PROTECTING HIGH NET WORTH FAMILIES FROM CYBER CRIME

Size: px
Start display at page:

Download "PROTECTING HIGH NET WORTH FAMILIES FROM CYBER CRIME"

Transcription

1 PROTECTING HIGH NET WORTH FAMILIES FROM CYBER CRIME Protecting your future since 1863 SM RAISE YOUR AWARENESS, LOWER YOUR RISK

2 THE CYBER MENACE Cyber crime is a trend growing as fast as the Internet boom itself. It seems that every day there s another identity theft story in the news that leaves us feeling vulnerable to this invisible threat. Anti-virus vendor, Norton by Symantec, reports that 71 million Americans were victims of cyber crime in And cyber crime is expected to become even more common in While the compromise of corporate networks gets most of the media attention, we as individuals should be concerned especially those with greater wealth and high media exposure. Now that personal information has become so hard to protect, your financial status is much easier to discover. Not only is our personal information at risk, our personal safety is also at risk. The explosive growth of mobile communications has created millions of new targets for criminals. Even our vehicles, home security systems and smart appliances can be hacked and used against us. Anything controlled by a computer or connected to a network can be compromised. Cyber crime is frightening because most of us don t fully understand the technology. But advice from cyber security experts may surprise you. Don Culpepper, who specializes in family safety and security at Fireman s Fund, recommends, The key to protecting yourself and your wealth isn t through a high-tech solution; cyber security is about awareness of your online activity. TOP CYBER RISKS Information Security is becoming more relevant every day, even for those who do not use the Internet regularly. Companies you do business with, such as banks, retail stores, etc., transfer your information digitally in the course of doing business so you re at risk. Think of all the personal information you use online while working, shopping, banking, investing, networking, learning, etc. Usernames, passwords, social security numbers, birthdays, nicknames, maiden names, favorite movies all of which are unique to you can be collected anonymously to commit fraud in many ways, and in your name. There are over 326 million mobile devices in the United States, more than the country s entire population. Cellular Telecommunications Industry Association (CTIA) Types of Cyber Fraud Utilities Fraud The opening of new utility accounts such as phone, electricity/gas, cable, etc. Finance Fraud The withdrawal of money, accrued debt, or establishing new bank accounts or loans in your name. Government Document Fraud False driver s licenses or official ID in your name to steal government benefits or file tax returns. Criminal Fraud The committing of a crime while assuming your identity. Job Fraud The use of your social security number and credit history to get a job. Once you ve become a victim of identity theft, it can be extremely difficult to resolve. Identity theft resolution programs are available to help restore your credit, but there are a few things you can do on your own if you suspect your identity has been stolen: Monitor your credit report and place a fraud alert on your file Close the accounts that you suspect have been tampered with or opened fraudulently File a complaint with the Federal Trade Commission File a report with your local police or in the community where the identity theft occurred Physical Security has become a greater threat to high net worth individuals and their families because their wealth makes them greater targets for crime, such as extortion or kidnap-and-ransom plots. Criminals can easily search the Internet to reveal your identity, financial status, residence, family members, etc. essentially building a profile. Just as in any law enforcement surveillance operation, building a profile helps predict where someone will be at any given time, making them vulnerable to a physical attack. Social networkers exacerbate this problem by posting their activities and location from mobile devices wherever they go. Smartphones use GPS to enable location services for a wide variety of apps. Known as geo-tagging; smartphones attach GPS information to photographs that criminals can use to locate victims. And because smartphone apps are susceptible to hacking, criminals can attach malware that they use to track your movements without your knowledge. The key to protecting yourself and your wealth isn t through a high-tech solution; cyber security is about awareness of your own activity. DON CULPEPPER FIREMAN S FUND RISK MANAGEMENT CONSULTANT It s no secret that children are naïve to the dangers of posting their personal information on public websites. Social networking puts them at even greater risk of unknowingly associating with a perpetrator who may target them because of your prosperity. 2

