What will you learn? During this presentation you will learn: How - - PowerPoint PPT Presentation

what will you learn
SMART_READER_LITE
LIVE PREVIEW

What will you learn? During this presentation you will learn: How - - PowerPoint PPT Presentation

What will you learn? During this presentation you will learn: How ID theft and account fraud happen The effects of ID theft and fraud How to avoid becoming a victim Identity Protection Identity Theft is Rampant Number of victims rose


slide-1
SLIDE 1

Identity Protection

What will you learn?

During this presentation you will learn:

  • How ID theft and account fraud happen
  • The effects of ID theft and fraud
  • How to avoid becoming a victim
slide-2
SLIDE 2

Identity Protection

Number of victims rose by 8% in 2017 to 16.7 million impacted Nearly $17 Billion stolen Theft can go undetected for years

Identity Theft is Rampant

slide-3
SLIDE 3

Identity Protection

What is ID theft and account fraud? ✓ When someone steals another person’s personal information to commit fraud

slide-4
SLIDE 4

Identity Protection

Theft of Personal Identifying Information (PII)

  • SSN, Credit Card info, Driver’s License, etc

Can happen at many places

  • Lost/Stolen Wallet, Stolen Mail, Malware/Virus,

Email Scams (phishing), 3rd Party Data Breach

Fraud is when the stolen PII is used to create or modify your accounts

What is ID theft and account fraud?

slide-5
SLIDE 5

So

Identity Protection

Medical ID theft

slide-6
SLIDE 6

Identity Protection

Someone uses your ID to obtain care or drugs or false insurance claims Results in financial costs & potential inaccurate medical records Signs of Medical ID Theft – suspicious bills or denied coverage Keep your Medical Information private and destroy unnecessary documentation

Medical ID theft

slide-7
SLIDE 7

Identity Protection

Child ID theft

slide-8
SLIDE 8

Identity Protection

Especially attractive to the bad guys because it can go undetected for years Keep an eye out for:

  • Bills or preapproved credit offers
  • IRS notifications
  • Tax Return already filed

Child ID theft

slide-9
SLIDE 9

Identity Protection

Theft of a deceased person’s identity

slide-10
SLIDE 10

Identity Protection

May take a long time for creditor to be notified to close accounts Accounts opened after death is likely ID theft Take the initiative when death of a loved one

  • ccurs

Theft of a deceased person’s identity

slide-11
SLIDE 11

Identity Protection

How do thieves get your information?

slide-12
SLIDE 12

Identity Protection

Coworker, neighbor or acquaintance Family member Anyone with intimate knowledge of personal information

Familiar Fraud

slide-13
SLIDE 13

Identity Protection

Through a variety of methods

  • Stolen wallets or cell phones
  • Stolen mail
  • Dumpster diving
  • Pose as landlord, employer with legal rights
  • Business record theft
  • Shared information online
  • Eavesdropping

Skilled Identity Thieves

slide-14
SLIDE 14

Identity Protection

Data breach

slide-15
SLIDE 15

Identity Protection

3rd Party breaches occur when:

The bad guy hacks a services you use

  • Capital One, Equifax, Facebook, Instagram, Quest

Diagnostics, Sprint & many, many more A dishonest employee sells your private data A company’s laptop is lost or stolen with your personal information on it

Data breach

slide-16
SLIDE 16

Identity Protection

The costs of identity theft

slide-17
SLIDE 17

Identity Protection

Time

Victims often need to be their own advocate

  • Obtaining & reviewing credit reports
  • Disputing activity or charges
  • Working with creditors
  • Rebuilding identification paperwork

The costs of identity theft

slide-18
SLIDE 18

Identity Protection

Money

Negative impact to credit rating Bank account termination Impact on rental, job or credit applications Fees from attorney or special investigator action

The costs of identity theft

slide-19
SLIDE 19

Identity Protection

Reputation

Loss of trust by previously used businesses or services Friends or family members may fall victim to scams based on the victim’s stolen identity

The costs of identity theft

slide-20
SLIDE 20

Identity Protection

Preventing ID theft

slide-21
SLIDE 21

Identity Protection

Use the internet safely

Stay away from malicious websites Ensure any monetary transactions are through a verified service Use caution when using Social Networking (FACEBOOK!!!!) Practice good email habits

Preventing ID theft

slide-22
SLIDE 22

Identity Protection

Shopping for ID theft services

slide-23
SLIDE 23

Identity Protection

ID Monitoring & Alerting

  • SSN Identity
  • Criminal Record
  • Address Changes
  • Credit Alerting
  • Dark Web Monitoring
  • Credit Card Activity
  • Public Records

Shopping for ID theft services

slide-24
SLIDE 24

Identity Protection

Restorative Services

  • Theft Insurance
  • Lost Wallet Recovery

Early Detection is Critical

  • Many identity thefts are out of your control
  • Learning about a breach early can saves months of

work

Shopping for ID theft services

slide-25
SLIDE 25

Content Filtering

Titus 2:11-14 For the grace of God has appeared, bringing salvation for all people, training us to renounce ungodliness and worldly passions, and to live self-controlled, upright, and godly lives in the present age, waiting for our blessed hope, the appearing of the glory of our great God and Savior Jesus Christ, who gave himself for us to redeem us from all lawlessness and to purify for himself a people for his own possession who are zealous for good works.

ESV

Protecting our Identity in Christ

slide-26
SLIDE 26

Content Filtering

Average Number of Connected Devices per Person 2013 - .08 2010 – 1.84 2015 – 3.47 2020 – estimated 6.58 4.2 Million websites are estimated to be pornographic in nature Pornography accounts for nearly 40% of total content

  • n the internet

Ease of Access

slide-27
SLIDE 27

Content Filtering

1.6 Billion social network users worldwide More than 160 million US users access social media at least once per month June 2018 – Instagram reached 1 Billion monthly users 2.1 Million SnapChat photos are created each minute

Social Media

slide-28
SLIDE 28

Content Filtering

Content blocking software – often unwieldy and would slow your computer down Like playing wack-a-mole Technically got the job (sorta) done but good content was often caught in its net Whitelisting and Blacklisting Everyone was on their own

The Olden Days of Content Filtering

slide-29
SLIDE 29

Content Filtering

Pairing content filtering with accountability Internet is accessed from many sources – options for all types of devices It’s not just about content anymore

  • Balancing screen time
  • Controlling apps & games
  • Blocking inappropriate material
  • Monitoring social media

New & Improved Internet Filtering

slide-30
SLIDE 30

Content Filtering

Covenant Eyes - www.covenanteyes.com NetNanny – www.netnanny.com X3 Watch – www.x3watch.com Custudio - www.qustodio.com Each family is unique, find the tool that works for you!

Options to Consider