1 / 22

Avoid Identity Theft TCU Technology Resources Information Security Services

Avoid Identity Theft TCU Technology Resources Information Security Services. It only takes a few bits of information for thieves to steal your identity. Dumpster Diving Skimming Phishing Pretexting Changing Your Address Old Fashioned Stealing. Dumpster diving.

omana
Download Presentation

Avoid Identity Theft TCU Technology Resources Information Security Services

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Avoid Identity Theft TCU Technology Resources Information Security Services

  2. It only takes a few bits of information for thieves to steal your identity. • Dumpster Diving • Skimming • Phishing • Pretexting • Changing Your Address • Old Fashioned Stealing TCU Information Security Services

  3. Dumpster diving • Thieves rummage through trash looking for bills or other paper with personal information. TCU Information Security Services

  4. Skimming • Identity thieves steal credit/debit card numbers when processing your card. TCU Information Security Services

  5. Phishing • They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information. TCU Information Security Services

  6. Pretexting • Using false pretenses, thieves obtain your personal information from financial institutions, telephone companies, and other sources. TCU Information Security Services

  7. Changing Your Address • They divert your billing statements to another location by completing a “change of address” form. TCU Information Security Services

  8. “Old fashioned” stealing • They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information. They steal personnel records from their employers, or bribe employees who have access. TCU Information Security Services

  9. Personal Information • Don’t give out personal information on the phone, through mail, email or over the Internet unless you know who you are dealing with. • Shred financial documents, preapproved credit applications, insurance forms, bank statements, credit and debit card receipts and other paperwork with personal information. • Do not carry your social security card or put the number on check or credit receipts. Give it out only if necessary. • Do not put your telephone number on checks. • Keep your personal information in a safe, secure place at home. TCU Information Security Services

  10. Credit card and bank security • Make a list or photo copies of your credit and debit cards (front and back) and the contact numbers so you can quickly cancel them if stolen. Keep in a safe place. • Carry only one credit card if you can. • Use credit rather than debit bank cards. Most credit cards will not charge you if they are used fraudulently. This also reduces the risk of giving criminals direct access to your bank accounts. • Review monthly credit card and bank statements for suspicious activity. TCU Information Security Services

  11. Credit card and bank security (continued) • Watch your mail for statements. If statements do not arrive when expected it is possible an identity thief has taken over your credit card account and changed your billing address. • Be careful using ATM’s. Someone may look over your shoulder to get your PIN. • Do not put your credit card number on the Internet unless you are on a secured site (look for a yellow padlock displayed in your browser window or https in the URL). • Pick up ordered checks at the bank. TCU Information Security Services

  12. Passwords and Pins • Do not use passwords like your birth date, you mother’s maiden name or the last four digits of your social security number. • Choose security questions that no one can look up. If your mother’s maiden name is the only choice, use a different name, such as your grandmother’s name. • Change your passwords frequently, do not share you passwords with anyone and do not write down your password. • TCU Technology Resources staff will never ask for your TCU password, either by phone, in an email or in person. TCU Information Security Services

  13. Email and the internet • Be suspicious of unsolicited emails from supposedly legitimate organizations requesting personal financial information. Contact the organization directly to verify a request for information. • Do not click on links within emails unless you are absolutely certain of the source. If you want to follow a link emailed to you, copy and paste it in your browser. Still be wary of entering in any personal information. TCU Information Security Services

  14. Email and the internet (continued) • Do not fill out forms in email messages that ask for personal financial information. • Do not open email attachments unless you know who sent them and what they are. • Do not enter personal information in a pop-up screen. • When conducting any kind of financial transaction, rather than using a displayed link, type in the address of a web site. TCU Information Security Services

  15. Social networking sites such as MySpace and Facebook • Limit the amount of personal information you post. • Do not provide information that can be used to answer security questions. • Avoid providing information that will allow a person to stalk you (your address, class schedule or phone number). • Do not provide personal identifying information such as your social security number, birth date, or your mother’s maiden name. TCU Information Security Services

  16. Social networking sites such as MySpace and Facebook (continued) • Be aware that anything you post online may be copied to other places. If you delete it from your site, it is not necessarily REALLY deleted from the Internet. • Be skeptical of people who may misrepresent who they are. • Don’t believe everything you read. TCU Information Security Services

  17. Monitor your financial accounts and billing statements • Watch for bills or statements that don’t arrive in the mail as expected. • Examine bills for purchases you didn’t make. • Be alert to denials of credit for no apparent reason. • Watch for inquiries from companies you haven’t contacted, accounts you didn’t open, debts you can’t explain. TCU Information Security Services

  18. Get a credit report • Inspect the accounts and financial activity for inaccurate information. • The law requires the major nationwide consumer reporting companies—Equifax, Experian, and TransUnion—to give you a free copy of your credit report each year if you ask for it. • Visit www.AnnualCreditReport.com or call 1-877-322-8228, a service created by these three companies, to order your free credit reports each year. You can also write: Annual Credit Report Request Service, P.O. Box 105281, Atlanta, GA 30348-5281. TCU Information Security Services

  19. Suspect id theft? Follow these steps • FRAUD ALERT • Place a fraud alert on your credit reports and review the reports carefully. The alert tells creditors to follow certain procedures before they open new accounts in your name or make changes to your existing accounts. The three nationwide consumer reporting companies have toll-free numbers for placing an initial 90-day fraud alert; a call to one company is sufficient. • Equifax 1-800-525-6285 • Experian 1-888-397-3742 • TransUnion 1-800-680-7289 TCU Information Security Services

  20. Suspect id theft? Follow these steps • CLOSE ACCOUNTS • Call the companies where accounts were opened or changed without your permission. Follow-up in writing. • Go to www.ftc.gov/idtheft for an ID Theft Affidavit. • Verify that disputed accounts have been closed and debts discharged. • Keep copies of all correspondence and notes of calls and conversations. • FILE A POLICE REPORT • File a report with law enforcement officials to help you with creditors who may want proof of the crime. TCU Information Security Services

  21. Suspect id theft? Follow these steps • INFORM THE FEDERAL TRADE COMMISSION • www.ftc.gov/idtheft • 1-877-ID-THEFT • By mail: Identity Theft Clearinghouse, Federal Trade Commission, Washington, DC 20580 TCU Information Security Services

  22. resources • TCU Information Security Services • security.tcu.edu • TCU Computer Help Desk • tr.tcu.edu/help • Federal Trade Commission • www.ftc.gov/idtheft • Credit Report • www.annualcreditreport.com TCU Information Security Services

More Related