Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Identity Theft

No description
by

Mairead Scanlon

on 22 March 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Identity Theft

IDENTITY THEFT PROTECTION
Identity theft is the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
WHAT IS IDENTITY THEFT?
METHODS OF IDENTITY THEFT

For the Chamber of Commerce
IDENTITY THEFT PROTECTION
FIREWALL AND ANTI-VIRUS PROTECTION PROGRAMS
THE IMPACT OF IDENTITY THEFT
¨To help with our phishing and pharming issues, corporate lent two of their top security experts to us for this month.¨
FOLLOW FILING PROCEDURES AND DATA SHARING POLICIES
PROTECT PINS AND PASSWORDS
KEEP RECORDS OF ALL BUSINESS- BASED TRANSACTIONS
DESTROY ANY RECORDS NO LONGER NECESSARY
ENCRYPTION
Credit reports and Records
Registrations and Filings
Social Media
Shoulder Surfing
Pharming
Phishing
Encoding information that only authorized parties can access
Message verification
Secured wireless internet
Use management tools
Rotation
Hypertext Transfer Protocol Secure (HTTPS) logins
WHY IS THE CHAMBER OF COMMERCE VULNERABLE?
IDENTITY THEFT TODAY
Fastest growing crime in America
15 million victims each year


More information in one location
Just as easy to manipulate as individual identity
McAfee
Norton
Anti-Virus Guard (AVG)
Mac Anti-Virus Software
Do not rely on free software programs
Micro Cutting
Utilize a safe
Once a record is online, it is extremely difficult to delete
Follow S.C.A.M....
S= Stingy C=Check A=Ask M= Maintain
... For Protection
Identity Theft Complaint Data
File annual reports in a timely manner
Enroll in email alerts
Regularly review filings
Identity Theft Complaint Data
Maintain an inventory of accounts and contact information
Review and reconcile account statements
Make customers aware of third party figures
Full transcript