1 / 25

The Risks of Identity Theft

The Risks of Identity Theft. IDENTITY THEFT VICTIMS COULD: Have any and all of their financial accounts invaded and emptied. Be asked to repay debts they did not incur. Lose job opportunities. Lose their good credit rating. Be refused loans. Be sued for things they have no part of.

koko
Download Presentation

The Risks of Identity Theft

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Risks of Identity Theft • IDENTITY THEFT VICTIMS COULD: • Have any and all of their financial accounts invaded and emptied. • Be asked to repay debts they did not incur. • Lose job opportunities. • Lose their good credit rating. • Be refused loans. • Be sued for things they have no part of. • Even be arrested for crimes they didn’t commit. 5-M

  2. Phishing(fish´ing) (n.) The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. • Legitimate companies NEVER ask for this information via E-mail or pop-up message Phishing

  3. Free software or Freeware free computer software • Can be a scam to get your personal information • Take the time and read the end-user licensing agreement so you understand what you are saying yes to by using the software Freeware

  4. Spyware bad side effect of free downloads • Some downloads install spyware onto your hard drive without your consent • Some spyware monitor or control your computer use • Send pop-up ads • Redirect your computer to unwanted Websites • Record your keystrokes Spyware

  5. SCAMMED! The news of my father death, and my uncle,s involvement in an air crash in december 2002 while on a business trip to benin republic caused my mother heartfailure and other related complications of which she later died in the hospital After we have spent a lot of money on her. Before our mother died, she told us that our father deposited some money which he made from diamond sales and contracts at this bank here in Ivory Coast and that we should pray and find a trust worthy foreign business partner who would help us to transfer and invest this money in profitable business venture overseas.She told us to do this quickly so that we can leave Ivory Coast and, then settle down abroad. She gave us the bank document to prove the deposit and then told us that my father used my name as the next of kin and beneficiary to the money in the bank in the event of his death. If you are willing to assist us, please let us know immediately so that you will arrange the transfer of the money to your account with the bank. What’s Going on Here? What’s Going on Here?

  6. What Should You Do? Dealing With Deception • You walk up to an ATM and a guy who appears to be waiting his turn walks up behind you. But he’s uncomfortably close—right over your shoulder—as you get ready to enter your PIN.

  7. What Should You Do? Dealing With Deception • You’re at a cash register in a store and have given the clerk your credit card. She holds on to it, probably to verify your signature. But then she says she needs to grab something from the back and starts to walk away with your card in hand.

  8. What Should You Do? Dealing With Deception • A caller says she’s from your credit card company and wants to offer you a higher credit limit for being such a good customer. You reply, “Great, what do I have to do?” And she tells you to give her your Social Security number for verification.

  9. What Should You Do? Dealing With Deception • You’ve found a pair of shoes at a great price on a Web site you just found. You start the check-out process and notice that the padlock at the bottom of your computer screen is open and that the Web page address starts with “http” instead of “https.”

  10. What Should You Do? Dealing With Deception • You get an E-mail from an online bookstore you frequently buy from. It says that the credit card on your account has expired and gives you a link to update your information.

  11. What Should You Do? Dealing With Deception • Your friend sends you an E-mail about cool new software that lets you share music with others for free. He sends you the link to download the software, which is from a site you’ve never heard of.

  12. What Should You Do? Dealing With Deception • You’re bummed out about losing in an online auction. But then you get an E-mail stating the winner backed out and that you can have the item if you still want it, and to just send your credit card information via E-mail.

  13. So How Do You Keep Your Personal Information Secure With So Many Threats Out There???

  14. Tips to Protect Your Identity! Don’t carry your Social Security card or other cards that show your SSN with you.

  15. Tips to Protect Your Identity! Shred bill statements and any documents that may have personal information on them

  16. Tips to Protect Your Identity! Sign new cards; Destroy old ones.

  17. Tips to Protect Your Identity! Use caution on the Web. Read the privacy policy and take opportunities to opt out of information sharing. Only enter personal information on secure websites. “https” and/or closed padlock

  18. Tips to Protect Your Identity! Scan a copy of all cards and other information you keep in your wallet. Print out or keep an electronic copy in a secure place to use in case your wallet is ever stolen.

  19. Tips to Protect Your Identity! Check and review all your statements for unauthorized use. Report them right away. Call if bills don’t arrive on time. It may mean that someone has changed your contact information.

  20. Tips to Protect Your Identity! Use caution when asked for personal information over the phone, internet and mail. Scam artists “phish” for information by pretending to be legitimate banks, stores, or government agencies.

  21. Tips to Protect Your Identity! Use strong/long, non-easily guessed passwords

  22. Tips to Protect Your Identity! Download software only from sites you know and trust and only after reading all the terms and conditions.

  23. Tips to Protect Your Identity! Use firewall, anti-virus, and anti-spyware software that you update and run regularly.

  24. Tips to Protect Your Identity! Don’t click on links in pop-up windows or in spam e-mail.

  25. What Happens When FraudComes a Knockin’? • Place a “Fraud Alert” on your credit reports, and review the reports carefully. • Cancel all your credit, debit and other card accounts. • Call police if you are confident your identity has been stolen. • Report loss to Social Security, and apply for a new SS number. • File a complaint with the Federal Trade Commission at www.ftc.gov/idtheft

More Related