3 The practice known as pretexting is presenting oneself as someone else in order to gain private information. They may already have enough information to pretend they know your child, inspiring trust and thus, opening the door to trouble. Imagine taking your family on vacation to Hawaii while your child maintains a running dialogue on Facebook, Snapchat and Instagram, posting photos and comments about everything they are doing. Meanwhile, a criminal monitoring their activity would know that the family home is unoccupied and a target for theft. Or worse, an assailant can pinpoint where the family is at any time, making family members vulnerable to physical harm. Network Security is the side of cyber crime that most people know little about. It s important to understand that ANY device connected to a network can be hacked, Don Culpepper warns. The threat now goes well beyond desktop computers. Now our phones, televisions, video game consoles, security systems, cars, appliances and even your front door lock can connect to the Internet and be compromised. Certain types of network connections are more vulnerable than others. Bluetooth and WI-FI technology are extremely common protocols but offer very little security. Brian Valenza, president at the Guidry Group and a former U.S. Navy SEAL, is an expert in hightech communications and surveillance. He explains that criminals using readily available tools can fish for open devices on WI-FI networks and hack into them, whether they are password protected or not. WI-FI is particularly risky because it is widely used in public hotspots. Never do your online banking or purchase anything with a credit card from a public hotspot. WI-FI is the most common protocol for home wireless routers. Brian advises, It s important to provision your wireless router with a firewall that uses an encrypted password. It is equally important to make your router undiscoverable. This means the router name won t even show up on a WI-FI network scan. Criminals known as trunkslammers routinely prowl affluent neighborhoods looking for discoverable routers. Even if the router has a firewall, the criminal can hack the password and infiltrate your home network. Consider the notion that your home security system, with cameras and other high-tech features, communicates to a central office or the police department through an Internet connection. If a hacker can access your WI-FI router, they can also access and possibly control your security system. They could turn it off, or even turn the cameras against you. This is also an emerging risk with smart televisions and video game consoles that employ cameras to interface with users. You may be watching TV while someone else watches you. Tweet from teenage girl: Mom and Dad went to some fancy dinner and I have to stay home. #homealone #bored 91% of adults have a cell phone and 63% of them use their smartphones to go online. Pew Internet Project, by the Pew Research Center Off-the-shelf communications devices often come with a default password setting. Some are as simple as 0000 or Password, and easy to guess. Since most hardware manufacturers post their user guides online, these passwords are easily accessible to miscreants who may wish to cause you harm. CYBER FAMILY SAFETY AND SECURITY EVALUATION For many, cyber technology can be intimidating. Even tech-savvy business leaders have trouble keeping up with technology. What can you do to protect yourself and your family from the evolving threat of cyber crime? A personal security consultant, such as The Guidry Group s Brian Valenza, can determine specific areas of concern relating to your family s daily use of mobile devices, laptops, desktop computers, etc. while at home, during travel, or even at school or work. Through remote and onsite evaluation, the security review includes useful best practice recommendations that can ensure a heightened level of awareness, and therefore lower your family s overall level of risk. When we conduct a home consultation, we check for network vulnerability, Brian says. Businesses use a Virtual Private Network (VPN) to protect their information as employees communicate over the Internet. But when they go home or travel, and switch to their phone or other device to WI-FI, they become susceptible. In the cyber security world, Brian explains, criminals fish for information for the same reason as social media companies to gather information to create profiles on individuals. 3

4 They may sell the personal information to other criminal associates, or instead engage in corporate espionage, searching for product details or merger information. Many companies expect employees to use their personal devices at work, creating a security issue for both the company and its employees, especially business officers and executives. Not only do their personal devices contain competitive business information, but users often leave their corporate VPN connections open when they are not working, thus exposing the network. Some of the questions Brian asks a family during a cyber safety consultation are geared towards understanding the family s culture: How do they use the Internet, local devices, mobile devices, etc.? How do parents and their children use social networks; do they travel, do they post pictures? How old are the kids? Do they allow cell phones, mobile device or video game use 24-7? Do the parents know what their kids do online? Do they have rules/restrictions on how they use social media (i.e.: no device usage after 7 p.m.)? Do the parents really understand Facebook? By understanding the family s culture, Brian can offer practical ways to protect the family without changing their lifestyle. Parents may not even realize the vulnerability their children create. But a home consultation can educate parents on the technical details, such as what mobile apps do and how they operate. The rest is just common sense and discipline. HOW TO PROTECT YOURSELF AND FAMILY It seems that just as many risks have come with the Digital Age as benefits. But you don t need to be a computer expert to protect yourself and your family from cyber crime. Many personal security experts will tell you that simply raising your awareness is the key to cyber security. Raise Your Awareness, Lower Your Risk Becky Hudzik-Presson, assistant vice president of Personal Risk Services at Fireman s Fund, consults with high net worth customers on protecting themselves from cyber crime. She explains that technology and its associated risks are always evolving, but a few aspects remain constant. Criminals will continue to exploit social media and hack into the latest, most popular applications. Security experts continue to familiarize themselves with the latest cyber-exposures, but so do the criminals. Every year, hackers good and bad flock to the DEF CON conference to share the latest techniques and concepts showing just how communal this fraternity is. Tips to Protect Against Cyber Crime Use your mobile service provider s 3G (or higher) network for more secure mobile Internet communications Provision your home WI-FI router with a high-level encrypted firewall AND make it undiscoverable Monitor you children s social network and mobile computing activity, and stay up-to-date on privacy settings Work with a qualified security advisor who specializes in protecting high net worth individuals and families, and offers specific cyber protection advice Assure that you re adequately insured to withstand a loss Use sophisticated passwords and update them regularly We all have to take common sense approaches and precautions to reduce our cyber crime vulnerabilities, Becky says. Before you install your next app, enter a password, or provide private information, take a minute to understand the potential consequences to you or your family. The businesses you work with can also inadvertently pass their cyber crime exposure on to you. If you are newly wealthy, you might still be working with your local financial institution and other small companies that are not sufficiently protected against the cyber threat. It s important to validate your bank or financial institution s security protocols, Becky adds. Are their transactions secure and encrypted? Are there any weaknesses you should be aware of? Large, corporate firms generally employ robust network security protocols that address the most current cyber threats although no network is completely secure. Smaller local firms, however, don t usually have the financial resources or expertise to deploy such security systems. For this reason, it makes sense to manage your finances through a large, trusted institution. 4

5 Asking questions helps sharpen your awareness, but you may not have the expertise or tools to review your bank s security protocols. That s why it s a good idea to work with a private security advisor who can offer expertise in cyber security. They not only help with background research and network security on both a personal and enterprise level, but they also provide tips and education on effective measures you can take to guard against cyber crime. It is also essential to insure your assets and reputation should you suffer a loss due to cyber crime. Recovering your stolen identity or lost assets can be expensive and time-consuming. And if you are a business leader, politician, celebrity or other high net worth individual, restoring a damaged reputation can also be difficult and costly. Good insurance provides some reassurance that you can financially recover from a cyber crime. Not all insurance providers can meet your unique needs, so be sure to talk to your independent agent or broker. Not all insurance providers can meet your unique needs, so be sure to talk to your independent agent or broker. They can offer expert advice on coverage solutions and recommend the best insurance company to help protect your family against cyber crime. WHAT TO LOOK FOR IN AN INSURANCE CARRIER Because cyber crime is evolving so quickly, many insurance carriers have been slow to develop specific cyber-protection policies for individuals and families. However, such coverages are beginning to enter the market. Ask your independent insurance agent about providers that not only offer high limits excess policies, but actually specialize in high net worth personal insurance. Some excess policies even feature crisis management endorsements that can pay for a PR agency to help restore your reputation particularly valuable to corporate or non-profit executives and high-profile individuals. Additionally, it is essential that your insurance company understands your lifestyle and offers a cyber family safety service that addresses your unique needs. Some carriers offer an in-home safety consultation or they can recommend an international personal security firm with expertise in protecting wealthy individuals and families. With the many evolving facets of cyber crime, you need an insurer who stays on the forefront of family protection and continuously innovates to cover emerging risks. ABOUT FIREMAN S FUND Since 1863, Fireman s Fund has partnered with independent agents and brokers to protect the future for individuals, families and businesses. We ve helped rebuild cities, pioneered new insurance solutions and managed risk for the world s most popular films. Today, we are industry leaders in high net worth, entertainment and commercial insurance. Backed by superior claims and risk services, we re there for our customers before, during and after they incur a loss. We are a member of the Allianz Group one of the world s largest insurance providers and have a strong financial foundation. Fireman s Fund began with a promise to support firefighters in their mission to make communities safer. We continue this tradition through our Heritage Program and contribute a portion of our profits to fire service organizations across the United States. For more information, visit firemansfund.com. This article provides general information and recommendations that may apply to many different situations. Any recommendations described in this article are not intended to be specific to your unique situation. Consult with your insurance company and specialists to determine how and whether the information in this article might guide you in developing specific plans or procedures for your home. This article does not substitute for legal advice, which should come from your own counsel. Any description of insurance coverage is a partial summary of coverage available. Your actual coverage will depend on the terms and conditions of your policy and the limits you select. The policy may contain exclusions and limitations that are not detailed in this article and coverage may differ by state Fireman s Fund Insurance Company, Novato, CA. All rights reserved. LR

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

PCI Compliance for Healthcare

PCI Compliance for Healthcare PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?

More information

Social Media and Cyber Safety

Social Media and Cyber Safety Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant andrew@justbesafe.com Social Media and Cyber Safety Our instructor today

More information

Cybersecurity Protecting Yourself, Your Business, Your Clients

Cybersecurity Protecting Yourself, Your Business, Your Clients Cybersecurity Protecting Yourself, Your Business, Your Clients Global Summit of Women June 7, 2014 Celina B. Realuyo Professor of Practice of National Security Affairs William J. Perry Center for Hemispheric

More information

BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary

BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME Executive Summary In support of National Cyber Security Awareness Month (October), ESET and the National Cyber Security Alliance (NCSA) commissioned

More information

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense 1 of 5 11/17/2014 4:14 PM 800.268.2440 From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense Share This Every other week it seems like there is another secure data breach

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft? Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

Client Education. Learn About Identity Theft

Client Education. Learn About Identity Theft Client Education Learn About Identity Theft 2 What is identity theft? 6 Detecting identity theft 10 Minimizing your risk 14 What to do if you re a victim The Federal Trade Commission (FTC) estimates that

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Cox High Speed InternetSM Connect to your online world faster than you can imagine. Plus, access a whole host of tools to make your Internet

Cox High Speed InternetSM Connect to your online world faster than you can imagine. Plus, access a whole host of tools to make your Internet Cox High Speed InternetSM Connect to your online world faster than you can imagine. Plus, access a whole host of tools to make your Internet experience friendlier, easier and more cutting edge. 43 Connecting

More information

GUIDE TO FINDING THE RIGHT INSURANCE PARTNERS

GUIDE TO FINDING THE RIGHT INSURANCE PARTNERS GUIDE TO FINDING THE RIGHT INSURANCE PARTNERS Protecting your future since 1863 MANAGING RISK FOR FINANCIALLY SUCCESSFUL FAMILIES MANAGING RISK FOR FINANCIALLY SUCCESSFUL FAMILIES When it comes to protecting

More information

Is your business secure in a hosted world?

Is your business secure in a hosted world? Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer

More information

The Hidden Dangers of Public WiFi

The Hidden Dangers of Public WiFi WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect

More information

CYBERSECURITY: Is Your Business Ready?

CYBERSECURITY: Is Your Business Ready? CYBERSECURITY: Is Your Business Ready? Cybersecurity: Is your business ready? Cyber risk is just like any other corporate risk and it must be managed from the top. An organization will spend time monitoring

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

Finding a Cure for Medical Identity Theft

Finding a Cure for Medical Identity Theft Finding a Cure for Medical Identity Theft A look at the rise of medical identity theft and what small healthcare organizations are doing to address threats October 2014 www.csid.com TABLE OF CONTENTS SUMMARY

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

NORTON CYBERSECURITY INSIGHTS REPORT

NORTON CYBERSECURITY INSIGHTS REPORT NORTON CYBERSECURITY INSIGHTS REPORT Get informed about the truths of online crime and the personal impact it has on you Table of Contents > INTRODUCTION... 3 > WE KNOW THE RISK FOR ONLINE CRIME IS HIGH...

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA

More information

How child identity theft happens.

How child identity theft happens. How child identity theft happens. Facts you should know about identity theft. What is identity theft? Identity theft is the act of using someone s personal information such as an account number, driver

More information

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies

More information

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity

More information

Policy for Protecting Customer Data

Policy for Protecting Customer Data Policy for Protecting Customer Data Store Name Store Owner/Manager Protecting our customer and employee information is very important to our store image and on-going business. We believe all of our employees

More information

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center

More information

Open an attachment and bring down your network?

