Personal. Protecting Yourself in a Digital World

Size: px
Start display at page:

Download "Personal. Protecting Yourself in a Digital World"

Transcription

1 Personal Protecting Yourself in a Digital World MyGenFCU.org 1

2 Identifying Fraud The world is now more connected than any other time in our history. In this era of smartphones, we can text, , use a tablet vs. a laptop, engage on social media, play games and even pay our dinner tab on our phone without ever interacting with a person. This interconnectivity has become such a normal, accepted part of our daily lives that many of us would hardly bat an eye or question the authenticity of a text, or a website we visit. This auto-response mode of trust increases the chances that we may fall victim to identify theft. There are many ways fraudsters can deceive you. Sophistication and convenience are the main tactics fraudsters employ to capture your private information. To help you stay protected and informed, we ve put together this resource of common fraud methods and practices. Phone and Mail Fraud Despite the digital age, many fraudsters still send out legitimate-looking mail or place official-sounding phone calls because of their high success rate. According to the FBI, one of the most common types of identity fraud pervading both the phones and mailboxes is telemarketing fraud. Fortunately, this type of fraud tends to follow a familiar pattern of making all sorts of grand promises, including work-at-home offers, property taxes, inheritance claims, health and medical products and more. Prevention is the best policy to avoid being taken by one of these scams. Remember: Don t buy from an unfamiliar company - A legitimate business understands you want more information about their company and will be happy to provide it. Always ask for written material about any offer or charity - beware, not everything written down is true. Always check out unfamiliar companies - Some sources you should check are your local consumer protection agency, the Better Business Bureau, the state attorney general and the National Consumer League. Obtain a salesperson s name, business identity, telephone number, street address, mailing address and business license number - Verify the accuracy of these items. Don t pay in advance for services - Pay for services only after they are delivered. Be wary of companies that want to send a messenger to your home to pick up. Don t pay for a free prize - This practice is a violation of federal law, even if you re told it s for taxes or shipping and handling. Source: FBI.gov 2

3 Fraud For scammers, provides an easy way to commit mass fraud while maintaining a safe distance from local law enforcement. Often, scammers lure victims using the baitand-switch method with look -alike s that mirror legitimate organizations. These fraudulent s usually send visitors to a fraudulent but authentic-looking website to get them to divulge their sensitive information. To protect yourself from these scams, you should understand what they are, what they look like and how they work. Here are some common fraud schemes initiated through Sophistication and convenience are the two main tactics fraudsters employ to capture your private information. 1. Bogus Business Opportunities These scams promise the opportunity to make a great deal of money with very little effort, with proclamations of: Work only 10 hours a week Set your own hours Work from home In most cases, the gives very little detail about the nature of the business opportunity and provides a website address from which visitors can, for a fee, obtain an information kit about the opportunity. 2. Health and Diet Scams This type of scam preys on the insecurities victims have about the state of their wellbeing. Consumers are lured with promises of quick fixes, amazing results, discount pricing, fast delivery, waived prescription requirements and discreet packaging. 3. Discount Software Offers These scams offer promises of cheap versions of software, such as Microsoft Windows or the Adobe Creative Suite. Unfortunately, if any software is delivered, it is usually an illegal, pirated version preloaded with a virus to exploit your computer and the sensitive information it contains Scheme aka The Nigerian Letter Named after the section of the Nigerian penal code that addresses fraud, 419 scams are the most recognizable by their subject lines, which frequently: Call for an urgent response (URGENT REPLY NEEDED) Refer to a personal introduction (Re: Pleased to meet you!) Use African or African-inspired sender names 3

