What will you learn? During this presentation you will learn: • How ID theft and account fraud happen • The effects of ID theft and fraud • How to avoid becoming a victim Identity Protection
Identity Theft is Rampant Number of victims rose by 8% in 2017 to 16.7 million impacted Nearly $17 Billion stolen Theft can go undetected for years Identity Protection
What is ID theft and account fraud? ✓ When someone steals another person ’ s personal information to commit fraud Identity Protection
What is ID theft and account fraud? Theft of Personal Identifying Information (PII) • SSN, Credit Card info, Driver’s License, etc Can happen at many places • Lost/Stolen Wallet, Stolen Mail, Malware/Virus, Email Scams (phishing), 3 rd Party Data Breach Fraud is when the stolen PII is used to create or modify your accounts Identity Protection
Medical ID theft So Identity Protection
Medical ID theft Someone uses your ID to obtain care or drugs or false insurance claims Results in financial costs & potential inaccurate medical records Signs of Medical ID Theft – suspicious bills or denied coverage Keep your Medical Information private and destroy unnecessary documentation Identity Protection
Child ID theft Identity Protection
Child ID theft Especially attractive to the bad guys because it can go undetected for years Keep an eye out for: • Bills or preapproved credit offers • IRS notifications • Tax Return already filed Identity Protection
Theft of a deceased person’ s identity Identity Protection
Theft of a deceased person’ s identity May take a long time for creditor to be notified to close accounts Accounts opened after death is likely ID theft Take the initiative when death of a loved one occurs Identity Protection
How do thieves get your information? Identity Protection
Familiar Fraud Coworker, neighbor or acquaintance Family member Anyone with intimate knowledge of personal information Identity Protection
Skilled Identity Thieves Through a variety of methods • Stolen wallets or cell phones • Stolen mail • Dumpster diving • Pose as landlord, employer with legal rights • Business record theft • Shared information online • Eavesdropping Identity Protection
Data breach Identity Protection
Data breach 3 rd Party breaches occur when: The bad guy hacks a services you use • Capital One, Equifax, Facebook, Instagram, Quest Diagnostics, Sprint & many, many more A dishonest employee sells your private data A company’s laptop is lost or stolen with your personal information on it Identity Protection
The costs of identity theft Identity Protection
The costs of identity theft Time Victims often need to be their own advocate • Obtaining & reviewing credit reports • Disputing activity or charges • Working with creditors • Rebuilding identification paperwork Identity Protection
The costs of identity theft Money Negative impact to credit rating Bank account termination Impact on rental, job or credit applications Fees from attorney or special investigator action Identity Protection
The costs of identity theft Reputation Loss of trust by previously used businesses or services Friends or family members may fall victim to scams based on the victim’s stolen identity Identity Protection
Preventing ID theft Identity Protection
Preventing ID theft Use the internet safely Stay away from malicious websites Ensure any monetary transactions are through a verified service Use caution when using Social Networking (FACEBOOK!!!!) Practice good email habits Identity Protection
Shopping for ID theft services Identity Protection
Shopping for ID theft services ID Monitoring & Alerting • SSN Identity • Criminal Record • Address Changes • Credit Alerting • Dark Web Monitoring • Credit Card Activity • Public Records Identity Protection
Shopping for ID theft services Restorative Services • Theft Insurance • Lost Wallet Recovery Early Detection is Critical • Many identity thefts are out of your control • Learning about a breach early can saves months of work Identity Protection
Protecting our Identity in Christ Titus 2:11-14 For the grace of God has appeared, bringing salvation for all people, training us to renounce ungodliness and worldly passions, and to live self-controlled, upright, and godly lives in the present age, waiting for our blessed hope, the appearing of the glory of our great God and Savior Jesus Christ, who gave himself for us to redeem us from all lawlessness and to purify for himself a people for his own possession who are zealous for good works. ESV Content Filtering
Ease of Access Average Number of Connected Devices per Person 2013 - .08 2010 – 1.84 2015 – 3.47 2020 – estimated 6.58 4.2 Million websites are estimated to be pornographic in nature Pornography accounts for nearly 40% of total content on the internet Content Filtering
Social Media 1.6 Billion social network users worldwide More than 160 million US users access social media at least once per month June 2018 – Instagram reached 1 Billion monthly users 2.1 Million SnapChat photos are created each minute Content Filtering
The Olden Days of Content Filtering Content blocking software – often unwieldy and would slow your computer down Like playing wack-a-mole Technically got the job (sorta) done but good content was often caught in its net Whitelisting and Blacklisting Everyone was on their own Content Filtering
New & Improved Internet Filtering Pairing content filtering with accountability Internet is accessed from many sources – options for all types of devices It’s not just about content anymore • Balancing screen time • Controlling apps & games • Blocking inappropriate material • Monitoring social media Content Filtering
Options to Consider Covenant Eyes - www.covenanteyes.com NetNanny – www.netnanny.com X3 Watch – www.x3watch.com Custudio - www.qustodio.com Each family is unique, find the tool that works for you! Content Filtering
Recommend
More recommend