From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense"

Transcription

1 1 of 5 11/17/2014 4:14 PM From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense Share This Every other week it seems like there is another secure data breach from Target and Home Depot, to JP Morgan/Chase and the Apple icloud, just to name a few. These breaches and hacking are becoming the new norm in today s digital age. It s no longer a question of if it will ever happen it s a question of when and how bad will it be. It s important to be prepared when a breach affects you, protect yourself as much as possible, and know what to do when your information does become compromised. How hackers get your secure data and information* Before the days of internet and technology, identity theft happened through things like phone scams, mishandling of medical records, mail and check fraud, or having your wallet stolen. While those things still happen, the digital world has opened many more avenues to lift your personal information like social security number, name, birth date, address, mailing address, security questions and answers, passwords, and financial information. A few common easy access points hackers target: Hacking This can include compromised login information (either the thief guesses it, or receives information from somewhere else), or if a thief steals physical technology like a laptop, ipad, or cellphone that has access to your access to your opens pandora s box. If your serves as a login to other websites like online banking, social media, or favorite shopping sites, these thieves can easily send password reset requests, or find out other personal information, like personal records or even who your wealth manager is, for instance. They can even send your friends and family s pretending to be you asking for things or information. We ve had a few instances where thieves hacked client s and requested wire transfers, or other information from us here at CWM. Luckily, we were able to spot the red flag, but it could

2 2 of 5 11/17/2014 4:14 PM have been a horrible situation. It is yet another important reason why we ask you to verify yourself over the phone when we give out any information, or process requests. Unsecure Browsing If you re visiting questionable sites, surfing on free/public Wi Fi, or browsing without a firewall or outdated browsers and plugins, you re putting yourself and your computer at risk. Improper Password Practices Do you use the same password for all of your logins? Or maybe your passwords are things like Password123 or 123abc123. Another risk is keeping your password list in a place (either on your computer or a physical printed list) that is unsecured. See below for some safe password practices. Tax/Identity Theft, IRS Scam the IRS warns of scammers looking to exploit you in a number of ways. Some hijack your tax filing by submitting a return before you do under your SSN, or someone may call you claiming to be from the IRS, accusing you of owing money. Their official statement is to always remember: The IRS does not initiate contact with taxpayers by to request personal or financial information. This includes any type of electronic communication, such as text messages and social media channels. Data Breach these are unpreventable for the most part. These attacks are on vendors like your bank or stores you shop at anywhere you ve visited with your digital footprint like your , address, date of birth, payment information, or security questions and answers. A Few Tips to Help You Protect Yourself Online* Safe Practices Beware of suspicious links in s from friends or unknown senders. If a friend sends a questionable , it s best to call them and ask if they intentionally sent the , that way if they didn t send it they can address their hacked account. Forward any suspicious s, or s from people claiming to be from the IRS to (More information on IRS suggestions). Use 2 step authentication. Encrypt sensitive documents being sent via . Secure Computing Always browse the web behind a reputable antivirus software/firewall. Visit only trusted websites using a secure wifi/internet connection, and avoid those that trigger your antivirus software. Avoid using public wifi. Do not provide sensitive information on unsecure networks. Always double check a site for the https and/or lock image in the address field. Forward any sites claiming to be the IRS, but do not start with forward the link to Proper Password Practices Your passwords should be 6 8 characters long at a minimum (some places suggest over 16 characters). Use a mixture of letters, numbers, and symbols uppercase and lowercase. Use 2 step authentication where possible. Two step authentication requires information from two sources to log in. A hacker would have to have your login information AND your cell phone to

