Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com
Matt Malone Fall 2015 Spring 2016
IDENTITY THEFT Identity theft is a serious crime. People whose identities have been stolen can spend months or years and thousands of dollars cleaning up the mess the thieves have made of a good name and credit record. When someone assumes your identity / credit to obtain services, products, money, or trust. Loans and Credit Lines, Prescriptions, Bill Payments, Shipping, Medical Services. In todays business world your information is already online. Interested in credit card theft? There s an app for that.
IDENTITY THEFT How do Thieves Steal your Identity Mail, Wallet or Purse, Trash Checks Bribing or Conning an employee with access Hacking the information Online Skimming Phishing Scams Social Engineering Loss from your computer or smart-phone Theft or loss from businesses Theft from your home
The 3D s of Security DETER DETECT DEFEND
DETER Deter Identity Thieves by protecting and safeguarding your information: YOU must protect your information Know and trust who you give your information to: Administrative Call backs Document who you give information to Incident Response Plan Know what you want to protect A/V Malware and Updates Physical Administrative Technical
DETER Deter Identity Thieves by protecting and safeguarding your information: YOU must protect your information Know and trust who you give your information to: Physical Don t carry sensitive data Lock up your data Verify the people you allow in your home Cameras Locks Lights Shred!!! Physical Administrative Technical
DETER Deter Identity Thieves by protecting and safeguarding your information: YOU must protect your information Technical Know the site and protection you are using Watch for Pop-ups (MALWARE) Website encryption (HTTPS) Don t trust unsolicited links Passwords Encrypt your data Lock your phones, laptops, and tablets Have your old computer data destroyed (DOD Wipe) Physical Administrative Technical
PASSWORD PROTECTION Passwords: I was married to Lori on April 30 2011! IwmtLoA302011! (My son Bill was born August 21) (MsBwbA21)
DETER Phishing Site Example
DETECT Detect suspicious activity by routinely monitoring your financial accounts, billing statements and electronic systems Be Alert Mail or bills that do not arrive as expected Unexpected credit cards or account statements Denials of credit for no apparent reason Calls or letters about purchases you did not make Medication or Personal Items Missing
DETECT Inspect your Credit Report and Financial Records Recurring Amounts Odd Times, Places, or Amounts Strange Inquires for Credit Credit Monitoring Services Free credit reports yearly Detection Devices Tamper Detection Devices Locks Cameras
DEFEND Defend against identity theft as soon as you suspect a problem. Place a "Fraud Alert" on your credit reports, and review the reports carefully. Close accounts. Call the security or fraud departments of each company where an account was opened or changed without your okay. Ask for written verification that the disputed account has been closed and the fraudulent debts discharged. Keep copies of documents and records of your conversations about the theft. File a police report Report your complaint to the Federal Trade Commission Document Everything
INCIDENT RESPONSE PLAN
INVESTIGATION Law Enforcement agencies take reports but rarely investigate. They recommend the victim pursue and resolve the issue themselves. Private investigators who specialize in or are knowledgeable with financial crimes commonly assist victims of ID theft by working with the victim, develop admissible evidence of the theft, obtain and review financial data, prepare detailed investigative report and refer investigation to local law enforcement who hopefully will develop probable cause affidavits and pursue prosecution by District Attorney. Private investigators have access to records, data bases and many information resources and know how to investigate these types of crimes. Typical victims have no idea where to start and who to turn to. Private investigators can achieve positive results for victims of identity theft. In many cases private investigators have more experienced dealing with these types of cases (financial crimes and identity theft) than most law enforcement agencies. Mark Gillespie www.gillespieinvestigations.com
THANKS TO: For providing the space and opportunity for this event.
Questions? Matt Malone Phone: 800-767-1966 Cell: 512-650-0179 mmalone@asserosecurity.com www.asserosecurity.com