1 / 17

Asian Indian Americans of Central Pennsylvania

Asian Indian Americans of Central Pennsylvania. Work Life Balance. THANKS TO ALL OUR SPONSORS . Asian Indian Americans of Central Pennsylvania. Work Life Balance. Personal Technology: Realizing the Safety and Security in Digital World. Mr. Srini Subramanian. Speaker. Segment

maxima
Download Presentation

Asian Indian Americans of Central Pennsylvania

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Asian Indian Americans of Central Pennsylvania Work Life Balance THANKS TO ALL OUR SPONSORS

  2. Asian Indian Americans of Central Pennsylvania Work Life Balance Personal Technology: Realizing the Safety and Security in Digital World Mr. Srini Subramanian Speaker Segment Sponsor 2014 Sponsors

  3. Safety and Security in Cyberspace Identity theft and Cyberbullying

  4. The need for online safety • The rise of the internet has increased and eased the user’s ability to share and access data online. For example, 69 million Americans bank online1 • Cyber threat is the number-one danger to national security • In 2012, About 12.6 million Americans were reportedly victims of identity fraud • Identity fraud cost Americans nearly $21 billion in 2012 • Children ages 19 and under made up 6% of all identity theft cases • Seven in ten young people are victims of cyberbullying • 75% of children will share personal information for goods and services • In 2012, 56% of cases reporting misuse of a social security number are for children • Expectations • Share your experience • Spread the message • Stop.Think.Connect. • Sources: • 1 and 2: Javelin Strategy & Research, 2013 Identity Fraud Report: Data Breaches Becoming a Treasure Trove for Fraudsters, February 2013. • 3: Federal Trade Commission, 2012 • 4 and 5: http://www.stcguide.com/ (DHS’ Stop.Think.Connect. Campaign) • 6: 2012 Child Identity Fraud Report, Identity Theft Assistance Center

  5. Source: Federal Department of Homeland Security (DHS) National Cybersecurity Awareness Campaign Identity Theft

  6. Scams lead to Identity Theft… Scammers use several medium to trick individuals in sending them financial and personal information. The mediums includes • Internet • Telephone • Print media. Some popular scams include: • Phishing • Internet Auction Fraud • Investment fraud • Healthcare fraud • Ransomware • Nigerian Letter or “419” • Telemarketing fraud • Advance Fee fraud.

  7. Ransomware based scams are increasing… Ransomware is a type of malware that prevents you from using your computer until you pay a certain amount of money. It’s essentially extortion, with all the data on your computer at risk unless you pay. Prevention tips: • Conduct routine backup. • Maintain anti-virus software up-to-date. • Keep your OS and software patches current. • Do not follow unsolicited web links in email and attachments. • Follow safe practices when browsing the web. Mitigation tips: • Immediately disconnect the infected system from wireless or wired networks. • Consult with a reputable security expert to assist in removing the malware. • Change all online account passwords and system passwords. • Sources: • https://www.us-cert.gov/ncas/alerts/TA13-309A • http://www.consumer.ftc.gov/blog/back-back-back-it • Ransomware: A Growing Menace, Symantec publication

  8. IRS monitor: $1 million phone scam 'largest ever‘… Callers claiming to be from the IRS tell intended victims they owe taxes and must pay using a prepaid debit card or wire transfer. The scammers threaten those who refuse to pay with arrest, deportation or loss of a business or driver's license. In 2014 alone, IRS has received over 20,000 complaints What can you to protect? • If you owe taxes, the IRS will contact you by U.S. mail -- not email. • IRS does not ask for payment via debit card or wire transfer. • IRS does not ask you to provide a credit card number over the phone. • IRS does not request personal or financial information by e-mail, text or social media. • If you don't owe taxes, call and report the incident to the Treasury inspector general of tax administration at 1-800-366-4484. • File a complaint with the Federal Trade Commission at www.FTC.gov • Do not open any attachments or click on any links in the email. Send it to phishing@irs.gov. Sources http://www.cbsnews.com/news/irs-warns-of-biggest-tax-scam-ever/ http://money.cnn.com/2014/03/20/pf/taxes/irs-phone-scam/ http://www.irs.gov/uac/Newsroom/IRS-Releases-the-%E2%80%9CDirty-Dozen%E2%80%9D-Tax-Scams-for-2014;-Identity-Theft,-Phone-Scams-Lead-List

  9. Pennsylvania “Pizza Scam” One of the newer scams targeting travelers is often called the "Pizza Scam" because pizza delivery menus, conveniently slipped under a hotel room door, often contain a telephone number that is not connected to a pizza parlor, but rather to identity thieves. Source: http://www.attorneygeneral.gov/press.aspx?id=7621

  10. Poll • Do your children know more about the Internet and technology than you do? • Do your kids have their own computers? Do they have their own cell phones? • What is your top concern about children using on the internet?

  11. Source: Federal Department of Homeland Security (DHS) National Cybersecurity Awareness Campaign Cyber Bullying

  12. Kids lead Digital Lives • On average, kids 10 and older spend approximately 6 hours a day online. 1 • Most parents estimate their child spends 4 hours a day online.1 • Most kids access to the Internet becomes more mobile—cellphones, tablets, etc.—as they age.1 • Over 50% of sexual exploitation victims are between the ages of 12 and 15.2 • Seven in 10 young people are victims of cyberbullying and 37% experience cyberbullying on a frequent basis.3 Seventy-four percent of parents admit to not knowing about their children’s online behavior, but 46% of youth say that they would change their online behavior if their parents were paying attention1 Source: 1. McAfee Digital Deception Study 2013 2.Teaching teens safety on the Internet, http://www.kfvs12.com/story/17019016/teaching-teens-safety-on-the-internet, 2012 3. Ditch the Label Annual Cyberbullying Survey 2013

  13. An eye opener… Let’s fight it together Cyberbullying is the electronic posting of mean-spirited messages about a person, often anonymously.

  14. How would you feel? Who bullied Trey? Do you think it is realistic that the police were involved? What could Trey have done differently? If you went to the same school as Trey what could you have done to remedy the situation?

  15. Make the Right Decisions – A Call to Action Tips for parents Tips for children • Create an open and honest environment for discussing online behaviors and security risks. • Start conversations regularly about practicing online safety and focus on offering guidance instead of trying to control children’s online behavior. • Emphasize the concept of credibility and encourage children to proceed with caution. • Talk with children about the importance of creating and maintaining a positive online identity. • Watch for changes in behavior. • Review security settings and privacy policies for the websites your child uses. • Stay in control of your online image. • Respect your own and other people’s privacy. • Always report bullies – save conversations, block contacts and do not reply. • Online friends are still strangers! • Online activity lasts forever!

  16. Online Resources • www.stcguide.com • http://www.onguardonline.gov • http://www.consumer.ftc.gov/features/feature-0014-identity-theft • http://www.ic3.gov • http://www.fbi.gov/scams-safety/fraud/internet_fraud • http://www.cyberbullying.us • https://www.staysafeonline.org/

More Related