Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office



Similar documents
Retail/Consumer Client. Internet Banking Awareness and Education Program

Identity Theft Protection

Learn to protect yourself from Identity Theft. First National Bank can help.

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Customer Awareness for Security and Fraud Prevention

Fraud Prevention Tips

IRS Criminal Investigation. Detroit Field Office

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Protecting Yourself from Identity Theft

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Protecting Yourself from Identity Theft

BE SAFE ONLINE: Lesson Plan

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

IDENTITY THEFT: MINIMIZING YOUR RISK

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Identity Theft Protection

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Best Practices Guide to Electronic Banking

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Deter, Detect, Defend

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

T-CY Guidance Note #4 Identity theft and phishing in relation to fraud

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Internet threats: steps to security for your small business

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number.

& INTERNET FRAUD

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Fraud Guide Fraud Protection

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

Chapter 9: Network and Internet Security

I dentity theft occurs

National Cyber Security Month 2015: Daily Security Awareness Tips

Chapter 9-Section 3. Consumer Protection Laws

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Malware & Botnets. Botnets

Corporate Account Takeover & Information Security Awareness. Customer Training

suntrust.com 800.SUNTRUST

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud

Corona Police Department

Small businesses: What you need to know about cyber security

Regions Identity Theft Kit

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

Dr. David Turahi Director for IT&IMS - MOICT Uganda

FRAUD ALERT THESE SCAMS CAN COST YOU MONEY

OIG Fraud Alert Phishing

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

Remote Deposit Quick Start Guide

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on

Introduction (Contd )

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

Don t Fall Victim to Cybercrime:

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

Business ebanking Fraud Prevention Best Practices

Why is a strong password important?

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Internet basics 2.3 Protecting your computer

VISA International Security Summit. Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department

3 day Workshop on Cyber Security & Ethical Hacking

Avoid completing forms in messages that ask for personal financial information.

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Identity Theft Prevention Presented by: Matt Malone Assero Security

What is Identity Theft?

Information Security Awareness

Corporate Account Take Over (CATO) Guide

Driving License. National Insurance Number

Identity Theft. What it is and How to Protect Yourself

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Transcription:

Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention / Recommendations Future Trends 2

Threats / Techniques for Identity Theft Crimes (1/2) Cyberattack Threats and Techniques: Phishing Spam and Identity Theft Email Scam and Fake Web Sites Pharming Hacker Insider Spyware and Adware Malware / Ransomware Trojan Horse 3

Threats / Techniques for Identity Theft Crimes (2/2) Other Threats and Techniques: Card Skimming Voice Phising Vishing Social Engineering Media Pick pocketing Garbage bins Theft Home Mail Box theft Theft of Utility Bills, Tax Revenue Bills and Social Security Information 4

Identity Theft Definition Identity theft occurs when a party acquires, transfers, possesses or uses personal information of a natural or legal person in an unauthorised manner with the intent to make a false representation as to his identity in order to make a gain or acquire a benefit for himself or another or to cause loss to another or expose another to a risk of loss. Identity Theft has Primary (the entity whose identity is abused) and Secondary victims (the third party who is defrauded). The victim can be individuals, business corporations or other entities. Identity Information: name, mother s maiden name passport number, biometrical data, credit card information, usernames and passwords, social security and tax data, utility bills data 5

Identity Theft Some Facts (1/2) Drug trafficking has officially been replaced by identity theft as the number one crime. People between the ages of 18-29 are more likely to experience identity theft. The most common type of identity theft is linked to credit card fraud. Source: Consumer Sentinel Identity Theft Data Clearinghouse 6

Identity Theft Some Facts (2/2) One third of all targeted attacks aimed at businesses with less than 250 employees (source: Symantec 2013). Criminals still rely on nontechnological methods to perform Identity Theft crimes (source: European commission 2012). Stolen Identities Information can be used for a large period (Source: Consumer Sentinel Identity Theft Data Clearinghouse). The emotional impact can be greater than the financial (source: US Department of Justice). 7

Non Financial Identity Theft Crimes Social Security Identity Theft Criminal Identity Theft Medical Identity Theft Driver s License Identity Theft Complete Identity Cloning Synthetic Identity Theft 8

Identity Theft and Financial Institutions Fraudsters can use Identity Information to perform: Open bank account Clone Credit Cards for illegal purchases (individual) or fake transactions (merchant) Clone Debit cards for cash advances Check forgery Obtain loans Illegal money transfer 9

Prevention / Recommendations for Enterprises Enterprise that store sensitive data (credit card, bank account data, personal information) should protect their systems from outside and inside threats. No single layer of attack prevention is enough. Multiple layers must be employed. (eg account behavior monitoring across channels, secure browsing applications, etc) Establish Fraud management framework. Establish a stringent internal control framework to prevent insider threat (data classification, risk management framework, DLP, access controls, etc). 10

Prevention / Recommendations for Individuals Limit the information in purses, wallets, pockets, etc. Make online purchases from known companies only Do not click suspicious links in emails Download latest updates and fixes, use firewalls and install antivirus Protect your mobile device Memorize your passwords Shred documents at your home/office before disposal Clean IT assets before disposal 11

illegal money transfer malware ransomware virus insider email scam hacker trojan horse adware bill theft spyware AWARENESS identity theft attacks phishing social security theft compromised pay security mac attack mail theft Check forgery Credit card cloning pick pocketing spam mobile threats vishing identity cloning 12

Future Trends Growth of Social Networking: Social media identity may be more valuable to cyber criminals than credit cards New attack methods will go through the victim s social media friends. Mobile devices (smartphone, tablet) is the new target: BYOD a new headache for enterprises Mobile transactions payments, purchases, email access, software access Fake technology tools are on the rise Mac Attacks a new attack vector 13

Conclusion Points Identity Theft is on a rise Hackers are getting "smarter E-commerce / e-banking Services / Mobile Devices / e-tax - new fraud frontier Companies need to invest on stronger control framework and new technologies Focus should be given to outside and inside threats Users / individuals should be AWARE! 14

Questions and Answers 15