a respected charity. Check their reputation by doing an online search with their exact name followed by "complaint" or "scam". Never wire money, or send cash. Keep a record of your donations. Never give them your social security number. Ask for their tax-exempt letter indicating their IRS status.

9 Identity Theft Identity Theft occurs when someone uses your personal information to fraudulently obtain goods or services. This can result from imposter scams, data breaches, and theft. The Federal Trade Commission receives more complaints regarding identity theft than for any other scam. How to Prevent Identity Theft Protect your information online by using strong passwords, locking your mobile devices, and never giving out your social security number, bank account numbers, PINs, or passwords to organizations you don't know or haven't researched. Monitor your accounts by using Online Banking and Credit Cards apps. If something is off, you'll know when it happens and be able to act on it. A high percentage of people have never set up their online banking or credit card accounts. This is the best way to check your banking and credit card activity in real time. Don't use public Wi-Fi to access your banking or credit card accounts. Use only secure networks or your cellular service. Change your passwords often or use a password manager. Don't post your birth year online. Monitor your credit score at TEK TIP: You can register your phone numbers at the national Do Not Call Registry to reduce the number of unsolicited phone calls you receive. You can do so online at or by calling 1 (888) Don't give yo personal ur informat to anyone ion first confwithout irm that they'r ing trustwor e thy! 9

10 Fighting Fraud AARP launched the Fraud Watch Network to give people the resources to spot and avoid ID theft and fraud so they can protect themselves and their families. Non-members and members alike can get Watchdog Alerts, stay up to date on con artists latest tricks, or talk to a real person for help. Anyone interested in this information can access it free of charge. How to Get Watchdog Alerts Visit the AARP Fraud Watch Network on your computer or mobile device at Click or tap on Get Watchdog Alerts Fill out the online form Click or tap on That's it! Now you'll receive the latest info on new scams and con artists from AARP. After joining the AARP Fraud Watch Network, you'll have educational resources to guide you in learning about the latest scams, you'll get tips on how to spot them, and learn about how con artists think and work. You can also view the nationwide scam tracking map and have an opportunity to share your own experiences which will help us to fight fraud together. You can call AARP's Fraud Watch Network Helpline at (877) to have a live person help you and advise you. What you can do if you've experienced fraud Report it, even if it seems like a waste of time. You may help others! Call all of your financial institutions and credit bureaus Report to Police Report to the FBI. You can report scams or spam to spam@uce.gov. Visit the FBI's website to learn where and when to report crimes to the FBI at File a complaint at This creates an identity theft affidavit which helps you file a police report Join the AARP Fraud Watch Network at Share your story to the Fraud Watch Network Scam Map at Contact the AARP Fraud Watch Network Helpline (877) Share this information with friends to help them protect themselves from fraud 10

11 AARP TEK This program is generously supported by Consumer Cellular. Intro to Tablets and Smartphones If you are new to mobile technology, this beginner course is for you! Join us for a hands-on workshop that can empower you with mobile device skills from Touchscreen Basics, to Texting, Taking & Sharing Photos, Downloading Apps and more. Beyond the Basics: Tablets & Smartphones Learn tips and tricks that will help you UP your tech game. Explore Photo Editing and Cloud Photo Sharing, Streaming Free Music, Texting Tips, Speech-to-Text, controlling your device with your Voice, Maps and much more. Mobile device experience recommended. Intro to Facebook and other Social Networks Ready to join billions of people who are connecting online using social networks like Facebook and Twitter? There are numerous social networks which allow you to keep in touch with family and friends, stay current on world news and expand your professional network. Get hands-on experience connecting with friends and businesses on Facebook and learn how to stay safe by managing your privacy settings. Before attending, sign up for a free Facebook account and bring your login information. Fraud Protection and Online Safety If you want to ensure that you are doing what you can to be SAFE online, then this course is for you. This hands-on workshop will advise you on how to better protect yourself and your family online, tips for identifying and avoiding scams, and how to set up, back up and track your mobile devices if they go missing. Seen one of these? It s a QR Code! Scan them with your device using a QR reader app such as Red Laser or Barcode Scanner and you ll be taken straight to a website. Visit to view our tutorial videos and learn about the upcoming workshops! 11