Open an attachment and bring down your network? Open an attachment and bring down your network? Many people think this will never happen to them, but virus attacks can come from unlikely sources and can strike when you least expect it. They can wreak

More information

IDENTITY THEFT FRAUD

IDENTITY THEFT FRAUD FRAUD ALERT! SYNTHETIC IDENTITY THEFT FRAUD & n How to Protect Yourself n Data Breaches and You n Free Credit Reports SYNTHETIC IDENTITY THEFT and FRAUD It is hardly news that identity thieves and cybercriminals

More information

Online Security Tips

Online Security Tips Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

SENIORS ONLINE SECURITY

SENIORS ONLINE SECURITY SENIORS ONLINE SECURITY Seniors Online Security Five Distinct Areas Computer security Identity crime Social networking Fraudulent emails Internet banking 1 Computer security 2 There are several ways that

More information

Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online

Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online Research Conducted By: Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online [ photo here The Teen Online Identity Generation Theft Gap November November 20132012

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012 Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents

More information

Do s & Don ts Reference website. www.farmersidentityshield.com

Do s & Don ts Reference website. www.farmersidentityshield.com What is identity theft? How do thieves steal an identity? What do thieves do with a stolen identity? How can you find out if your identity was stolen? How long can the effects of identity theft last? What

More information

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches

More information

Your Digital Dollars Online & Mobile Banking

Your Digital Dollars Online & Mobile Banking Your Digital Dollars Online & Mobile Banking There are a lot of benefits to being able to bank or make payments from just about anywhere, but it s important to know how to do these things safely. Understanding

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

I know what is identity theft but how do I know if mine has been stolen?

I know what is identity theft but how do I know if mine has been stolen? What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card

More information

Child Identity Theft Education Kit

Child Identity Theft Education Kit Child Identity Theft Education Kit Who s at Risk? Consider a teenager who is about to start college. She has deposited money into a savings account and is ready to move it into a checking account. Much

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

How To Protect Your Data From Being Hacked

How To Protect Your Data From Being Hacked Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW

More information

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1 P a g e 1 Internet Basics ABOUT THIS CLASS This class is designed to provide a basic introduction to accessing and navigating the internet (a.k.a. the world wide web or the web ). Throughout the class,

More information

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s 1 Agenda Data Security Trends Root causes of Cyber Attacks How can we fix this? Secure Infrastructure Security Practices

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION

More information

Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.

Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions. Tahoe Tech Group LLC Cyber Security Briefing Truckee Donner Chamber of Commerce March 6, 2015 Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.

More information

Case study: What the? Online scams and identity theft

Case study: What the? Online scams and identity theft Case study: What the? Online scams and identity theft Theme The internet and mobile technologies are a source of scams and identity theft. Key learning/subject areas Cross curricula. Duration One to two

More information

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE 2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE WHO ARE WE? 12 years of local Tech, Training and Website services Service the 4 areas of life Regularly

More information

Bo Holland is the Founder & CEO of AllClear ID with deep expertise in Identity theft prevention, security, and technology

Bo Holland is the Founder & CEO of AllClear ID with deep expertise in Identity theft prevention, security, and technology AllClear ID (www.allclearid.com) is an identity protection company based in Austin, Texas, and is powered by Debix, a leader in identity protection technology. Our leading technology and customer service

More information

How to Prevent It What to Do If You Are a Victim

How to Prevent It What to Do If You Are a Victim How to Prevent It What to Do If You Are a Victim www.tn.gov/consumer www.tn.gov/safety Tennessee Division of Consumer Affairs Identity theft happens when someone steals your personal information and uses

More information

Welcome to the Protecting Your Identity. Training Module

Welcome to the Protecting Your Identity. Training Module Welcome to the Training Module 1 Introduction Does loss of control over your online identities bother you? 2 Objective By the end of this module, you will be able to: Identify the challenges in protecting

More information

2011 NCSA / McAfee Internet Home Users Survey

2011 NCSA / McAfee Internet Home Users Survey 2011 NCSA / McAfee Internet Home Users Survey National Cyber Security Alliance McAfee Zogby International October 2011 Methodology and Sample Characteristics IBOPE Zogby International was commissioned

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

PROTECTING YOUR IDENTITY:

PROTECTING YOUR IDENTITY: PROTECTING YOUR IDENTITY: What to Know, What to Do Britt Short 2013 Raymond James & Associates, Inc., member New York Stock Exchange/SIPC. Raymond James is a registered trademark of Raymond James Financial,

More information

Trust Digital Best Practices

Trust Digital Best Practices > ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or

More information

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have

More information

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.

