Date post: | 13-Jul-2015 |
Category: |
Business |
Upload: | jeffavery9 |
View: | 321 times |
Download: | 0 times |
Id Theft (How it Occurs)
• Phishing
• Old Mail
• Dumpster Diving
• Hacking
• Online Transactions
• Lost/Stolen Purse/Wallet
Preventatives
• Credit Protection Service
• Run Credit Annually (all 3 agencies)
• Shred Old Mail
• Keep Mailing Address Up-to-Date
• Never Carry Social Security Card
• Never Give out Personal Information
• Don’t Carry What You Don’t Need
If You Become A Victim
• 175 hours, $800
• Police Report
• Obtain Credit Reports
• FTC Report
• Get Credit Protection Service
• Keep Detailed Notes of Conversations
• Make a list of Names and Numbers
• Copies of Everything
Phishing
• attempting to acquire sensitive information such as usernames, passwords and credit card information through an electronic communication.
Phishing• AOHell (1996)
• Transition to Financial Institutions (2001)
• Social Networking Sites (2006)
• Further Development (Present)
Spear Phishing
Targeted versions of phishing
Phishers are able to determine which banks potential victims use, and target bogus e-mails
accordingly.
WhalingSpear Phishing high profile
targets
Phishing directed specifically at senior level
executives, wealthy individuals
More ResourcesID Theft http://www.ftc.gov
Phishing http://www.antiphishing.org/
http://www.onguardonline.gov/topics/phishing.aspx