3 3 of 5 11/17/2014 4:14 PM retrieve a secure code via text or app. Do not use the same password for all of your sites. If a hacker gets one, you don t want them to be able to access all of your digital life. Social Media Safety Refrain from posting personal information online. Don t post personal details such as phone numbers, addresses, or indications of your financial situation (like your great credit score, employment, luxury purchases, etc.). Rule of thumb: if you wouldn t want it posted in Times Square, don t post it online. Don t post your future plans, or anything defining your daily routine. Thieves can pick up your patterns based on when you post them or if you re going on a long vacation and they will know when your house is clear for burglary. As much as you love sharing the details of your kids, grandkids, nieces and nephews, you can be exposing them to identity theft. If you post information including their full name and date of birth, thieves can target their fresh and new identity too. Be Proactive Proactively monitor and report discrepancies in any of your financial statements, or on accounts. The sooner you act, the better. Your financial institution or company that you re doing business with will be the best place to start when making a formal report. Keep track of all dates, times, and contact information for those you talk to regarding reports you re making. Sign up for a credit monitoring service, if you feel the need. If you believe you ve been a victim of identity theft of any form, here are some steps to take:. Place an initial fraud alert: Ask 1 of the 3 credit reporting companies to put a fraud alert on your credit report. They must tell the other 2 companies. An initial fraud alert can make it harder for an identity thief to open more accounts in your name. The alert lasts 90 days but you can renew it.. Inform CWM: It s important that we know about your breach, so we can set an alert on your account and act with extra caution when fulfilling any requests in the near future: / or Order your credit reports: Identity theft victims are entitled to a free credit report from each of the 3 credit reporting companies.. Create an identity theft report: An Identity Theft Report gives you some important rights that can help you recover from the theft. To create one, file a complaint with the FTC and print your Identity Theft Affidavit. Use that to file a police report and create your Identity Theft Report.

4 4 of 5 11/17/2014 4:14 PM No matter who you talk to along the way, be organized and document everything. Here s a great chart visualizing this: Click to Enlarge Source: FTC, Taking Charge: What To Do If Your Identity Is Stolen (Click for the full PDF resource) What is CWM doing to protect your information? The Presidential Policy Directive 21 (PPD 21) issued in February 2013 suggests financial services firms are the number 1 among the 16 critical infrastructure areas designated in PPD Comprehensive Wealth Management has an IT security protocol in place to help safeguard the company and our clients information. Each team member is trained and informed of the company policies and protocol in place. While it is no guarantee that we will be able to combat every threat, we are constantly reviewing our protocol and practices to make sure we are as secure as possible. A few of our protocols: Paperwork containing sensitive information remains on secured CWM office premises at all times. Sensitive information exchanged via is encrypted. External drives (such as flash drives, external hard drives) are not transferred between internal and external computers. Information may only be exchanged via secure . CWM team members working from remote locations must provide their IP address prior to connecting to the secure network. Team members will not willfully visit internet sites deemed unsafe to CWM s network. Team members practice sound judgment when accessing hyperlinks in s. All devices are fully protected and updated at all times (we use a service called Security Snapshot).

5 5 of 5 11/17/2014 4:14 PM Portable computers must be fully encrypted. Team members are expected to report any suspicious activity, or computer performance both on internal computing, and for red flags surrounding clients and client requests. CWM offices are key card access only outside of regular business hours and sensitive information is either shredded or kept in secure locations. If there is a security breach to any degree in which your information has been potentially compromised, you can expect to be notified with details and actionable steps moving forward. The Office of Compliance Inspections and Examinations (OCIE) will be conducting examinations of more than 50 registered broker dealers and registered investment advisors, focusing on areas related to cybersecurity. 2 CWM is dedicated to upholding the security of your personal information to the best of our ability. Reliable Resources for Breach and Technical News and Information** IRS Identity Protection Charles Schwab Federal Trade Commission ID Theft Federal Trade Commission Phishing Identity Theft Resource Center Identity Theft Prevention and Survival Social Security Administration Justice Department Postal Inspection Service Sources:. Compliance Review, Charles Schwab Advisor Services. October SEC Cyber Alert, April 15, 2014 * Please note these suggestions are not all inclusive, and serve to just be reminders for safe computing. ** Note, these links are being provided as a service convenience. CWM is not affiliated with any of these organizations and cannot guarantee their accuracy, effectiveness and/or completeness. This article has been prepared and distributed for informational purposes only and is not a solicitation or an offer to buy any security or investment or to participate in any trading strategy. Information is based on sources believed to be reliable; however, their accuracy or completeness cannot be guaranteed. This information is not intended to be a substitute for specific individualized tax, legal or investment planning advice as individual situations will vary. For specific advice about your situation, please consult with a financial professional. Past performance is no guarantee of future results. Copyright Comprehensive Wealth Management. All Rights Reserved. Securities offered through Independent Financial Group, LLC, a registered broker dealer. Member FINRA and SIPC. Advisory services offered through Comprehensive Wealth Management, LLC, a registered investment advisor. Independent Financial Group, LLC, and Comprehensive Wealth Management, LLC, are not affiliated. Office Of Supervisory Jurisdiction: High Bluff Drive, Suite 200 San Diego, CA Site Design and Development by RocketDog Communications

