Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of IDENTITY THEFT
Business Control Group
70 Million People
40 Million Accounts
Names, Mailing Addresses, Phone Numbers and Email Addresses
76 Million Households
7 Million Small Business
Worst Known Compromise in History
Monitoring and Identity Theft Protection
Unauthorized Charges on Accounts
"Smart" Cards and "Chip and PIN"
Keeping Company Security Secret
What To Do?
Employee Benefit Program
Data Breach Defense
Employee Benefit Programs
*Compare Services and Costs*
What Is Best For You
The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
Traditional Identity Theft
Electronic Identity Theft
Rise of Data Base Storage
Phishing or Pharming
History of Identity Theft
Doing "Gods Work"
$343 million in 2002
$1.5 billion in 2011
How ID Theft Has Changed
Paper Based Checking Account Schemes
Jimmy Baehr, Joey Joyce, Nikki Schmidt, Sakina Roby, Dan Swan
* Computer Security Suite
* Extended Protection
* 2015 Gold Award
1. Review Credit Report
Fair Credit Reporting Act
2. Place Fraud Alert
3. Create Log Folder
4. Close Accounts
5. File Complaint
*The Cost of Protection Always Outweighs the Cost of Fraud*