240 likes | 508 Views
Personal Information Security. Created By OIT Information Security Services http://oit.boisestate.edu/security/. Personal Information Security.
E N D
Personal Information Security Created By OIT Information Security Services http://oit.boisestate.edu/security/
Personal Information Security "Identity theft is the fastest growing crime in the United States, and with 70 percent of the American public having had some piece of personal data stolen, we have an epidemic on our hands," said Frank W. Abagnale, world-renowned expert on identity theft and fraud, and subject of Steven Spielberg's movie Catch Me if You Can. "Many of the incidents of identity theft and data loss from individuals and businesses come from the most unexpected places and can be avoided with simple common sense. When you look at the time and financial costs incurred by ignoring these safeguarding behaviours, it is staggering.“
Personal Information Security Personally Identifiable Information • What is it? Identity Theft • How to do it! You and Your Family • How to protect your information
Personally Identifiable Information Financial Records • Tax Forms • Credit Card Bills • Bank Statements • Investment Information • Insurance Records Health Care Records • Visit Forms • Bills • Doctor’s Letters • Insurance Records
Identity Theft • PII Lost ! • Identity Loss • Identity Theft
PII Found!—Living the High Life • “A weekend search of the couple's $3,000-a-month apartment turned up a cache of tech toys: four computers, two printers, a scanner and an industrial machine that makes ID cards. Police also found $17,500 in cash, dozens of credit cards and fake drivers' licenses, and keys to unlock many of the apartments and mailboxes in their upscale Rittenhouse Square apartment building. Police are not yet sure how they got the keys.” • http://www.nbcnews.com/id/22097329#.UfrDEJK1Ful
Identity Theft—How It’s Done • No Tech • Social Engineering • Cyber Theft • Low Tech >> High Tech
Identity Theft—Social Engineering • Just Ask! • Trolling Hallways • Shoulder Surfing • Dumpster diving • Voice Phishing (Vishing)
Identity Theft—Cyber Attacks • Phishing Email • Spyware • Viruses • Social Networking
10 Steps to Protect Your Information • The next time you order checks, have only your initials (instead of first name) and last name put on them. • Don't list any telephone number on your checks. • When you are writing checks to pay on your credit card accounts, DO NOT put the complete account number on the "For" line.
10 Steps to Protect Your Information • Do not sign the back of your credit cards. Instead put "PHOTO ID REQUIRED". • Place the contents of your wallet on a photocopy machine. Copy both sides of each license, credit card, etc. • Only deal with reputable on-line companies that you know and trust. At the very least be sure the company has a physical address and phone number.
10 Steps to Protect Your Information • Shred unsolicited credit card offers. • If you access the Internet from a shared computer—at the library, SUB, Internet cafe, etc.--make sure you don't leave anything behind. • If you think you are a victim of Identity theft, report it immediately. • Avoid using your social security number whenever you can.
Steps to Protect Your Cyber Information • Know who you're dealing with online • Use anti-virus software, a firewall, and anti-spyware software • Update your operating system and web browser
Steps to Protect Your Cyber Information • Keep your passwords secret • Backup important files • Know who to call
Protect Your Family • Keep your computer in a central and open location • Set guidelines/rules for computer use • Use the Internet with your children • Consider monitoring software
Protect Your Family • Consider setting parental controls within your browser • Teach your children never to give out personal information • Know who to contact if you believe your child is in danger
Personal Information Security Pop Quiz ! • Identity Theft