PROTECTING HIGH NET WORTH FAMILIES FROM CYBER CRIME
|
|
- Kory Daniels
- 8 years ago
- Views:
Transcription
1 PROTECTING HIGH NET WORTH FAMILIES FROM CYBER CRIME Protecting your future since 1863 SM RAISE YOUR AWARENESS, LOWER YOUR RISK
2 THE CYBER MENACE Cyber crime is a trend growing as fast as the Internet boom itself. It seems that every day there s another identity theft story in the news that leaves us feeling vulnerable to this invisible threat. Anti-virus vendor, Norton by Symantec, reports that 71 million Americans were victims of cyber crime in And cyber crime is expected to become even more common in While the compromise of corporate networks gets most of the media attention, we as individuals should be concerned especially those with greater wealth and high media exposure. Now that personal information has become so hard to protect, your financial status is much easier to discover. Not only is our personal information at risk, our personal safety is also at risk. The explosive growth of mobile communications has created millions of new targets for criminals. Even our vehicles, home security systems and smart appliances can be hacked and used against us. Anything controlled by a computer or connected to a network can be compromised. Cyber crime is frightening because most of us don t fully understand the technology. But advice from cyber security experts may surprise you. Don Culpepper, who specializes in family safety and security at Fireman s Fund, recommends, The key to protecting yourself and your wealth isn t through a high-tech solution; cyber security is about awareness of your online activity. TOP CYBER RISKS Information Security is becoming more relevant every day, even for those who do not use the Internet regularly. Companies you do business with, such as banks, retail stores, etc., transfer your information digitally in the course of doing business so you re at risk. Think of all the personal information you use online while working, shopping, banking, investing, networking, learning, etc. Usernames, passwords, social security numbers, birthdays, nicknames, maiden names, favorite movies all of which are unique to you can be collected anonymously to commit fraud in many ways, and in your name. There are over 326 million mobile devices in the United States, more than the country s entire population. Cellular Telecommunications Industry Association (CTIA) Types of Cyber Fraud Utilities Fraud The opening of new utility accounts such as phone, electricity/gas, cable, etc. Finance Fraud The withdrawal of money, accrued debt, or establishing new bank accounts or loans in your name. Government Document Fraud False driver s licenses or official ID in your name to steal government benefits or file tax returns. Criminal Fraud The committing of a crime while assuming your identity. Job Fraud The use of your social security number and credit history to get a job. Once you ve become a victim of identity theft, it can be extremely difficult to resolve. Identity theft resolution programs are available to help restore your credit, but there are a few things you can do on your own if you suspect your identity has been stolen: Monitor your credit report and place a fraud alert on your file Close the accounts that you suspect have been tampered with or opened fraudulently File a complaint with the Federal Trade Commission File a report with your local police or in the community where the identity theft occurred Physical Security has become a greater threat to high net worth individuals and their families because their wealth makes them greater targets for crime, such as extortion or kidnap-and-ransom plots. Criminals can easily search the Internet to reveal your identity, financial status, residence, family members, etc. essentially building a profile. Just as in any law enforcement surveillance operation, building a profile helps predict where someone will be at any given time, making them vulnerable to a physical attack. Social networkers exacerbate this problem by posting their activities and location from mobile devices wherever they go. Smartphones use GPS to enable location services for a wide variety of apps. Known as geo-tagging; smartphones attach GPS information to photographs that criminals can use to locate victims. And because smartphone apps are susceptible to hacking, criminals can attach malware that they use to track your movements without your knowledge. The key to protecting yourself and your wealth isn t through a high-tech solution; cyber security is about awareness of your own activity. DON CULPEPPER FIREMAN S FUND RISK MANAGEMENT CONSULTANT It s no secret that children are naïve to the dangers of posting their personal information on public websites. Social networking puts them at even greater risk of unknowingly associating with a perpetrator who may target them because of your prosperity. 2