IDENTITY THEFT: MINIMIZING YOUR RISK

IDENTITY THEFT: MINIMIZING YOUR RISK IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social

More information

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself

More information

what you need to know

what you need to know A P Identity u b l i c a t i o n o f t h e S o u t h C a r o l i n a D e p a r t m e n Theft t o f C o n s u m e r A f f a i r s what you need to know Step By Step: What To Do After a Security Breach #1:

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

Identity Theft and Online Security

Identity Theft and Online Security Identity Theft and Online Security ACI-588788 American Century Investment Services, Inc. Goals for Presentation Identity Theft - What is it and how are we at risk? Social Media - How much online security

More information

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION @ What Is Identity Theft? IDENTITY THEFT

More information

Taxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA

Taxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA Taxpayer Guide to Identity Theft Protect yourself By Beatriz Landa-Sanchez, EA What is tax-related identity theft? Tax-related identity theft occurs when someone uses your stolen Social Security number

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

What to Know, What to Do

What to Know, What to Do Protecting Your Identity: What to Know, What to Do BRUMMET & OLSEN, LLP Certified Public Accountants t and Consultants t Kedra J. Olsen, CPA February 6, 2014 Overview Identity yprotection Protection from

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft identity theft unit new york county district attorney s office Protecting Yourself from Identity Theft cyrus r. vance, jr. district attorney 5 / 2010 questions and answers Dear Friends, cyrus r. vance,

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity

More information

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but

More information

IRS & Partners Combat Tax-Related Identity Theft What s New for 2016

IRS & Partners Combat Tax-Related Identity Theft What s New for 2016 IRS & Partners Combat Tax-Related Identity Theft What s New for 2016 General Scope of Identity Theft Identity theft costs U.S. victims more than all property crimes combined Identity theft remains number

More information

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit Identity Theft: It Could Happen To You! Attorney General Tom Reilly s Guide to Protecting Yourself and Your Credit One Ashburton Place ~ Boston, MA 02108 ~ (617) 727-2200 www.ago.state.ma.us February 2005

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Glenn Gizzi Senior Stakeholder Liaison Marc Standig Enrolled Agent What is tax-related identity theft? Tax-related identity

More information

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about: financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index

More information

Fraud and Identity Theft. Megan Stearns, Credit Counselor

Fraud and Identity Theft. Megan Stearns, Credit Counselor Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention

More information

Understanding Your Credit Report Rights. Legal Aid Society of San Diego, Inc. Consumer Protection Division

Understanding Your Credit Report Rights. Legal Aid Society of San Diego, Inc. Consumer Protection Division Understanding Your Credit Report Rights Legal Aid Society of San Diego, Inc. Consumer Protection Division One Free Copy Per Agency Every 12 Months The Federal Trade Commission guarantees you one free copy

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

IDENTITY THEFT. Hawthorne Police Department

IDENTITY THEFT. Hawthorne Police Department IDENTITY THEFT A Quick Reference Guide Hawthorne Police Department Identity theft is when somebody uses your personal identifying information such as your name, address, telephone number, taxpayer identification

More information

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012 Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers Privacy, Governmental Liaison and Disclosure May 9, 2012 Today s presentation How identity theft is a threat to the taxpayer What IRS is

More information

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IDENTITY THEFT IT S POSSIBLE@ PROTECT YOUR IDENTITY protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IT S POSSIBLE @ What Is Identity Theft? According to the FBI, identity theft is the fastest

More information

Fraud Prevention Tips

Fraud Prevention Tips Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back

More information

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity

More information

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Brian Wozniak IRS Stakeholder Liaison

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Brian Wozniak IRS Stakeholder Liaison Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Brian Wozniak IRS Stakeholder Liaison November 4, 2015 1 Prevention and Detection In recent years, the IRS has made numerous