4 Although the exact may vary, overall it usually proposes a complicated arrangement to secure and split funds in a foreign land. Despite the outlandishness of these schemes, they hook many victims. 5. Phising These s are crafted to look as if they are sent from a legitimate financial institution, such as a major bank or credit union and then instruct you into either: visit a bogus website that looks like the real thing, or download viruses or software intended to compromise your computer and reveal personal information. Although most applications include spam-filtering features, it s impossible for these features to filter out everything, especially if the scammers use subtle spelling mistakes to circumvent spam filters looking for certain commonly used keywords. A healthy dose of suspicion, combined with the following practices will ensure you stay protected: Don t trust unsolicited Remember, many viruses spread themselves by scanning the victim s computer for addresses and sending s to those addresses in the guise of an from the owner of the infected computer. Treat attachments with caution attachments are commonly used to sneak a virus onto your computer, steal important information from your computer, open your computer to further attack and abuse, or convert your computer into a bot for use in denial-ofservice attacks and other online-crimes. Install anti-virus software and keep it up to date Install anti-virus software on your computer that has an automatic update feature and includes an scanning option. Configure your client for optimal security There are many ways you can configure your client to make you less susceptible to scams. For instance, configuring your program to view as text only. Source: US-CERT 4

5 Online Fraud Beyond , general online fraud is a growing hazard that exploits security vulnerabilities through the use of malware to install malicious software into a user s computer. Some f the most common examples of malware include: Keyloggers and Screenloggers -- programs that install themselves into a web browser or as a device driver that monitors data being input and sends it to a phishing server. Redirectors - programs that intercept outgoing s or instant messages and send an additional copy to a secret address. Session Hijackers - programs that monitor browser activities, particularly when the user logs into a financial account. Once the user s credentials are established, the software performs malicious actions. Web Trojans - programs that pop up over login screens to collect credentials. These appear to originate from a legitimate website, but are being entered locally into the program and then transmitted out. Cyber crime is a crime of opportunity that doesn t discriminate between a home user and a big Fortune 500 company. If hackers find a vulnerability that presents an opportunity for fraud, they will take it. Follow the steps below to stay protected: Choose a secure password - Don t base them on personal information (e.g. mother s maiden name, social security number, birthdays, etc.) and use a combination of upper/lowercase letters, numbers and special characters that are at least eight characters long. Check the security of online merchants - The secure status of a website will be shown in one of the bottom corners of your browser window through the display of some sort of padlock icon. Also, the website s URL address should begin with the secured prefix https rather than the unsecured http. Make sure the web address is spelled correctly- Often, scammers will create websites that duplicate legitimate ones with a similar URL address that simply transpose or duplicate a letter in the site address. Do not click on links to other websites - If uncertain about links contained within a website, leave the site and conduct a separate search for that page. Disconnect your computer from the Internet when you aren t using it- Even with firewall and anti-virus software, it is possible for hackers to gain access to your computer if your Internet is connected. Evaluate your security settings- Check your security settings within your browser options and ensure it is set to at least the minimum level recommended by the browser software makers. Back up all your data- In the event that your computer is infected with a virus that wipes out your data, ensuring an up-to-date backup copy is available will allow you to restore your system much quicker. Source: Department of Homeland Security 45

6 Smishing Smishing -- a combination of SMS texting and phising -- is a criminal practice wherein criminals set up an automated dialing system to text people in a particular region or area code with messages similar to: There s a problem with your account, or Your ATM card needs to be reactivated. This message is usually followed by a link to a website or a phone number where the recipient is asked to verify their identity by providing personal information. Armed with that information, criminals can steal from victims bank accounts, charge purchases on their credit card or even create ATM cards connected to these accounts. Again, a healthy sense of skepticism is necessary to protect yourself. Also, following these commonsense practices can help: Alert your financial institutions or agencies, such as the IRS, when you receive a suspicious message - Alerting the proper authorities of possible scams allows them to work toward stopping this activity and/or notifying the general public to prevent them from becoming the victims of a scam. Only provide personal or financial information through an organization s secured website- If you typed in the web address yourself and you see signals that the site is secure, like a URL that begins https (the s stands for secure) and the VeriSign padlock icon in the right of the web address box, the chances of fraud are minimal, but no indicator is foolproof. Only download mobile apps from trusted sources - When downloading mobile smartphone or tablet apps to your device, be sure the app is coming from a trusted source. You should always treat mobile apps the same way you treat websites: with caution. Make sure you fully trust the source before downloading or sharing info. Install an anti-virus program to your mobile device - In the same way many people install anti-virus programs on their desktop computers for added protection, consider installing a similar program to your smartphone or tablet if available for your device. Ask questions- If the message doesn t give you his or her name, a call back number and a valid reason for the request, the message may be attempting to phish for your personal information. Review credit card and bank account statements as soon as you receive them - Check these statements closely for unauthorized charges. If your statement is late by more than a couple of days, call your financial institutions to confirm billing address and account balance information. Be cautious about opening attachments and downloading files- Regardless of who sent them, these files can contain viruses or other malware that can compromise your phone s security. Never share Personal Identification Numbers (PINs)- Your financial institution will never ask you for your PIN. 65

