what will you learn
play

What will you learn? During this presentation you will learn: How - PowerPoint PPT Presentation

What will you learn? During this presentation you will learn: How ID theft and account fraud happen The effects of ID theft and fraud How to avoid becoming a victim Identity Protection Identity Theft is Rampant Number of victims rose


  1. What will you learn? During this presentation you will learn: • How ID theft and account fraud happen • The effects of ID theft and fraud • How to avoid becoming a victim Identity Protection

  2. Identity Theft is Rampant Number of victims rose by 8% in 2017 to 16.7 million impacted Nearly $17 Billion stolen Theft can go undetected for years Identity Protection

  3. What is ID theft and account fraud? ✓ When someone steals another person ’ s personal information to commit fraud Identity Protection

  4. What is ID theft and account fraud? Theft of Personal Identifying Information (PII) • SSN, Credit Card info, Driver’s License, etc Can happen at many places • Lost/Stolen Wallet, Stolen Mail, Malware/Virus, Email Scams (phishing), 3 rd Party Data Breach Fraud is when the stolen PII is used to create or modify your accounts Identity Protection

  5. Medical ID theft So Identity Protection

  6. Medical ID theft Someone uses your ID to obtain care or drugs or false insurance claims Results in financial costs & potential inaccurate medical records Signs of Medical ID Theft – suspicious bills or denied coverage Keep your Medical Information private and destroy unnecessary documentation Identity Protection

  7. Child ID theft Identity Protection

  8. Child ID theft Especially attractive to the bad guys because it can go undetected for years Keep an eye out for: • Bills or preapproved credit offers • IRS notifications • Tax Return already filed Identity Protection

  9. Theft of a deceased person’ s identity Identity Protection

  10. Theft of a deceased person’ s identity May take a long time for creditor to be notified to close accounts Accounts opened after death is likely ID theft Take the initiative when death of a loved one occurs Identity Protection

  11. How do thieves get your information? Identity Protection

  12. Familiar Fraud Coworker, neighbor or acquaintance Family member Anyone with intimate knowledge of personal information Identity Protection

  13. Skilled Identity Thieves Through a variety of methods • Stolen wallets or cell phones • Stolen mail • Dumpster diving • Pose as landlord, employer with legal rights • Business record theft • Shared information online • Eavesdropping Identity Protection

  14. Data breach Identity Protection

  15. Data breach 3 rd Party breaches occur when: The bad guy hacks a services you use • Capital One, Equifax, Facebook, Instagram, Quest Diagnostics, Sprint & many, many more A dishonest employee sells your private data A company’s laptop is lost or stolen with your personal information on it Identity Protection

  16. The costs of identity theft Identity Protection

  17. The costs of identity theft Time Victims often need to be their own advocate • Obtaining & reviewing credit reports • Disputing activity or charges • Working with creditors • Rebuilding identification paperwork Identity Protection

  18. The costs of identity theft Money Negative impact to credit rating Bank account termination Impact on rental, job or credit applications Fees from attorney or special investigator action Identity Protection

  19. The costs of identity theft Reputation Loss of trust by previously used businesses or services Friends or family members may fall victim to scams based on the victim’s stolen identity Identity Protection

  20. Preventing ID theft Identity Protection

  21. Preventing ID theft Use the internet safely Stay away from malicious websites Ensure any monetary transactions are through a verified service Use caution when using Social Networking (FACEBOOK!!!!) Practice good email habits Identity Protection

  22. Shopping for ID theft services Identity Protection

  23. Shopping for ID theft services ID Monitoring & Alerting • SSN Identity • Criminal Record • Address Changes • Credit Alerting • Dark Web Monitoring • Credit Card Activity • Public Records Identity Protection

  24. Shopping for ID theft services Restorative Services • Theft Insurance • Lost Wallet Recovery Early Detection is Critical • Many identity thefts are out of your control • Learning about a breach early can saves months of work Identity Protection

  25. Protecting our Identity in Christ Titus 2:11-14 For the grace of God has appeared, bringing salvation for all people, training us to renounce ungodliness and worldly passions, and to live self-controlled, upright, and godly lives in the present age, waiting for our blessed hope, the appearing of the glory of our great God and Savior Jesus Christ, who gave himself for us to redeem us from all lawlessness and to purify for himself a people for his own possession who are zealous for good works. ESV Content Filtering

  26. Ease of Access Average Number of Connected Devices per Person 2013 - .08 2010 – 1.84 2015 – 3.47 2020 – estimated 6.58 4.2 Million websites are estimated to be pornographic in nature Pornography accounts for nearly 40% of total content on the internet Content Filtering

  27. Social Media 1.6 Billion social network users worldwide More than 160 million US users access social media at least once per month June 2018 – Instagram reached 1 Billion monthly users 2.1 Million SnapChat photos are created each minute Content Filtering

  28. The Olden Days of Content Filtering Content blocking software – often unwieldy and would slow your computer down Like playing wack-a-mole Technically got the job (sorta) done but good content was often caught in its net Whitelisting and Blacklisting Everyone was on their own Content Filtering

  29. New & Improved Internet Filtering Pairing content filtering with accountability Internet is accessed from many sources – options for all types of devices It’s not just about content anymore • Balancing screen time • Controlling apps & games • Blocking inappropriate material • Monitoring social media Content Filtering

  30. Options to Consider Covenant Eyes - www.covenanteyes.com NetNanny – www.netnanny.com X3 Watch – www.x3watch.com Custudio - www.qustodio.com Each family is unique, find the tool that works for you! Content Filtering

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend