PREVENTING HIGH-TECH IDENTITY THEFT



Similar documents
Identity Theft Protection

Internet Security. For Home Users

Deter, Detect, Defend

FTC Fact Sheet Identify Yourself

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Learn to protect yourself from Identity Theft. First National Bank can help.

Advice about online security

& INTERNET FRAUD

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Protecting your business from fraud

Protection from Fraud and Identity Theft

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

10 Things You Need to Know About Internet Security

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

BE SAFE ONLINE: Lesson Plan

F-Secure Anti-Virus for Mac 2015

Retail/Consumer Client. Internet Banking Awareness and Education Program

Fraud Prevention Tips

Safe Practices for Online Banking

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

HELPFUL TIPS: MOBILE DEVICE SECURITY

STOP THINK CLICK Seven Practices for Safer Computing

How to stay safe online

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

National Cyber Security Month 2015: Daily Security Awareness Tips

The Canadian Resource Centre for Victims of Crime Centre canadien de ressources pour les victimes de crimes. Identity Theft and Phishing

I dentity theft occurs

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

7 PRACTICES FOR SAFER COMPUTING

3 day Workshop on Cyber Security & Ethical Hacking

F-Secure Anti-Virus for Mac. User's Guide

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection

Saheel KHOYRATTY. Partner Technology Advisor

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Cyber Security. Securing Your Mobile and Online Banking Transactions

Remote Deposit Quick Start Guide

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

CLEAR LAKE BANK & TRUST COMPANY Internet Banking Customer Awareness & Education Program For Businesses

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Business ebanking Fraud Prevention Best Practices

Frequently Asked Questions (FAQ)

IDENTITY THEFT: MINIMIZING YOUR RISK

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Identity Theft Protection

Protect yourself online

What to Know, What to Do

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

PREVENTING ID THEFT101

Don t Fall Victim to Cybercrime:

Cyber Security. Maintaining Your Identity on the Net

Safeguarding Your information and accounts

ONE Mail Direct for Mobile Devices

Helping you to protect yourself against fraud and financial crime

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

ecommercial SAT ecommercial Security Awareness Training Version 3.0

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

Identity Theft Prevention Program Compliance Model

Identity Theft Prevention Presented by: Matt Malone Assero Security

Guide to credit card security

Infocomm Sec rity is incomplete without U Be aware,

An Introduction on How to Better Protect Your Computer and Sensitive Data

Corporate Account Take Over (CATO) Guide

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

10 Quick Tips to Mobile Security

Fraud Guide Fraud Protection

Understand What s Going On

INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account

INFORMATION SECURITY GUIDE FOR STAFF

Malware & Botnets. Botnets

Transcription:

1 PREVENTING HIGH-TECH IDENTITY THEFT Presented by The Monument Group Companies Featured speaker: David Floyd November 19, 2014

2 Introduction Preventing Identity Theft (this session) Monitoring for Theft (future session) Responding to Theft (future session)

3 Overview What is identity theft? High-tech methods Phishing emails Spyware Data retrieval from discarded devices Minimizing Risk Device Safety Safe device disposal Internet Safety Create strong, private passwords

4 What Is Identity Theft? Someone steals your personal information Someone uses your personal information without your permission Can damage your finances, credit history and reputation

5 High Tech Methods: Phishing Emails Scammers use addresses that appear legitimate to collect your information and use it to commit fraud Logos and links can appear to be authentic Legitimate companies never ask for personal information via email or text

6 High Tech Methods: Spyware Malware and Spyware are installed on your device without your consent. They can be used to steal personal information, send spam, or commit fraud. Scam artists try to trick people into clicking on links that will download malware and spyware to their computers. Your computer may be infected with malware if it slows, crashes or displays repeated error messages. Other signs are many pop-ups, new toolbars or icons, or laptop battery that drains more quickly than it should.

7 High Tech Methods: Data Retrieval Something as simple as posting a resume online can be valuable to identity thieves. Identity thieves can assemble pieces of the overall picture from different sources: your Social Security number from one source, your date of birth from another, your home address from a third. Posting or emailing any such personally identifying information puts you at risk.

8 Minimizing Risk: Device Safety Use anti-virus software, anti-spyware software, and a firewall and keep them updated Create strong passwords Keep your computer s operating system, browser, and security up to date Lock your laptop when you step away Encrypt data while browsing online Don t use public wireless networks to send sensitive information

9 Minimizing Risk: Device Disposal Even if files appear to be deleted, the underlying data remains on hard drive. To remove data permanently, use a utility wipe program these programs are inexpensive or can be found online for free. Use manufacturer or service provider s information to determine how to remove memory in a mobile device. Hard drives and mobile devices can also be professionally destroyed.

10 Minimizing Risk: Internet Safety Only provide personal or financial information if you typed in the web address yourself and see a URL that begins with https or see the lock icon. Be cautious about opening attachments or downloading files from emails, regardless of who sent them. Don t email personal or financial information unless it is encrypted. Don t overshare on social networking sites.

11 Minimizing Risk: Strong Passwords Always use strong passwords Password strength is determined by two things: The length of the password, how large a set of characters and symbols it is drawn from, and whether it was created randomly or in a more predictable way How the password is stored and used

12 Minimizing Risk: Strong Passwords The longer the password the better Use upper and lower case letters, along with numbers and symbols Avoid using the same password twice Don t use information that may be associated with your name Try using the initial letter of words in a sentence

13 Minimizing Risk: Strong Passwords If you must write passwords down, keep them locked in a safe place. Use an online password storage site such as Dashlane, SecureSafe, or PasswordBox. Change passwords often.

14 Summary Identity protection is treating your personal information like your other valuables. You lock up your house, you may have home security and monitoring in order to keep thieves out. Treat your personal information online in the same manner. Lock your information with strong passwords. Don t share too much personal information online Shred both sensitive documents and old computer hard drives, memory sticks, removable disks, etc. In the next presentation, we will cover how to monitor for identity theft and how to respond if your identity has been stolen.

15 Additional Resources www.monumentgroupwealth.com Visit our website for additional identity theft resources New resources will be added over time

16 Contact We welcome your questions. Please contact us at: The Monument Group Companies 801 Main Street, Concord MA 01742 Byron E. Woodman, Jr. bwoodman@woodmaneaton.com Lee C. McGowan, CFP lmcgowan@monumentgroupwealth.com 978-369-0960