3 The practice known as pretexting is presenting oneself as someone else in order to gain private information. They may already have enough information to pretend they know your child, inspiring trust and thus, opening the door to trouble. Imagine taking your family on vacation to Hawaii while your child maintains a running dialogue on Facebook, Snapchat and Instagram, posting photos and comments about everything they are doing. Meanwhile, a criminal monitoring their activity would know that the family home is unoccupied and a target for theft. Or worse, an assailant can pinpoint where the family is at any time, making family members vulnerable to physical harm. Network Security is the side of cyber crime that most people know little about. It s important to understand that ANY device connected to a network can be hacked, Don Culpepper warns. The threat now goes well beyond desktop computers. Now our phones, televisions, video game consoles, security systems, cars, appliances and even your front door lock can connect to the Internet and be compromised. Certain types of network connections are more vulnerable than others. Bluetooth and WI-FI technology are extremely common protocols but offer very little security. Brian Valenza, president at the Guidry Group and a former U.S. Navy SEAL, is an expert in hightech communications and surveillance. He explains that criminals using readily available tools can fish for open devices on WI-FI networks and hack into them, whether they are password protected or not. WI-FI is particularly risky because it is widely used in public hotspots. Never do your online banking or purchase anything with a credit card from a public hotspot. WI-FI is the most common protocol for home wireless routers. Brian advises, It s important to provision your wireless router with a firewall that uses an encrypted password. It is equally important to make your router undiscoverable. This means the router name won t even show up on a WI-FI network scan. Criminals known as trunkslammers routinely prowl affluent neighborhoods looking for discoverable routers. Even if the router has a firewall, the criminal can hack the password and infiltrate your home network. Consider the notion that your home security system, with cameras and other high-tech features, communicates to a central office or the police department through an Internet connection. If a hacker can access your WI-FI router, they can also access and possibly control your security system. They could turn it off, or even turn the cameras against you. This is also an emerging risk with smart televisions and video game consoles that employ cameras to interface with users. You may be watching TV while someone else watches you. Tweet from teenage girl: Mom and Dad went to some fancy dinner and I have to stay home. #homealone #bored 91% of adults have a cell phone and 63% of them use their smartphones to go online. Pew Internet Project, by the Pew Research Center Off-the-shelf communications devices often come with a default password setting. Some are as simple as 0000 or Password, and easy to guess. Since most hardware manufacturers post their user guides online, these passwords are easily accessible to miscreants who may wish to cause you harm. CYBER FAMILY SAFETY AND SECURITY EVALUATION For many, cyber technology can be intimidating. Even tech-savvy business leaders have trouble keeping up with technology. What can you do to protect yourself and your family from the evolving threat of cyber crime? A personal security consultant, such as The Guidry Group s Brian Valenza, can determine specific areas of concern relating to your family s daily use of mobile devices, laptops, desktop computers, etc. while at home, during travel, or even at school or work. Through remote and onsite evaluation, the security review includes useful best practice recommendations that can ensure a heightened level of awareness, and therefore lower your family s overall level of risk. When we conduct a home consultation, we check for network vulnerability, Brian says. Businesses use a Virtual Private Network (VPN) to protect their information as employees communicate over the Internet. But when they go home or travel, and switch to their phone or other device to WI-FI, they become susceptible. In the cyber security world, Brian explains, criminals fish for information for the same reason as social media companies to gather information to create profiles on individuals. 3
4 They may sell the personal information to other criminal associates, or instead engage in corporate espionage, searching for product details or merger information. Many companies expect employees to use their personal devices at work, creating a security issue for both the company and its employees, especially business officers and executives. Not only do their personal devices contain competitive business information, but users often leave their corporate VPN connections open when they are not working, thus exposing the network. Some of the questions Brian asks a family during a cyber safety consultation are geared towards understanding the family s culture: How do they use the Internet, local devices, mobile devices, etc.? How do parents and their children use social networks; do they travel, do they post pictures? How old are the kids? Do they allow cell phones, mobile device or video game use 24-7? Do the parents know what their kids do online? Do they have rules/restrictions on how they use social media (i.e.: no device usage after 7 p.m.)