12 NOTES Version

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Social Media and Cyber Safety

Social Media and Cyber Safety Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant andrew@justbesafe.com Social Media and Cyber Safety Our instructor today

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

Fraud Protection module

Fraud Protection module Fraud Protection module Trainer s Introduction While the vast majority of financial transactions are legitimate and honest, the few fraudulent ones can be costly and damaging. By recognizing the warning

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

Protection from Fraud and Identity Theft

Protection from Fraud and Identity Theft Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...

More information

Online Security Tips

Online Security Tips Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized

More information

Fraud Prevention Tips

Fraud Prevention Tips Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back

More information

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself

More information

S.A.F.E. Recognize a scam before you become a victim of fraud Division of Consumer Protection

S.A.F.E. Recognize a scam before you become a victim of fraud Division of Consumer Protection S.A.F.E. Senior Anti-Fraud Education Recognize a scam before you become a victim of fraud New York StaTe Department of State Division of Consumer Protection Advocating for and empowering New York consumers

More information

Identity Theft Awareness: Don t Fall Victim to these Common Scams

Identity Theft Awareness: Don t Fall Victim to these Common Scams Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with

More information

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against

More information

Cyber Security. Securing Your Mobile and Online Banking Transactions

Cyber Security. Securing Your Mobile and Online Banking Transactions Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

Advice about online security

Advice about online security Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP

More information

Advance Fee Loans. Computer Malware Scams. Credit Repair Scams

Advance Fee Loans. Computer Malware Scams. Credit Repair Scams Advance Fee Loans Scam artists can trick you into paying money to qualify for a loan or credit card. Despite their guarantees, you do not receive a loan, credit card, or any money. Never pay money to qualify

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee

Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee Government Grants The government gives grants to special people like you! Stimulus money is still available through

More information

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

Recognizing Spam. IT Computer Technical Support Newsletter

Recognizing Spam. IT Computer Technical Support Newsletter IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the

More information

Google 2 factor authentication User Guide

Google 2 factor authentication User Guide Information Technology Services Centre Google 2 factor authentication User Guide Description: This guide describes how to setup Two factor authentication for your Google account. Version: 1.0 Link: Effective

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

what you need to know

what you need to know A P Identity u b l i c a t i o n o f t h e S o u t h C a r o l i n a D e p a r t m e n Theft t o f C o n s u m e r A f f a i r s what you need to know Step By Step: What To Do After a Security Breach #1:

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

Smart Ideas for Smartphone Security

Smart Ideas for Smartphone Security Page 1 of 6 8814 Fargo Road, Suite 105 Richmond, Virginia 804.360.4490 www.seltekinc.com July 2013 Computer Forensics IT Support Security ediscovery Security Apps for your Smartphone Smart Ideas for Smartphone

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something

More information

How to wipe personal data and email from a lost or stolen mobile device

How to wipe personal data and email from a lost or stolen mobile device IS Doc no 858 How to wipe personal data and email from a lost or stolen mobile device This document explains what to do if your mobile device (iphone, ipod Touch, ipad, mobile phone etc.) is stolen or

More information

Fraud. Spot it.stop it. Keep Your Finances Safe

Fraud. Spot it.stop it. Keep Your Finances Safe Fraud Spot it.stop it. Keep Your Finances Safe 2003 MasterCard International Incorporated. All rights reserved. MasterCard is a registered trademark of MasterCard International. DON T PAY A HIGH PRICE

More information

Protect Yourself From Identity Theft

Protect Yourself From Identity Theft Protect Yourself From Identity Theft Identity theft occurs when a criminal uses another person's personal information to take on that person's identity. Identity theft is much more than misuse of a Social

