Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

IDENTITY THEFT

No description
by

Sakina Roby

on 31 March 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of IDENTITY THEFT

What is Identity Theft?
Corporate Victims
Changes Made
Changes Made
Law Enforcement
Disabled Accounts
Business Control Group
Fortified Defenses
Change Passwords
Identity Theft
Target
2014
70 Million People
40 Million Accounts
Names, Mailing Addresses, Phone Numbers and Email Addresses

JP Morgan
2014
76 Million Households
7 Million Small Business
Worst Known Compromise in History

Monitoring and Identity Theft Protection
Unauthorized Charges on Accounts
"Smart" Cards and "Chip and PIN"
Keeping Company Security Secret
What To Do?
Prevention
Personal Steps
Company Measures
LifeLock
Identity Guard
TrustedID
Monitoring
Scanning
Restoring
Guaranteeing
Tracking

Monitor
Protect
Recover
Employee Benefit Program
Data Breach Defense
Family Plan
Individual Plan
Personal Steps
Trash
Checks
Passwords
Memorization
Phone
Credit
Company Measures
Educate Employees
Internal Audit
Website Protection
Employee Benefit Programs
*Compare Services and Costs*
What Is Best For You
The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
Traditional Identity Theft
"Low-Tech"
Dumpster Diving
Family Members
Direct Solicitation
Electronic Identity Theft
Rise of Data Base Storage
Phishing or Pharming
Spyware
Skimming
History of Identity Theft
Natural Disasters
Internet
Mortgage Brokers
Doing "Gods Work"
$343 million in 2002
$1.5 billion in 2011
How ID Theft Has Changed
Paper Based Checking Account Schemes
Electronic
Fraud
Jimmy Baehr, Joey Joyce, Nikki Schmidt, Sakina Roby, Dan Swan
* Computer Security Suite
* Extended Protection
* 2015 Gold Award
Winner
5 Steps
1. Review Credit Report


Fair Credit Reporting Act


Fix Error
2. Place Fraud Alert

TransUnion

Equifax

Experian
3. Create Log Folder

4. Close Accounts
5. File Complaint

FTC

Police
*The Cost of Protection Always Outweighs the Cost of Fraud*
Full transcript