? Do the parents really understand Facebook? By understanding the family s culture, Brian can offer practical ways to protect the family without changing their lifestyle. Parents may not even realize the vulnerability their children create. But a home consultation can educate parents on the technical details, such as what mobile apps do and how they operate. The rest is just common sense and discipline. HOW TO PROTECT YOURSELF AND FAMILY It seems that just as many risks have come with the Digital Age as benefits. But you don t need to be a computer expert to protect yourself and your family from cyber crime. Many personal security experts will tell you that simply raising your awareness is the key to cyber security. Raise Your Awareness, Lower Your Risk Becky Hudzik-Presson, assistant vice president of Personal Risk Services at Fireman s Fund, consults with high net worth customers on protecting themselves from cyber crime. She explains that technology and its associated risks are always evolving, but a few aspects remain constant. Criminals will continue to exploit social media and hack into the latest, most popular applications. Security experts continue to familiarize themselves with the latest cyber-exposures, but so do the criminals. Every year, hackers good and bad flock to the DEF CON conference to share the latest techniques and concepts showing just how communal this fraternity is. Tips to Protect Against Cyber Crime Use your mobile service provider s 3G (or higher) network for more secure mobile Internet communications Provision your home WI-FI router with a high-level encrypted firewall AND make it undiscoverable Monitor you children s social network and mobile computing activity, and stay up-to-date on privacy settings Work with a qualified security advisor who specializes in protecting high net worth individuals and families, and offers specific cyber protection advice Assure that you re adequately insured to withstand a loss Use sophisticated passwords and update them regularly We all have to take common sense approaches and precautions to reduce our cyber crime vulnerabilities, Becky says. Before you install your next app, enter a password, or provide private information, take a minute to understand the potential consequences to you or your family. The businesses you work with can also inadvertently pass their cyber crime exposure on to you. If you are newly wealthy, you might still be working with your local financial institution and other small companies that are not sufficiently protected against the cyber threat. It s important to validate your bank or financial institution s security protocols, Becky adds. Are their transactions secure and encrypted? Are there any weaknesses you should be aware of? Large, corporate firms generally employ robust network security protocols that address the most current cyber threats although no network is completely secure. Smaller local firms, however, don t usually have the financial resources or expertise to deploy such security systems. For this reason, it makes sense to manage your finances through a large, trusted institution. 4
5 Asking questions helps sharpen your awareness, but you may not have the expertise or tools to review your bank s security protocols. That s why it s a good idea to work with a private security advisor who can offer expertise in cyber security. They not only help with background research and network security on both a personal and enterprise level, but they also provide tips and education on effective measures you can take to guard against cyber crime. It is also essential to insure your assets and reputation should you suffer a loss due to cyber crime. Recovering your stolen identity or lost assets can be expensive and time-consuming. And if you are a business leader, politician, celebrity or other high net worth individual, restoring a damaged reputation can also be difficult and costly. Good insurance provides some reassurance that you can financially recover from a cyber crime. Not all insurance providers can meet your unique needs, so be sure to talk to your independent agent or broker. Not all insurance providers can meet your unique needs, so be sure to talk to your independent agent or broker. They can offer expert advice on coverage solutions and recommend the best insurance company to help protect your family against cyber crime. WHAT TO LOOK FOR IN AN INSURANCE CARRIER Because cyber crime is evolving so quickly, many insurance carriers have been slow to develop specific cyber-protection policies for individuals and families. However, such coverages are beginning to enter the market. Ask your independent insurance agent about providers that not only offer high limits excess policies, but actually specialize in high net worth personal insurance. Some excess policies even feature crisis management endorsements that can pay for a PR agency to help restore your reputation particularly valuable to corporate or non-profit executives and high-profile individuals. Additionally, it is essential that your insurance company understands your lifestyle and offers a cyber family safety service that addresses your unique needs. Some carriers offer an in-home safety consultation or they can recommend an international personal security firm with expertise in protecting wealthy individuals and families. With the many evolving facets of cyber crime, you need an insurer who stays on the forefront of family protection and continuously innovates to cover emerging risks. ABOUT FIREMAN S FUND Since 1863, Fireman s Fund has partnered with independent agents and brokers to protect the future for individuals, families and businesses. We ve helped rebuild cities, pioneered new insurance solutions and managed risk for the world s most popular films. Today, we are industry leaders in high net worth, entertainment and commercial insurance. Backed by superior claims and risk services, we re there for our customers before, during and after they incur a loss. We are a member of the Allianz Group one of the world s largest insurance providers and have a