Holiday Safe Shopping
Or How to keep the Grinch away this Holiday Season
What is Identify Theft Scams and Technology How to Protect yourself How to Protect your customers
What is Identity Theft Identity theft is: A form of fraud in which someone pretends to be someone else by assuming that person's identity to Access resources, Obtain credit, and/or Other benefits in that person's name.
Types of Identity Theft Not *JUST* about credit cards Drivers License Social Security Medical Character / Criminal And yes, Financial
Identity Theft / Fraud Statistics (2013) Data Average number of U.S. identity fraud victims annually 11,571,900 Percent of U.S. households that reported some type of identity fraud 7 % Average financial loss per identity theft incident $4,930 Total financial loss attributed to identity theft in 2013 $24,700,000,000 Total financial loss attributed to identity theft in 2012 $21,000,000,000 Total financial loss attributed to identity theft in 2010 $13,200,000,000 Percent of Reported Identity Thefts by Type of Fraud Percent Reported Misuse of Existing Credit Card 64.1 % Misuse of Other Existing Bank Account 35 % Misuse of Personal Information 14.2 % U.S. Department of Justice Office of Justice Programs Bureau of Justice Statistics http://www.bjs.gov
Who are the Victims The person who s identity was used, and Organizations and individuals who are duped or defrauded by the identity thief Local and online retail businesses Banks (both the person s and the businesses) Hospitals, Doctors, Medical Labs
Identity Theft has been around For a long, long time: In the first book of the Christian Bible, there is the story of Jacob, fooling is blind father into giving him his brother s inheritance.
More Currently A new report from the Consumer Bankers Association estimates the cost of replacing the credit and debit cards compromised in the breach has exceeded $200 million. That s ONLY for card-replacement costs reported by the CBA and the Credit Union National Association. Factor in the impact of fraudulent activity and costs to financial institutions not members of the CBA or CUNA, and the price tag on the Target data breach gets a lot higher. Cards replaced by the associations account for about half of affected cards 21.8 million out of 40 million cards. http://blog.credit.com/2014/02/target-data-breach-cost-banks-240-million- 76636/
Who Is doing it? In 2012 -More than 50% of identify theft victims reported to the FTC that the culprits were people they know (co-workers, friends, employees, neighbors, and even family members) Today a growing trend shows organized crime getting increasingly involved
Fighting in the cyber trenches http://fortune.com/2014/10/13/cold-war-on-business-cyber-warfare/ Cyber sabotage has quickly become the 21st century s preferred form of international trade theft Creates not only economic gain, but country-related advantage In China illicit intelligence-gathering doubles as national security In Russia, recent events have caused them to look for opportunities Relations between the U.S. and China and Russia are tense, but no shot has been fired. Online, it s a different story.
Foreign cyber soldiers Independent hackers, Hackers financially backed by their countries, and Purely state-employed hackers. --Eric Chien, Distinguished Engineer, Symantec (the makers of the Norton brand of computer security software)
Russia In Moscow there are an estimated 6,000 criminal gangs, and most are believed to be involved in identity theft at some level. Many of these gangs are exploiting very bright computer students and graduates who are easily tempted by the high pay and relatively low risk, especially in a country where a teacher can often earn less than $1,000 a year. http://privacymatters.com/identity-theft-information/who-is-identity-theft.aspx
China In the Pentagon s annual report to Congresson China, the Chinese government and, in particular, the Chinese military are explicitly accused of mounting attacks on United States government computer systems and defense contractors in a systematic effort to steal intellectual property and gain strategic advantage. --New Your Times, May, 2013 (http://www.nytimes.com/2013/05/08/opinion/china-and-cyberwar.html?_r=0)
Scams and Technology
Many people do not realize how easily criminals can obtain our personal data without having to break into our homes. -- http://www.justice.gov/criminal/fraud/websites/idtheft.html
Scams & Technology Phishing Current scams in the wild www.consumer.ftc.gov/scam-alerts Using a cell phone to steal your information Recording credit card numbers Recording PIN codes http://www.youtube.com/watch?v=8vc-69m-uwk Public WI-FI http://www.youtube.com/watch?v=9m6bc0z3ua4 ATM s https://www.youtube.com/watch?v=pxyz8q9gfua Shoulder Surfing
How to protect yourself Always be aware of your surroundings Notice people with cell phones around you Cover your credit card numbers with your thumb Hide the number pad with your other hand Don t do any financial transactions on a public Wi-Fi network Check your credit card and bank statements monthly Check credit reports for ALL members of your household, including minors Check your 3 free credit reports once a year, http://www.consumer.ftc.gov/features/feature-0014-identity-theft http://www.consumer.ftc.gov/articles/0155-free-credit-reports You can stagger them, getting one every 4 months A good consumer based link for how to stay secure: https://www.jimmyjohns.com/uploadedfiles/public/recommendations.pdf
Buying from a new vendor Do your research before buying from a new vendor on ebay (or similar site) Reviews of products, product support, customer service Number of sales / responses from customers http://www.ehow.com/how_4602993_ebay-seller-legitscam-artist.html Google search term how to spot a scam on???? Make Sure the Site is Legitimate Look for the Padlock SHTTP or HTTPS Never fill out a popup screen
Protect your Debit Card Consumers should be more concerned about their debit cards. Although they usually have the logo of a credit card company, these actually access a bank account. This isn t a line of credit, where you can dispute charges this is your hardearned money that pays the bills and buys the food for your family. True, you can work with the bank to get fraudulent charges reversed, and they will eventually give your money back in some cases, but this process can take up to two months. http://idtheft.about.com/od/identitytheft101/a/a-brief-history-of- Identity-Theft.htm Consult Your bank(s) on their ID Theft policies for your debit card(s).
How to Protect Your Customers Be aware of your surroundings Protect your Point of Sale machine(s) Don t attach into a public Wi-Fi to complete customer transactions Don t allow employees to browse the internet from POS Lock it down Create Admin and Useraccounts Select the software you want and don t allow any other software to be installed. http://www.sba.gov/blogs/how-small-businesses-can-protect-andsecure-customer-information http://blogs.findlaw.com/free_enterprise/2009/09/5-ways-toprotect-customer-information.html http://smallbusiness.findlaw.com/liability-and-insurance/protectingcustomer-data.html
Some EXAMPLES of Software solutions Kaspersky: https://www.youtube.com/watch?v=vguiankktn0 Shopkeep: https://www.youtube.com/watch?v=upvpu1c2urc http://www.getapp.com/alternatives/shopkeep-pos-application (alternatives to shopkeep)
This Holiday Season, Leave the Grinch Hanging by Following Sound Buying and Selling Practices
Thank-you!