More information

Armstrong State University Fall Staff Assembly. Chief Wayne Willcox, MSCJ, CLEE

Armstrong State University Fall Staff Assembly. Chief Wayne Willcox, MSCJ, CLEE Armstrong State University Fall Staff Assembly Chief Wayne Willcox, MSCJ, CLEE Identity Theft: When someone uses your personal information without your permission to commit fraud or other crime Name Social

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

Combating Identity Theft: Tips to Reduce Your Cybersecurity Risks. September 16, 2015

Combating Identity Theft: Tips to Reduce Your Cybersecurity Risks. September 16, 2015 Combating Identity Theft: Tips to Reduce Your Cybersecurity Risks September 16, 2015 Current Cyber Threat Cyber criminals are not only targeting businesses, but individuals Stolen personally identifiable

More information

Corporate Account Take Over (CATO) Guide

Corporate Account Take Over (CATO) Guide Corporate Account Take Over (CATO) Guide This guide was created to increase our customers awareness of the potential risks and threats that are associated with Internet and electronic- based services,

More information

OKPAY guides. Security Guide

OKPAY guides. Security Guide Название раздела OKPAY guides www.okpay.com Security Guide 2012 Contents SECURITY GUIDE Contents Introduction 1. OKPAY Security Overview 2. Security Tips 3. Security Center 3.1. Basic Protection 3.2. Email

More information

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft? Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat

More information

How To Help Protect Yourself From Identity Theft

How To Help Protect Yourself From Identity Theft How To Help Protect Yourself From Identity Theft January 20, 2015 Bryan Strong Senior Vice President and Director Information Security This complimentary interactive webinar is sponsored by Zions Bank

More information

Understanding Security Threats in the Cyber World. Beth Chancellor, Chief Information Security Officer

Understanding Security Threats in the Cyber World. Beth Chancellor, Chief Information Security Officer Understanding Security Threats in the Cyber World Beth Chancellor, Chief Information Security Officer Agenda Phishing Credit Card Fraud & Identity Theft Cloud Services Social Networking Wireless Phishing

More information

TMCEC CYBER SECURITY TRAINING

TMCEC CYBER SECURITY TRAINING 1 TMCEC CYBER SECURITY TRAINING Agenda What is cyber-security? Why is cyber-security important? The essential role you play. Overview cyber security threats. Best practices in dealing with those threats.

More information

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you. At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well

More information

Identity Protection Guide. The more you know, the better you can protect yourself.

Identity Protection Guide. The more you know, the better you can protect yourself. Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious

More information

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account

More information

FTC Fact Sheet Identify Yourself

FTC Fact Sheet Identify Yourself FTC Fact Sheet Identify Yourself 5 10 15 20 25 30 35 40 You might have heard about identity theft: it s what can happen when a thief gets enough of someone s information to commit fraud. Why should people

More information

WHAT S IT ALL ABOUT?

WHAT S IT ALL ABOUT? WHAT S IT ALL ABOUT? Introduction The 1990 s spawned a new variety of crooks called identity thieves. Their stock in trade? Your everyday transactions, which usually reveal bits of your personal information:

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Identity Theft. Providing Your Student with a Safety Net By Sun Ow

Identity Theft. Providing Your Student with a Safety Net By Sun Ow Identity Theft Providing Your Student with a Safety Net By Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial

More information

CYBER FRAUD ALERT. How to protect yourself from fraudulent wire requests and ransomware attacks.

CYBER FRAUD ALERT. How to protect yourself from fraudulent wire requests and ransomware attacks. How to protect yourself from fraudulent wire requests and ransomware attacks. As technology continues to advance and provide additional ways for consumers to manage their finances, cyber criminals create

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

PROTECTING YOUR IDENTITY:

PROTECTING YOUR IDENTITY: PROTECTING YOUR IDENTITY: What to Know, What to Do Britt Short 2013 Raymond James & Associates, Inc., member New York Stock Exchange/SIPC. Raymond James is a registered trademark of Raymond James Financial,

More information

Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation

Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation June 2009 Cairo, Egypt Joanna P. Crane Identity Theft Program Manager Senior Attorney The views

More information

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of

More information

Protecting your identity

Protecting your identity Protecting your identity Though it might not seem like it, your identity is one of the most precious things you possess. Criminals who are able to steal your identifying information can pretend to be you,