7 Repairing the Damage If you ve fallen victim to one of these types of fraud and feel your identity may be at risk, you must take swift action. If you suspect your identity has been stolen, take the following steps: 1. File a report with your local police or the police in the community where the identity theft took place. 2. Contact one of the three major credit reporting bureaus (TransUnion, Equifax and Experian) and place a fraud alert on your credit report and review your credit reports for unauthorized charges. Contact Information: TransUnion: ; Fraud Victim Assistance Division, P.O. Box 6790, Fullerton, CA Equifax: ; P.O. Box , Atlanta, GA Experian: EXPERIAN ( ); P.O. Box 9554, Allen, TX Check your credit card and financial account statements for suspicious activity. Ask your credit card providers to flag your accounts to require phone authorization for new charges. 4. Close the accounts that you know, or believe, have been tampered with or opened fraudulently. 5. File a complaint with the Federal Trade Commission. You can file a complaint online at by phone at IDTHEFT ( ); TTY: , or by mail: Identity Theft Clearinghouse, Federal Trade Commission, 600 Pennsylvania Avenue, NW, Washington, DC Staying Protected While this interconnected world may present a play land to criminals, there are steps you can take to protect yourself. In addition to a healthy dose of skepticism and commonsense, staying informed of the practices previously discussed will take you even further to ensure your identity stays secure. P.O. BOX SAN ANTONIO, TX

Protect Yourself Against Identity Theft

Protect Yourself Against Identity Theft Protect Yourself Against Identity Theft Watch out for Phishing Attacks! A Message from District Attorney P. David Soares Dear Friends, In the age of the Internet, the information highway runs right into

More information

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

When visiting online banking's sign-on page, your browser establishes a secure session with our server. The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption

More information

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about: financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index

More information

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but

More information

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of

More information

Learning to Detect Spam and Phishing Emails Page 1 of 6

Learning to Detect Spam and Phishing Emails Page 1 of 6 Page 1 of 6 Email provides us a powerful communication tool. Unfortunately, it also provides scammers an easy means for luring potential victims. The scams they attempt run from old-fashioned bait-and-switch

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

What is Identity Theft?

What is Identity Theft? What is Identity Theft? Identity theft is a crime in which someone obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.

More information

Information to Protect Our Customers From Identity Theft

Information to Protect Our Customers From Identity Theft Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns

More information

OIG Fraud Alert Phishing

OIG Fraud Alert Phishing U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a

More information

IDENTITY. theft. Identity theft can happen. to anyone. Previously, criminals stole your wallet. for your cash. Now they. want your wallet to

IDENTITY. theft. Identity theft can happen. to anyone. Previously, criminals stole your wallet. for your cash. Now they. want your wallet to IDENTITY THEFT IDENTITY theft Identity theft can happen to anyone. Previously, criminals stole your wallet for your cash. Now they want your wallet to steal your good name. Protect yourself and your identity.