strong financial foundation. Fireman s Fund began with a promise to support firefighters in their mission to make communities safer. We continue this tradition through our Heritage Program and contribute a portion of our profits to fire service organizations across the United States. For more information, visit firemansfund.com. This article provides general information and recommendations that may apply to many different situations. Any recommendations described in this article are not intended to be specific to your unique situation. Consult with your insurance company and specialists to determine how and whether the information in this article might guide you in developing specific plans or procedures for your home. This article does not substitute for legal advice, which should come from your own counsel. Any description of insurance coverage is a partial summary of coverage available. Your actual coverage will depend on the terms and conditions of your policy and the limits you select. The policy may contain exclusions and limitations that are not detailed in this article and coverage may differ by state Fireman s Fund Insurance Company, Novato, CA. All rights reserved. LR
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationNational Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationPCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
More informationSocial Media and Cyber Safety
Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant andrew@justbesafe.com Social Media and Cyber Safety Our instructor today
More informationCybersecurity Protecting Yourself, Your Business, Your Clients
Cybersecurity Protecting Yourself, Your Business, Your Clients Global Summit of Women June 7, 2014 Celina B. Realuyo Professor of Practice of National Security Affairs William J. Perry Center for Hemispheric
More informationBEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary
BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME Executive Summary In support of National Cyber Security Awareness Month (October), ESET and the National Cyber Security Alliance (NCSA) commissioned
More informationFrom Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense
1 of 5 11/17/2014 4:14 PM 800.268.2440 From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense Share This Every other week it seems like there is another secure data breach
More informationMalware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
More informationHow To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device
Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
More informationProtect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
More informationProtecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?
Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat
More information10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
More informationClient Education. Learn About Identity Theft
Client Education Learn About Identity Theft 2 What is identity theft? 6 Detecting identity theft 10 Minimizing your risk 14 What to do if you re a victim The Federal Trade Commission (FTC) estimates that
More informationIntroduction to Computer Security
Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security
More informationWHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
More informationCox High Speed InternetSM Connect to your online world faster than you can imagine. Plus, access a whole host of tools to make your Internet
Cox High Speed InternetSM Connect to your online world faster than you can imagine. Plus, access a whole host of tools to make your Internet experience friendlier, easier and more cutting edge. 43 Connecting
More informationGUIDE TO FINDING THE RIGHT INSURANCE PARTNERS
GUIDE TO FINDING THE RIGHT INSURANCE PARTNERS Protecting your future since 1863 MANAGING RISK FOR FINANCIALLY SUCCESSFUL FAMILIES MANAGING RISK FOR FINANCIALLY SUCCESSFUL FAMILIES When it comes to protecting
More informationIs your business secure in a hosted world?
Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer
More informationThe Hidden Dangers of Public WiFi
WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect
More informationCYBERSECURITY: Is Your Business Ready?
CYBERSECURITY: Is Your Business Ready? Cybersecurity: Is your business ready? Cyber risk is just like any other corporate risk and it must be managed from the top. An organization will spend time monitoring
More informationSecurity Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
More informationProtecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
More informationProtect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
More informationFinding a Cure for Medical Identity Theft
Finding a Cure for Medical Identity Theft A look at the rise of medical identity theft and what small healthcare organizations are doing to address threats October 2014 www.csid.com TABLE OF CONTENTS SUMMARY
More informationWHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
More informationINTRODUCTION. Identity Theft Crime Victim Assistance Kit
Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change
More informationToday s mobile ecosystem means shared responsibility
It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has
More informationNORTON CYBERSECURITY INSIGHTS REPORT
NORTON CYBERSECURITY INSIGHTS REPORT Get informed about the truths of online crime and the personal impact it has on you Table of Contents > INTRODUCTION... 3 > WE KNOW THE RISK FOR ONLINE CRIME IS HIGH...