More information

guide to staying safe online How to shop, bank, socialise and protect your identity online.

guide to staying safe online How to shop, bank, socialise and protect your identity online. THE Mcafee guide to staying safe online How to shop, bank, socialise and protect your identity online. contents 1 Introduction 2 Today s Internet: Proceed with Caution 3 Consider the Upsides 4 Be Aware

More information

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense 1 of 5 11/17/2014 4:14 PM 800.268.2440 From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense Share This Every other week it seems like there is another secure data breach

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

More information

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them The Increasing Threat of Malware for Android Devices 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them INTRODUCTION If you own a smartphone running the Android operating system, like the

More information

Safeguarding Your information and accounts

Safeguarding Your information and accounts Safeguarding Your information and accounts D Bank with confidence The security of your funds and information is a top priority at Liberty Bank. We do our utmost every day to prevent fraud and identity

More information

2015 MDRT Annual Meeting e Handout Material. What is Your Smartphone Leaking?

2015 MDRT Annual Meeting e Handout Material. What is Your Smartphone Leaking? 2015 MDRT Annual Meeting e Handout Material Title: Speaker: What is Your Smartphone Leaking? Anwar Visram, CISSP Presentation Date: Wednesday, June 17, 2015 10:00 11:00 a.m. The Million Dollar Round Table

More information

Mobile Operating Systems & Security

Mobile Operating Systems & Security Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens

More information

I dentity theft occurs

I dentity theft occurs 1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,

More information

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE Defense Media Activity TABLE OF CONTENTS PROTECTIVE MEASURES... 2 PREPARATION CHECKLIST... 2 IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THE FOLLOWING

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Securing your credit *

Securing your credit * CYBER SAFETY Securing your credit * In the United States, your identity and credit history can be used to secure loans and insurance policies, to gain employment, and to open credit cards. With so much

More information

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required

More information

U.S. Cellular Mobile Data Security. User Guide Version 00.01

U.S. Cellular Mobile Data Security. User Guide Version 00.01 U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4

More information

How To Help Protect Yourself From Identity Theft

How To Help Protect Yourself From Identity Theft How To Help Protect Yourself From Identity Theft January 20, 2015 Bryan Strong Senior Vice President and Director Information Security This complimentary interactive webinar is sponsored by Zions Bank

More information

What does the First Mobile app do for me? What else can I do with the mobile banking app beyond the basics? Why should I use the mobile banking app?

What does the First Mobile app do for me? What else can I do with the mobile banking app beyond the basics? Why should I use the mobile banking app? What does the First Mobile app do for me? What else can I do with the mobile banking app beyond the basics? Why should I use the mobile banking app? How do I sign up to use mobile banking? What type of

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

Cyber Security. Maintaining Your Identity on the Net

Cyber Security. Maintaining Your Identity on the Net Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD

More information

Banking at the speed of your life. Online. Mobile. Superior. Safe.

Banking at the speed of your life. Online. Mobile. Superior. Safe. Banking at the speed of your life. Online. Mobile. Superior. Safe. PARKSTERLING Answers You Can Bank On. At Park Sterling Bank, we know that there are times when our answer can help expand a child s future,

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

Office of the Privacy Commissioner of Canada. Identity Theft and You

Office of the Privacy Commissioner of Canada. Identity Theft and You Office of the Privacy Commissioner of Canada Identity Theft and You There have always been scammers who pose as somebody else to carry out fraudulent activities. With today s proliferation of technology,

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1 P a g e 1 Internet Basics ABOUT THIS CLASS This class is designed to provide a basic introduction to accessing and navigating the internet (a.k.a. the world wide web or the web ). Throughout the class,