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

Protecting Yourself Against Fraud and Identity Theft

Protecting Yourself Against Fraud and Identity Theft Summit Branches are conveniently located in Rochester (8), Seneca Falls (1), Buffalo (2), Syracuse (5) and Cortland (2) Protecting Yourself Against Fraud and Identity Theft A presentation by The Summit

More information

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen FTC Facts For Consumers Federal Trade Commission For The Consumer August 2005 Identity Crisis... What to Do If Your Identity is Stolen Maybe you never opened that account, but someone else did...someone

More information

Federal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision

Federal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision YOU HAVE THE POWER TO STOP IDENTITY THEFT A message from the federal bank, credit union and thrift regulatory agencies Board of Governors of the Federal Reserve System Federal Deposit Insurance Corporation

More information

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints

More information

the first ACNB Bank transactionss in ACNB Bank will work number. Information on Thank you

the first ACNB Bank transactionss in ACNB Bank will work number. Information on Thank you Identity theft is a terrible problem in this Information Age. You have already taken the first important step by contacting ACNB Bank immediately. ACNB Bank will work with you every step of the way to

More information

Fraud and Identity Theft. Megan Stearns, Credit Counselor

Fraud and Identity Theft. Megan Stearns, Credit Counselor Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft identity theft unit new york county district attorney s office Protecting Yourself from Identity Theft cyrus r. vance, jr. district attorney 5 / 2010 questions and answers Dear Friends, cyrus r. vance,

More information

Recognizing and Avoiding Email Scams

Recognizing and Avoiding Email Scams US-CERT Summary Email provides us a convenient and powerful communications tool. Unfortunately, it also provides scammers and other malicious individuals an easy means for luring potential victims. The

More information

Fraud Information and Security

Fraud Information and Security Fraud Information and Security Updated: January 13, 2015 How We Protect You At WySTAR Global Retirement Solutions security is a top priority. We understand that your trust in us depends on how well we

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity

More information

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit Identity Theft: It Could Happen To You! Attorney General Tom Reilly s Guide to Protecting Yourself and Your Credit One Ashburton Place ~ Boston, MA 02108 ~ (617) 727-2200 www.ago.state.ma.us February 2005

More information

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE? 1. WHAT HAPPENED (2015 UPDATE)? Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 2. WHAT IS THE ARCHDIOCESE DOING ABOUT THIS? 3. WHAT WERE THE RESULTS OF THE INVESTIGATIONS?

More information

DVD Companion Learning Guide

DVD Companion Learning Guide DVD Companion Learning Guide How to Use This Learning Guide This learning guide is a companion to the DVD, Identity Theft: Outsmarting the Crooks It can be used to guide classroom discussion of the material

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center

More information

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have

More information

Online Security Tips

Online Security Tips Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you. At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well

More information

How To Get A Free Credit Report From A Credit Report Website

How To Get A Free Credit Report From A Credit Report Website FACTS FOR OLDER CONSUMERS National Consumer Law Center Protect Yourself From Identity Theft Identity theft is one of the fastest growing crimes in the country. It can strike anyone, but elders may be particularly

More information

Identity Theft Awareness: Don t Fall Victim to these Common Scams

Identity Theft Awareness: Don t Fall Victim to these Common Scams Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with

More information

ARE YOU A VICTIM OF AN IDENTITY CRIME?

ARE YOU A VICTIM OF AN IDENTITY CRIME? RESOURCE KIT FOR VICTIMS OF IDENTITY CRIME ARE YOU A VICTIM OF AN IDENTITY CRIME? If someone is using your identifying information, (name, date of birth, social security number, etc.), you ARE a victim

More information

IDENTITY THEFT: MINIMIZING YOUR RISK

IDENTITY THEFT: MINIMIZING YOUR RISK IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social

More information

Phishing Scams Security Update Best Practices for General User

Phishing Scams Security Update Best Practices for General User Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to

More information

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH...

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... CONTAINMENT AND CONTROL... INVESTIGATING A SECURITY

More information

Customer Awareness for Security and Fraud Prevention

Customer Awareness for Security and Fraud Prevention Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

How To Get A Credit Card From A Credit Union

How To Get A Credit Card From A Credit Union Refuse to be a target of identity crime. Protecting the Real You and Only You. The International Association of Chiefs of Police 515 N. Washington Street, Alexandria, VA 22314 Telephone: 1.800.843.4227

More information

Identity Theft is a Crime in the State of New Jersey.