More informationLearn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
More informationCyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA
More informationHow child identity theft happens.
How child identity theft happens. Facts you should know about identity theft. What is identity theft? Identity theft is the act of using someone s personal information such as an account number, driver
More informationCyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
More informationIdentity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com
Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity
More informationPolicy for Protecting Customer Data
Policy for Protecting Customer Data Store Name Store Owner/Manager Protecting our customer and employee information is very important to our store image and on-going business. We believe all of our employees
More informationPROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT
PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center
More informationOpen an attachment and bring down your network?
Open an attachment and bring down your network? Many people think this will never happen to them, but virus attacks can come from unlikely sources and can strike when you least expect it. They can wreak
More informationIDENTITY THEFT FRAUD
FRAUD ALERT! SYNTHETIC IDENTITY THEFT FRAUD & n How to Protect Yourself n Data Breaches and You n Free Credit Reports SYNTHETIC IDENTITY THEFT and FRAUD It is hardly news that identity thieves and cybercriminals
More informationOnline Security Tips
Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized
More informationInformation Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
More informationPROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
More informationSENIORS ONLINE SECURITY
SENIORS ONLINE SECURITY Seniors Online Security Five Distinct Areas Computer security Identity crime Social networking Fraudulent emails Internet banking 1 Computer security 2 There are several ways that
More informationTeen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online
Research Conducted By: Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online [ photo here The Teen Online Identity Generation Theft Gap November November 20132012
More informationSAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
More informationReport on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012
Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents
More informationDo s & Don ts Reference website. www.farmersidentityshield.com
What is identity theft? How do thieves steal an identity? What do thieves do with a stolen identity? How can you find out if your identity was stolen? How long can the effects of identity theft last? What
More informationBad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationProactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
More informationYour Digital Dollars Online & Mobile Banking
Your Digital Dollars Online & Mobile Banking There are a lot of benefits to being able to bank or make payments from just about anywhere, but it s important to know how to do these things safely. Understanding
More informationCyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
More informationI know what is identity theft but how do I know if mine has been stolen?
What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card
More informationChild Identity Theft Education Kit
Child Identity Theft Education Kit Who s at Risk? Consider a teenager who is about to start college. She has deposited money into a savings account and is ready to move it into a checking account. Much
More informationA practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
More informationIdentity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection
Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationNine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
More informationHow To Protect Your Data From Being Hacked
Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW
More informationInternet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1
P a g e 1 Internet Basics ABOUT THIS CLASS This class is designed to provide a basic introduction to accessing and navigating the internet (a.k.a. the world wide web or the web ). Throughout the class,
More informationCyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s
Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s 1 Agenda Data Security Trends Root causes of Cyber Attacks How can we fix this? Secure Infrastructure Security Practices
More informationSCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
More informationHigh Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
More informationNorton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
More informationIdentity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS
This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION
More informationTahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.
Tahoe Tech Group LLC Cyber Security Briefing Truckee Donner Chamber of Commerce March 6, 2015 Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.