More information

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

Information Security Field Guide to Identifying Phishing and Scams

Information Security Field Guide to Identifying Phishing and Scams Information Security Field Guide to Identifying Phishing and Scams 010001010100101010001010011010101010101010101 01000101010011010010100101001010 1 Contents Introduction Phishing Spear Phishing Scams Reporting

More information

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account

More information

Fraud Information and Security

Fraud Information and Security Fraud Information and Security Updated: January 13, 2015 How We Protect You At WySTAR Global Retirement Solutions security is a top priority. We understand that your trust in us depends on how well we

More information

Introduction to Computing @ WSU

Introduction to Computing @ WSU Introduction to Computing @ WSU Table of Contents 1 - Account Information... 2 2 - Setting up Accounts for First Time Use... 3 3 - Important Systems... 4 4 - CaTS Website... 5 5 - Logging into the Campus

More information

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National

More information

Getting to know your ipad For Beginners

Getting to know your ipad For Beginners Getting to know your ipad For Beginners In this guide you will learn how to: o Switch your device on/off. o Tap, swipe, and pinch to navigate your device. o Secure your device set a password. o Change

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

General Security Best Practices

General Security Best Practices General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

suntrust.com 800.SUNTRUST

suntrust.com 800.SUNTRUST suntrust.com 800.SUNTRUST SunTrust Bank is an Equal Housing Lender. Member FDIC. 2010 SunTrust Banks, Inc., SunTrust, Live Solid. Bank Solid., SunTrust Rewards, and Signature Advantage Checking, are federally

More information

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage. Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on Are you a Target? On-Line Scams Credit/Debit Card Investment Identity Theft Frauds Scams Mark the following

More information

Seven Practices for Computer Security

Seven Practices for Computer Security A WorkLife4You Guide Seven Practices for Computer Security Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than

More information

Credit Card Fraud Training

Credit Card Fraud Training Credit Card Fraud Training Lesson Plan A Consumer Action Publication Consumer Action created this project in partnership with Chase 2009 Consumer Action Credit Card Fraud Training Lesson Plan (For the

More information

DSHS CA Security For Providers

DSHS CA Security For Providers DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public

More information

Identity Theft and Online Security

Identity Theft and Online Security Identity Theft and Online Security ACI-588788 American Century Investment Services, Inc. Goals for Presentation Identity Theft - What is it and how are we at risk? Social Media - How much online security

More information

A Guide to Protecting Yourself From Identity Theft

A Guide to Protecting Yourself From Identity Theft A Guide to Protecting Yourself From Identity Theft 2010 Capital One. Capital One is a registered trademark. At Capital One, we understand that Identity Theft is a frustrating, and sometimes frightening,

More information

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft? Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat

More information

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal

More information

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE 2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE WHO ARE WE? 12 years of local Tech, Training and Website services Service the 4 areas of life Regularly

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................

More information

Online Services User Guide

Online Services User Guide Online Services User Guide Welcome to online banking! Whether you re online or using a mobile device, access your accounts whenever and wherever it s convenient for you. Log In: BankMidwest.com Online

More information

Understand What s Going On

Understand What s Going On Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud

More information

A Parents' Guide to Cybersecurity

A Parents' Guide to Cybersecurity A Parents' Guide to Cybersecurity In partnership with Top 5 Questions Parents Have About Cybersecurity 1.What are the biggest security threats to kids? Children and teens can be caught by the same kinds

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

Internet basics 2.3 Protecting your computer

Internet basics 2.3 Protecting your computer Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from

More information

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you. At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well

More information

Identity Theft and Fraud Prevention

Identity Theft and Fraud Prevention Identity Theft and Fraud Prevention Jill Mecklenburg, Crime Prevention Specialist Richfield Police Department Statistics In 2011, over 11.2 million Americans were victims of identity theft. The total U.S.

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360. Norton 360 Our ultimate protection, now even more so. Introducing the new Norton 360. Our ultimate Internet and antivirus protection for all you do online Provides proactive protection, so you can do what

More information