Identity Theft is a Crime in the State of New Jersey. NEW JERSEY STATE POLICE Identity Theft: A Victim s Reference Identity Theft occurs when someone uses your personally identifying information like your name, Social Security number, or credit card number

More information

Fraud. Spot it.stop it. Keep Your Finances Safe

Fraud. Spot it.stop it. Keep Your Finances Safe Fraud Spot it.stop it. Keep Your Finances Safe 2003 MasterCard International Incorporated. All rights reserved. MasterCard is a registered trademark of MasterCard International. DON T PAY A HIGH PRICE

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Citi Identity Theft Solutions

Citi Identity Theft Solutions Identity Theft what you need to know Citi Identity Theft Solutions At Citi, we want to keep you informed about all of the issues that can affect your financial life. We re bringing you helpful information

More information

Guide to Identity Theft

Guide to Identity Theft Guide to Identity Theft 1 Receive a free copy of your credit report. Visit www.annualcreditreport.com to get a copy of your credit report from all three credit reporting agencies. Review your credit report

More information

Fraud Prevention Tips

Fraud Prevention Tips Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back

More information

How to Deal With Identity Theft

How to Deal With Identity Theft FREE YOUR MIND http://freeyourmindonline.net How To Recover From Identity Theft Download the Identity Theft Help Kit (http://freeyourmindonline.net/identity-theft-help.html) to go along with this article.

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E

T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E A I D E N T I T Y T H E F T G U I D E Prepared and distributed as a Public

More information

Advice about online security

Advice about online security Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP

More information

Credit Reports. Colorado Bureau of Investigation Identity Theft & Fraud Unit

Credit Reports. Colorado Bureau of Investigation Identity Theft & Fraud Unit Checking your credit reports annually is a great way to detect Financial. Early detection is important and will allow you to report and repair the damage quickly. By following a few simple steps, you will

More information

Email Expanded Header: Viewing in Microsoft Outlook

Email Expanded Header: Viewing in Microsoft Outlook Email Expanded Header: Viewing in Microsoft Outlook Figure 1: Default Shown Header in an Outlook 2003 E-mail Message The Internet header of an e-mail message can have twenty lines or more showing all kinds

More information

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft.

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft. IDENTITY THEFT IDENTITY THEFT Identity theft is a serious crime with serious costs for victims. ID theft occurs when someone obtains your personal information such as your Social Security Number, credit

More information

Important Customer Notice. Information Concerning Data Security Incident at Some Staples Stores

Important Customer Notice. Information Concerning Data Security Incident at Some Staples Stores Important Customer Notice Information Concerning Data Security Incident at Some Staples Stores Staples wants to make customers aware that we have confirmed a data security incident involving customer payment

More information

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Identity Theft, Fraud & You. Prepare. Protect. Prevent. Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

Corona Police Department

Corona Police Department By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,

More information

Pasco County Sheriff's Office Economic Crime Unit. Identity Theft Guide

Pasco County Sheriff's Office Economic Crime Unit. Identity Theft Guide Pasco County Sheriff's Office Economic Crime Unit Identity Theft Guide This kit was designed to assist you in working through the process of resolving the theft of your personal information and to clear

More information

Client Education. Learn About Identity Theft

Client Education. Learn About Identity Theft Client Education Learn About Identity Theft 2 What is identity theft? 6 Detecting identity theft 10 Minimizing your risk 14 What to do if you re a victim The Federal Trade Commission (FTC) estimates that

More information

How to Prevent It What to Do If You Are a Victim

How to Prevent It What to Do If You Are a Victim How to Prevent It What to Do If You Are a Victim www.tn.gov/consumer www.tn.gov/safety Tennessee Division of Consumer Affairs Identity theft happens when someone steals your personal information and uses

More information

E-MAIL & INTERNET FRAUD

E-MAIL & INTERNET FRAUD FRAUD ALERT! FRAUD ALERT! Guarding Against E-MAIL & INTERNET FRAUD What credit union members should know to counter Phishing Pharming Spyware Online fraud On-Line Fraud Is Growing E-Mail and Internet Fraud

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year.