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot

More information

Identity Theft. Today s Goals. Identity Theft Statistics 03/26/2013. Joel Jacobsen Information Security Officer

Identity Theft. Today s Goals. Identity Theft Statistics 03/26/2013. Joel Jacobsen Information Security Officer Identity Theft Joel Jacobsen Information Security Officer Today s Goals Definitions and Statistics Identity Thief Tactics Warning Signs Prevention Tips Identity Theft Statistics #1 complaint to the Federal

More information

Office of the Privacy Commissioner of Canada. Identity Theft and You

Office of the Privacy Commissioner of Canada. Identity Theft and You Office of the Privacy Commissioner of Canada Identity Theft and You There have always been scammers who pose as somebody else to carry out fraudulent activities. With today s proliferation of technology,

More information

Welcome to the Protecting Your Identity. Training Module

Welcome to the Protecting Your Identity. Training Module Welcome to the Training Module 1 Introduction Does loss of control over your online identities bother you? 2 Objective By the end of this module, you will be able to: Identify the challenges in protecting

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

7 Holiday ID Theft Prevention Tips

7 Holiday ID Theft Prevention Tips GTN2GEWP The Grinch Effect: 7 Holiday ID Theft Prevention Tips This month officially kicks off the holiday shopping and celebration season. It is a time for joy, giving and togetherness as well as a wonderful

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

identity theft: How To Safeguard Your Privacy and Keep Your Good Name

identity theft: How To Safeguard Your Privacy and Keep Your Good Name identity theft: How To Safeguard Your Privacy and Keep Your Good Name Do you know anyone who has been the victim of identity theft? If not, odds are you will soon. According to the Federal Trade Commission,

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

Identity Theft: When You Are the Target

Identity Theft: When You Are the Target F O R F O R Y O U R Y O U R L I F E R E T I R E M E N T Identity Theft: When You Are the Target What s inside What Is Identity Theft?... 2 How Does Identity Theft Occur?... 2 How Can You Protect Yourself?...

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................

More information

Identity Theft is a Crime in the State of New Jersey.

Identity Theft is a Crime in the State of New Jersey. NEW JERSEY STATE POLICE Identity Theft: A Victim s Reference Identity Theft occurs when someone uses your personally identifying information like your name, Social Security number, or credit card number

More information

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required

More information

WHAT IS IDENTITY THEFT?

WHAT IS IDENTITY THEFT? 1 WHAT IS IDENTITY THEFT? IDENTITY THEFT is a serious Crime It disrupts your finances, credit history, reputation and takes money, time and patience to resolve Occurs when someone steals your personal

More information

Identity Theft and Strategies for Crime Prevention

Identity Theft and Strategies for Crime Prevention Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2005 Objectives What is identity theft? Why worry about it? How does it happen? Why has identity theft emerged? What

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

Erie County has been notified of an active phishing e mail threat targeting government agencies and have received reports of a wellcrafted phishing

Erie County has been notified of an active phishing e mail threat targeting government agencies and have received reports of a wellcrafted phishing Active E mail Phishing Threat from DISS Erie County has been notified of an active phishing e mail threat targeting government agencies and have received reports of a wellcrafted phishing email circulating

More information

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.

More information

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft.

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft. IDENTITY THEFT IDENTITY THEFT Identity theft is a serious crime with serious costs for victims. ID theft occurs when someone obtains your personal information such as your Social Security Number, credit

More information

The Grinch Effect: 7 Holiday ID Theft Prevention Tips

The Grinch Effect: 7 Holiday ID Theft Prevention Tips : 7 Holiday ID Theft Prevention Tips An Exclusive Whitepaper for Deluxe Customers by John Sileo DTC!GEWP This month officially kicks off the holiday shopping and celebration season. It is a time for joy,

More information

Fraud Information and Security

Fraud Information and Security Fraud Information and Security Updated: January 13, 2015 How We Protect You At WySTAR Global Retirement Solutions security is a top priority. We understand that your trust in us depends on how well we

More information

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have

More information

Identity Theft: Informational Workshop

Identity Theft: Informational Workshop Identity Theft: Informational Workshop ~ Prepared By ~ Connecticut Department of Consumer Protection Jerry Farrell, Jr. Commissioner 1 The Department of Consumer Protection Mission The Department of Consumer