More information

GUIDE TO PROTECTING YOUR BUSINESS

GUIDE TO PROTECTING YOUR BUSINESS GUIDE TO PROTECTING YOUR BUSINESS GT44GPBW As a small business owner, fraud is a significant threat to your business. According to a 2012 study by the Association of Certified Fraud Examiners, the smallest

More information

Medical Information Breaches: Are Your Records Safe?

Medical Information Breaches: Are Your Records Safe? Medical Information Breaches: Are Your Records Safe? Learning Objectives At the conclusion of this presentation the learner will be able to: Recognize the growing risk of data breaches Assess the potential

More information

Been in technology for 22 years Westinghouse Senior Manager at Clifton Gunderson-7th largest CPA and consulting firm in the U. S. Partner / Director

Been in technology for 22 years Westinghouse Senior Manager at Clifton Gunderson-7th largest CPA and consulting firm in the U. S. Partner / Director Been in technology for 22 years Westinghouse Senior Manager at Clifton Gunderson-7th largest CPA and consulting firm in the U. S. Partner / Director in Kenneally and Company s technology consulting practice

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

Cyber Security Strategies for the Small Business Market

Cyber Security Strategies for the Small Business Market Cyber Security Strategies for the Small Business Market Solutions for Small Business Reports are designed to demonstrate how new technologies enabled by cable providers help small business owners and managers

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

STOP THINK CLICK Seven Practices for Safer Computing

STOP THINK CLICK Seven Practices for Safer Computing Seven Practices for Safer Computing Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than earlier generations

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

1 Billion Individual records that were hacked in 2014 3.

1 Billion Individual records that were hacked in 2014 3. 783 Major data breaches in 204 up 27% from 203 2. Billion Individual records that were hacked in 204 3. 3 Fraud has changed The way we live and manage our finances today has changed radically from just

More information

7 Simple Smartphone Privacy Tips:

7 Simple Smartphone Privacy Tips: 7 Simple Smartphone Privacy Tips: An Exclusive White Paper for Deluxe Customers by John Sileo CT22JSWP Most business people think of their smartphone as a highly critical and necessary tool in running

More information

10 best practice suggestions for common smartphone threats

10 best practice suggestions for common smartphone threats 10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth

More information

Top 10 Tips to Keep Your Small Business Safe

Top 10 Tips to Keep Your Small Business Safe Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,

More information

Visa CREDIT Card General Guidelines

Visa CREDIT Card General Guidelines Visa CREDIT Card General Guidelines General Account Information Phone Numbers and Addresses It is very important to keep us up-to-date with your correct address and phone number. Card reissues/replacements

More information

Social Networking Sites like Facebook, MSN

Social Networking Sites like Facebook, MSN Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and

More information

Identity Theft. Providing Your Student with a Safety Net By Sun Ow

Identity Theft. Providing Your Student with a Safety Net By Sun Ow Identity Theft Providing Your Student with a Safety Net By Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial

More information

Digital Safety and Privacy

Digital Safety and Privacy Digital Safety and Privacy Class Description: As computers and the Internet become more and more the way we communicate, we need to be aware of potential threats to our security online. This class discusses

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

How To Protect Yourself From Identity Theft

How To Protect Yourself From Identity Theft Learn about identity theft Investor education Protecting a vital asset: Your identity A 2013 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the

More information

IDENTITY THEFT: MINIMIZING YOUR RISK

IDENTITY THEFT: MINIMIZING YOUR RISK IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity

More information

Identity Theft and Online Security

Identity Theft and Online Security Identity Theft and Online Security ACI-588788 American Century Investment Services, Inc. Goals for Presentation Identity Theft - What is it and how are we at risk? Social Media - How much online security

More information