As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year. October 1, 2015 Office of the Attorney General Attn: Security Breach Notification 200 St. Paul Place Baltimore, MD 21202 Idtheft@oag.state.md.us To Whom It May Concern: I am writing on behalf of Scottrade

More information

Cyber Security Survival Guide

Cyber Security Survival Guide Cyber Security Survival Guide 1 Table of Contents First State Bank of Bedias... 4 What is Corporate Account Takeover?... 4 Corporate Account Takeover Awareness and Prevention... 5 Fraud Tactics... 5 Dumpster

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

Frequently Asked Questions [Updated January 20, 2015]

Frequently Asked Questions [Updated January 20, 2015] Frequently Asked Questions [Updated January 20, 2015] Some information in these FAQs has been provided to the Archdiocese of Portland in Oregon by the Internal Revenue Service. Note: Given the immediate

More information

How To Get Help From The Police Department

How To Get Help From The Police Department IDENTITY THEFT A Quick Reference Guide Hawthorne Police Department Identity theft is when somebody uses your personal identifying information such as your name, address, telephone number, taxpayer identification

More information

Letter from the CEO. January 25, 2014. To Our Valued Michaels Customers:

Letter from the CEO. January 25, 2014. To Our Valued Michaels Customers: Letter from the CEO January 25, 2014 To Our Valued Michaels Customers: As you may have read in the news, data security attacks against retailers have become a major topic of concern. We recently learned

More information

HOME DEPOT DATA BREACH

HOME DEPOT DATA BREACH HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

Importance: From: Anthem, Inc. Communications Sent: Thursday, February 26, 2015 4:40 PM Subject: Important message from Anthem, Inc.

Importance: From: Anthem, Inc. Communications Sent: Thursday, February 26, 2015 4:40 PM Subject: Important message from Anthem, Inc. Importance: High From: Anthem, Inc. Communications Sent: Thursday, February 26, 2015 4:40 PM Subject: Important message from Anthem, Inc. An important message from Anthem, Inc. To Members: On January 29,

More information

Identity Theft Assistance: Information for Recovering Your Good Name

Identity Theft Assistance: Information for Recovering Your Good Name Identity Theft Assistance: Information for Recovering Your Good Name I Could Be A Victim of Identity Theft! What Do I Do Next? We understand that you may have been a victim of identity theft. Enclosed

More information

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account

More information

What You Need to Know About Identity Theft. Identity Theft Prevention Tips

What You Need to Know About Identity Theft. Identity Theft Prevention Tips What You Need to Know About Identity Theft Identity theft is the fastest growing crime in America. Criminals who gain access to simply a few pieces of valid personal information can impersonate another

More information

FRAUD ALERT THESE SCAMS CAN COST YOU MONEY

FRAUD ALERT THESE SCAMS CAN COST YOU MONEY FRAUD ALERT THESE SCAMS CAN COST YOU MONEY Phishing spear phishing vishing smishing debit card skimming fake check scams THE COMMON SENSE PRECAUTIONS INSIDE CAN KEEP YOU SAFE! SCHEMES SCAMS FRAUDS Criminals

More information

Recognizing Spam. IT Computer Technical Support Newsletter

Recognizing Spam. IT Computer Technical Support Newsletter IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the

More information

WHAT S IT ALL ABOUT?

WHAT S IT ALL ABOUT? WHAT S IT ALL ABOUT? Introduction The 1990 s spawned a new variety of crooks called identity thieves. Their stock in trade? Your everyday transactions, which usually reveal bits of your personal information:

More information

I dentity theft occurs

I dentity theft occurs 1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

identity theft: How To Safeguard Your Privacy and Keep Your Good Name

identity theft: How To Safeguard Your Privacy and Keep Your Good Name identity theft: How To Safeguard Your Privacy and Keep Your Good Name Do you know anyone who has been the victim of identity theft? If not, odds are you will soon. According to the Federal Trade Commission,

More information

We are writing to you because of a recent security incident which may have resulted in unauthorized access of your personal information.

