Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
Identity Protection
What will you learn?
During this presentation you will learn:
• How ID theft and account fraud happen
• The effects of ID theft and fraud
• How to avoid becoming a victim
Identity Protection
Number of victims rose by 8% in 2017 to 16.7 million impacted
Nearly $17 Billion stolen
Theft can go undetected for years
Identity Theft is Rampant
Identity Protection
What is ID theft and account fraud?
✓When someone steals another person’s personal information to commit fraud
Identity Protection
Theft of Personal Identifying Information (PII)
• SSN, Credit Card info, Driver’s License, etc
Can happen at many places
• Lost/Stolen Wallet, Stolen Mail, Malware/Virus, Email Scams (phishing), 3rd Party Data Breach
Fraud is when the stolen PII is used to create or modify your accounts
What is ID theft and account fraud?
So
Identity Protection
Medical ID theft
Identity Protection
Someone uses your ID to obtain care or drugs or false insurance claims
Results in financial costs & potential inaccurate medical records
Signs of Medical ID Theft – suspicious bills or denied coverage
Keep your Medical Information private and destroy unnecessary documentation
Medical ID theft
Identity Protection
Child ID theft
Identity Protection
Especially attractive to the bad guys because it can go undetected for years
Keep an eye out for:
• Bills or preapproved credit offers
• IRS notifications
• Tax Return already filed
Child ID theft
Identity Protection
Theft of a deceased person’s identity
Identity Protection
May take a long time for creditor to be notified to close accounts
Accounts opened after death is likely ID theft
Take the initiative when death of a loved one occurs
Theft of a deceased person’s identity
Identity Protection
How do thieves get your information?
Identity Protection
Coworker, neighbor or acquaintance
Family member
Anyone with intimate knowledge of personal information
Familiar Fraud
Identity Protection
Through a variety of methods
• Stolen wallets or cell phones
• Stolen mail
• Dumpster diving
• Pose as landlord, employer with legal rights
• Business record theft
• Shared information online
• Eavesdropping
Skilled Identity Thieves
Identity Protection
Data breach
Identity Protection
3rd Party breaches occur when:
The bad guy hacks a services you use
• Capital One, Equifax, Facebook, Instagram, Quest
Diagnostics, Sprint & many, many more
A dishonest employee sells your private data
A company’s laptop is lost or stolen with your personal information on it
Data breach
Identity Protection
The costs of identity theft
Identity Protection
Time
Victims often need to be their own advocate
• Obtaining & reviewing credit reports
• Disputing activity or charges
• Working with creditors
• Rebuilding identification paperwork
The costs of identity theft
Identity Protection
Money
Negative impact to credit rating
Bank account termination
Impact on rental, job or credit applications
Fees from attorney or special investigator action
The costs of identity theft
Identity Protection
Reputation
Loss of trust by previously used businesses or services
Friends or family members may fall victim to scams based on the victim’s stolen identity
The costs of identity theft
Identity Protection
Preventing ID theft
Identity Protection
Use the internet safely
Stay away from malicious websites
Ensure any monetary transactions are through a verified service
Use caution when using Social Networking (FACEBOOK!!!!)
Practice good email habits
Preventing ID theft
Identity Protection
Shopping for ID theft services
Identity Protection
ID Monitoring & Alerting
• SSN Identity
• Criminal Record
• Address Changes
• Credit Alerting
• Dark Web Monitoring
• Credit Card Activity
• Public Records
Shopping for ID theft services
Identity Protection
Restorative Services
• Theft Insurance
• Lost Wallet Recovery
Early Detection is Critical
• Many identity thefts are out of your control
• Learning about a breach early can saves months of work
Shopping for ID theft services
Content Filtering
Titus 2:11-14
For the grace of God has appeared, bringing salvation for all people, training us to renounce ungodliness and worldly passions, and to live self-controlled, upright,
and godly lives in the present age, waiting for our blessed hope, the appearing of the glory of our great
God and Savior Jesus Christ, who gave himself for us to redeem us from all lawlessness and to purify for himself a people for his own possession who are
zealous for good works.ESV
Protecting our Identity in Christ
Content Filtering
Average Number of Connected Devices per Person2013 - .082010 – 1.842015 – 3.472020 – estimated 6.58
4.2 Million websites are estimated to be pornographic in nature
Pornography accounts for nearly 40% of total content on the internet
Ease of Access
Content Filtering
1.6 Billion social network users worldwide
More than 160 million US users access social media at least once per month
June 2018 – Instagram reached 1 Billion monthly users
2.1 Million SnapChat photos are created each minute
Social Media
Content Filtering
Content blocking software – often unwieldy and would slow your computer down
Like playing wack-a-mole
Technically got the job (sorta) done but good content was often caught in its net
Whitelisting and Blacklisting
Everyone was on their own
The Olden Days of Content Filtering
Content Filtering
Pairing content filtering with accountability
Internet is accessed from many sources – options for all types of devices
It’s not just about content anymore• Balancing screen time• Controlling apps & games• Blocking inappropriate material• Monitoring social media
New & Improved Internet Filtering
Content Filtering
Covenant Eyes - www.covenanteyes.com
NetNanny – www.netnanny.com
X3 Watch – www.x3watch.com
Custudio - www.qustodio.com
Each family is unique, find the tool that works for you!
Options to Consider