More informationCase study: What the? Online scams and identity theft
Case study: What the? Online scams and identity theft Theme The internet and mobile technologies are a source of scams and identity theft. Key learning/subject areas Cross curricula. Duration One to two
More information2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE
2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE WHO ARE WE? 12 years of local Tech, Training and Website services Service the 4 areas of life Regularly
More informationBo Holland is the Founder & CEO of AllClear ID with deep expertise in Identity theft prevention, security, and technology
AllClear ID (www.allclearid.com) is an identity protection company based in Austin, Texas, and is powered by Debix, a leader in identity protection technology. Our leading technology and customer service
More informationHow to Prevent It What to Do If You Are a Victim
How to Prevent It What to Do If You Are a Victim www.tn.gov/consumer www.tn.gov/safety Tennessee Division of Consumer Affairs Identity theft happens when someone steals your personal information and uses
More informationWelcome to the Protecting Your Identity. Training Module
Welcome to the Training Module 1 Introduction Does loss of control over your online identities bother you? 2 Objective By the end of this module, you will be able to: Identify the challenges in protecting
More information2011 NCSA / McAfee Internet Home Users Survey
2011 NCSA / McAfee Internet Home Users Survey National Cyber Security Alliance McAfee Zogby International October 2011 Methodology and Sample Characteristics IBOPE Zogby International was commissioned
More informationComputer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
More informationPROTECTING YOUR IDENTITY:
PROTECTING YOUR IDENTITY: What to Know, What to Do Britt Short 2013 Raymond James & Associates, Inc., member New York Stock Exchange/SIPC. Raymond James is a registered trademark of Raymond James Financial,
More informationTrust Digital Best Practices
> ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or
More informationIdentity Theft Assistance Kit A self-help guide to protecting yourself and your identity
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have
More informationplatforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential
Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.
More informationGUIDE TO PROTECTING YOUR BUSINESS
GUIDE TO PROTECTING YOUR BUSINESS GT44GPBW As a small business owner, fraud is a significant threat to your business. According to a 2012 study by the Association of Certified Fraud Examiners, the smallest
More informationMedical Information Breaches: Are Your Records Safe?
Medical Information Breaches: Are Your Records Safe? Learning Objectives At the conclusion of this presentation the learner will be able to: Recognize the growing risk of data breaches Assess the potential
More informationBeen in technology for 22 years Westinghouse Senior Manager at Clifton Gunderson-7th largest CPA and consulting firm in the U. S. Partner / Director
Been in technology for 22 years Westinghouse Senior Manager at Clifton Gunderson-7th largest CPA and consulting firm in the U. S. Partner / Director in Kenneally and Company s technology consulting practice
More informationAIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
More informationCyber Security Strategies for the Small Business Market
Cyber Security Strategies for the Small Business Market Solutions for Small Business Reports are designed to demonstrate how new technologies enabled by cable providers help small business owners and managers
More informationAIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
More informationSTOP THINK CLICK Seven Practices for Safer Computing
Seven Practices for Safer Computing Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than earlier generations
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
More informationDISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
More informationCyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
More information1 Billion Individual records that were hacked in 2014 3.
783 Major data breaches in 204 up 27% from 203 2. Billion Individual records that were hacked in 204 3. 3 Fraud has changed The way we live and manage our finances today has changed radically from just
More information7 Simple Smartphone Privacy Tips:
7 Simple Smartphone Privacy Tips: An Exclusive White Paper for Deluxe Customers by John Sileo CT22JSWP Most business people think of their smartphone as a highly critical and necessary tool in running
More information10 best practice suggestions for common smartphone threats
10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth
More informationTop 10 Tips to Keep Your Small Business Safe
Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,
More informationVisa CREDIT Card General Guidelines
Visa CREDIT Card General Guidelines General Account Information Phone Numbers and Addresses It is very important to keep us up-to-date with your correct address and phone number. Card reissues/replacements
More informationSocial Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
More informationIdentity Theft. Providing Your Student with a Safety Net By Sun Ow
Identity Theft Providing Your Student with a Safety Net By Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial
More informationDigital Safety and Privacy
Digital Safety and Privacy Class Description: As computers and the Internet become more and more the way we communicate, we need to be aware of potential threats to our security online. This class discusses
More informationScams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
More informationHow To Protect Yourself From Identity Theft
Learn about identity theft Investor education Protecting a vital asset: Your identity A 2013 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the
More informationIDENTITY THEFT: MINIMIZING YOUR RISK
IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social
More informationOCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
More informationProtect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity
More informationIdentity Theft and Online Security
Identity Theft and Online Security ACI-588788 American Century Investment Services, Inc. Goals for Presentation Identity Theft - What is it and how are we at risk? Social Media - How much online security
More information