We are writing to you because of a recent security incident which may have resulted in unauthorized access of your personal information. EQUIFAX AUTHORIZATION CODE July, 2012 Dear [insert name]: We are writing to you because of a recent security incident which may have resulted in unauthorized access of your personal information. On or

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

How to Identify Phishing E-Mails

How to Identify Phishing E-Mails How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services (miguel@falconitservices.com) http://www.falconitservices.com

More information

7 PRACTICES FOR SAFER COMPUTING

7 PRACTICES FOR SAFER COMPUTING 7 7 PRACTICES FOR SAFER COMPUTING EFFICIENT SHOPPING ACCESS TO INFORMATION, MUSIC, AND GAMES EDUCATIONAL RESOURCES TRAVEL PLANNING SPORTS, HOBBIES, AND SOCIAL NETWORKS CONNECTIONS TO FAMILY AND FRIENDS

More information

Security Tips You are here: Home» Security Tips

Security Tips You are here: Home» Security Tips Security Tips You are here: Home» Security Tips Click on a the Security Icon to view detailed information on: Responsibility of the Bank Password Policy Guide Online Security Internet Security Tips Scam

More information

Identity Theft. Protecting Your Credit Identity 1.3.1.G1

Identity Theft. Protecting Your Credit Identity 1.3.1.G1 Identity Theft Protecting Your Credit Identity Identity Theft IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity

More information

Get back your good name. Refuse to be a target of identity crime again.

Get back your good name. Refuse to be a target of identity crime again. Clear Your Good Name After Identity Crime You suspect that someone is using your name and personal identification information for unlawful purposes. This kit can help you resolve your identity crime case

More information

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage. Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause

More information

Employee ID Theft Resource Guide

Employee ID Theft Resource Guide Employee ID Theft Resource Guide ID Theft Resolution Legal Resources ID Theft Assistance Updates www.legalresources.net ID Theft What is Identity Theft? Identity Theft is a serious crime in which someone

More information

INTRODUCTION HOW IDENTITY THEFT OCCURS

INTRODUCTION HOW IDENTITY THEFT OCCURS The following information is from the Federal Trade Commission s booklet on Identity Theft. For more information, access the Federal Trade Commission at www.ftc.gov or contact them at 1-877-ID-THEFT. INTRODUCTION

More information

How To Protect Yourself From Identity Theft

How To Protect Yourself From Identity Theft Learn about identity theft Investor education Protecting a vital asset: Your identity A 2013 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the

More information

Identity Theft Protection

Identity Theft Protection History of Identity Theft Identity Theft Protection Identity Theft is not a new crime, rather it has mutated to include new technology such as ATMs and transactions on the World Wide Web. The first forms

More information

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. RECENT DATA BREACHES This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. Data security is a number one priority at Northwest. We take every

More information

FTC FACTS for Consumers

FTC FACTS for Consumers ftc.gov FOR THE CONSUMER FTC FACTS for Consumers FEDERAL TRADE COMMISSION 1-877-FTC-HELP Medical Identity Theft C ould identity thieves be using your personal and health insurance information to get medical

More information

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION @ What Is Identity Theft? IDENTITY THEFT

More information

Safeguarding Your information and accounts

Safeguarding Your information and accounts Safeguarding Your information and accounts D Bank with confidence The security of your funds and information is a top priority at Liberty Bank. We do our utmost every day to prevent fraud and identity

More information

Dear Concerned Consumer,

Dear Concerned Consumer, Dear Concerned Consumer, Identity theft is a growing problem of the Information Age. You have already taken the first important step in combating the problem by contacting HomeStar Bank & Financial Services.

More information