1 / 17

Personal Information Security

Personal Information Security. Created By OIT Information Security Services http://oit.boisestate.edu/security/. Personal Information Security.

moana
Download Presentation

Personal Information Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Personal Information Security Created By OIT Information Security Services http://oit.boisestate.edu/security/

  2. Personal Information Security "Identity theft is the fastest growing crime in the United States, and with 70 percent of the American public having had some piece of personal data stolen, we have an epidemic on our hands," said Frank W. Abagnale, world-renowned expert on identity theft and fraud, and subject of Steven Spielberg's movie Catch Me if You Can. "Many of the incidents of identity theft and data loss from individuals and businesses come from the most unexpected places and can be avoided with simple common sense. When you look at the time and financial costs incurred by ignoring these safeguarding behaviours, it is staggering.“

  3. Personal Information Security Personally Identifiable Information • What is it? Identity Theft • How to do it! You and Your Family • How to protect your information

  4. Personally Identifiable Information Financial Records • Tax Forms • Credit Card Bills • Bank Statements • Investment Information • Insurance Records Health Care Records • Visit Forms • Bills • Doctor’s Letters • Insurance Records

  5. Identity Theft • PII Lost ! • Identity Loss • Identity Theft

  6. PII Found!—Living the High Life • “A weekend search of the couple's $3,000-a-month apartment turned up a cache of tech toys: four computers, two printers, a scanner and an industrial machine that makes ID cards. Police also found $17,500 in cash, dozens of credit cards and fake drivers' licenses, and keys to unlock many of the apartments and mailboxes in their upscale Rittenhouse Square apartment building. Police are not yet sure how they got the keys.” • http://www.nbcnews.com/id/22097329#.UfrDEJK1Ful

  7. Identity Theft—How It’s Done • No Tech • Social Engineering • Cyber Theft • Low Tech >> High Tech

  8. Identity Theft—Social Engineering • Just Ask! • Trolling Hallways • Shoulder Surfing • Dumpster diving • Voice Phishing (Vishing)

  9. Identity Theft—Cyber Attacks • Phishing Email • Spyware • Viruses • Social Networking

  10. 10 Steps to Protect Your Information • The next time you order checks, have only your initials (instead of first name) and last name put on them. • Don't list any telephone number on your checks. • When you are writing checks to pay on your credit card accounts, DO NOT put the complete account number on the "For" line.

  11. 10 Steps to Protect Your Information • Do not sign the back of your credit cards. Instead put "PHOTO ID REQUIRED". • Place the contents of your wallet on a photocopy machine. Copy both sides of each license, credit card, etc. • Only deal with reputable on-line companies that you know and trust. At the very least be sure the company has a physical address and phone number.

  12. 10 Steps to Protect Your Information • Shred unsolicited credit card offers. • If you access the Internet from a shared computer—at the library, SUB, Internet cafe, etc.--make sure you don't leave anything behind. • If you think you are a victim of Identity theft, report it immediately. • Avoid using your social security number whenever you can.

  13. Steps to Protect Your Cyber Information • Know who you're dealing with online • Use anti-virus software, a firewall, and anti-spyware software • Update your operating system and web browser

  14. Steps to Protect Your Cyber Information • Keep your passwords secret • Backup important files • Know who to call

  15. Protect Your Family • Keep your computer in a central and open location • Set guidelines/rules for computer use • Use the Internet with your children • Consider monitoring software

  16. Protect Your Family • Consider setting parental controls within your browser • Teach your children never to give out personal information • Know who to contact if you believe your child is in danger

  17. Personal Information Security Pop Quiz ! • Identity Theft

More Related