More information

Information copied from Federal Trade Commission Website (www.ftc.gov)

Information copied from Federal Trade Commission Website (www.ftc.gov) DETER OR MINIMIZE YOUR RISK OF IDENTITY THEFT Information copied from Federal Trade Commission Website (www.ftc.gov) Protect your Social Security number Don't carry your Social Security card in your wallet

More information

How to Prevent It What to Do If You Are a Victim

How to Prevent It What to Do If You Are a Victim How to Prevent It What to Do If You Are a Victim www.tn.gov/consumer www.tn.gov/safety Tennessee Division of Consumer Affairs Identity theft happens when someone steals your personal information and uses

More information

Guide to Identity Theft

Guide to Identity Theft Guide to Identity Theft 1 Receive a free copy of your credit report. Visit www.annualcreditreport.com to get a copy of your credit report from all three credit reporting agencies. Review your credit report

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

When life happens... Protect Against Identity Theft. Keeping personal information safe & what to do if it happens to you

When life happens... Protect Against Identity Theft. Keeping personal information safe & what to do if it happens to you When life happens... Protect Against Identity Theft Keeping personal information safe & what to do if it happens to you An Identity Theft Epidemic Identity theft is a huge business in the U.S. and around

More information

DVD Companion Learning Guide

DVD Companion Learning Guide DVD Companion Learning Guide How to Use This Learning Guide This learning guide is a companion to the DVD, Identity Theft: Outsmarting the Crooks It can be used to guide classroom discussion of the material

More information

5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES

5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES White paper 5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES PROTECTING PHI ON PORTABLE DEVICES 2016 SecurityMetrics 5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES 1 5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES PROTECTING

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Don t be a victim... Providing useful information to help you recognize criminals and the hallmarks of their scams.

Don t be a victim... Providing useful information to help you recognize criminals and the hallmarks of their scams. SERIES Don t be a victim... Providing useful information to help you recognize criminals and the hallmarks of their scams. You may not think twice of an individual from the IRS asking for personal information

More information

Identity Theft: Prevention & Survival

Identity Theft: Prevention & Survival Identity Theft: Prevention & Survival Crime of the Century Provide By: Nick Sabetta Don t t Let Someone Steal Your Good Name What is Identity Theft? When someone uses your personal information without

More information

Protecting Your Tax Identity Tax Identity Theft Awareness Tips

Protecting Your Tax Identity Tax Identity Theft Awareness Tips Protecting Your Tax Identity Tax Identity Theft Awareness Tips Tax ID thieves are ready are you? Tax identity theft happens when someone uses your Social Security number to get a tax refund or a job, and

More information

PRACTICAL MONEY GUIDES IDENTITY THEFT. How to safeguard your identity and financial information from theft

PRACTICAL MONEY GUIDES IDENTITY THEFT. How to safeguard your identity and financial information from theft PRACTICAL MONEY GUIDES IDENTITY THEFT How to safeguard your identity and financial information from theft SHIELD YOUR PERSONAL FINANCIAL INFORMATION TO AVOID CARD FRAUD AND IDENTITY THEFT When your personal

More information

What is Identity Theft?

What is Identity Theft? What is Identity Theft? Identity theft is a crime in which someone obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.

More information

Protecting your business against External Fraud

Protecting your business against External Fraud Monthly ebrief August 2012 Protecting your business against External Fraud Welcome to another edition of our monthly ebriefs, brought to you by Aquila Advisory, the boutique forensic accounting company.

More information

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on Are you a Target? On-Line Scams Credit/Debit Card Investment Identity Theft Frauds Scams Mark the following

More information

Protection from Fraud and Identity Theft

Protection from Fraud and Identity Theft Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...

More information

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com.

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com. Website Privacy Policy Statement This website juliereisler.com is operated by Empowered Living, LLC and this policy applies to all websites owned, operated, controlled and otherwise made available by Company,

More information

PROTECT YOURSELF A CONSUMER PROTECTION PAMPHLET

PROTECT YOURSELF A CONSUMER PROTECTION PAMPHLET PROTECT YOURSELF A CONSUMER PROTECTION PAMPHLET Money Transfer Scams Many scammers ask consumers to send money by wire transfer through companies like Western Union and MoneyGram. If you wire money and

More information