SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Network Integration  *  Security Consultation   *  DR/BC Planning I AM NOT A TARGET:   How to protect yourself from identity theft.
Identity Theft Leverage your people with technology What is identity theft? Basically, using your personal information without your knowledge or permission.  Usually name, SS#, credit card.  More than technology methods. In 1998, it became a Federal Crime. Why me? Wildebeest…
Numbers Leverage your people with technology A U.S. Citizen has about a 4% chance of being a victim of identity theft. 85 million consumers alerted in the past 15 months. Total one year fraud estimates were at $56.6 billion in 2006. Gas well drillers using more than 2,000 gallons per month of city water will be charged a higher rate.
Action Plan (3 Ds) Leverage your people with technology Deter-  protect your information Defend-  act as soon as you suspect, document Detect-  monitor your statements and audit credit report
Deter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Leverage your people with technology
Detect ,[object Object],[object Object],[object Object],[object Object],[object Object],Leverage your people with technology
Defend ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Leverage your people with technology
Summary  Leverage your people with technology Identity Theft- Bad Losing Money- Bad Not living in Dallas- Priceless Be proactive in protecting your assets. Research References http://www.idtheftcenter.org/index.shtml http://www.consumer.gov/idtheft/ http://www.privacyrights.org/itrc-quiz1.htm http://www.annualcreditreport.com Fort Worth Star Telegram- (articles last Sat and Sun)
About The Fulcrum Group  Leverage your people with technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions Leverage your people with technology The Fulcrum Group, Inc. · 715 Katy Road, Suite 208A, Keller, TX 76248 ?

Weitere ähnliche Inhalte

Was ist angesagt?

Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentation
misecho
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
misecho
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Blake A. Klinkner
 
A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers
806670
 

Was ist angesagt? (20)

Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentation
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 
Internet privacy
Internet privacyInternet privacy
Internet privacy
 
Equifax data breach
Equifax data breachEquifax data breach
Equifax data breach
 
Preventing Corporate and Governmental Fraud
Preventing Corporate and Governmental FraudPreventing Corporate and Governmental Fraud
Preventing Corporate and Governmental Fraud
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
The digital forensic examinations and criminal investigations
The digital forensic examinations and criminal investigationsThe digital forensic examinations and criminal investigations
The digital forensic examinations and criminal investigations
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
Cyber Crime-The New War of the 21st Century
Cyber Crime-The New War of the 21st CenturyCyber Crime-The New War of the 21st Century
Cyber Crime-The New War of the 21st Century
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Cyber Threats and Insurance
Cyber Threats and InsuranceCyber Threats and Insurance
Cyber Threats and Insurance
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers
 
Identity theft
Identity theftIdentity theft
Identity theft
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target Breach
 

Andere mochten auch

Ретро лампы 2
Ретро лампы 2Ретро лампы 2
Ретро лампы 2
Skomr
 
Labor Law Made Easy In-House Seminar Outline ver6
Labor Law Made Easy In-House Seminar Outline ver6Labor Law Made Easy In-House Seminar Outline ver6
Labor Law Made Easy In-House Seminar Outline ver6
PoL Sangalang
 
Redbrick Offices_Akshay
Redbrick Offices_AkshayRedbrick Offices_Akshay
Redbrick Offices_Akshay
Akshay Keer
 

Andere mochten auch (16)

دو راهیِ فرهنگ در جامعه
دو راهیِ فرهنگ در جامعهدو راهیِ فرهنگ در جامعه
دو راهیِ فرهنگ در جامعه
 
Woven and nonwoven interlining catalog6
Woven and nonwoven interlining catalog6Woven and nonwoven interlining catalog6
Woven and nonwoven interlining catalog6
 
Автоматизированное хранение медикаментов
Автоматизированное хранение медикаментовАвтоматизированное хранение медикаментов
Автоматизированное хранение медикаментов
 
Kardex Remstar Horizontal
Kardex Remstar HorizontalKardex Remstar Horizontal
Kardex Remstar Horizontal
 
Ретро лампы 2
Ретро лампы 2Ретро лампы 2
Ретро лампы 2
 
Clase filtros
Clase filtrosClase filtros
Clase filtros
 
Creating content for social media
Creating content for social mediaCreating content for social media
Creating content for social media
 
Labor Law Made Easy In-House Seminar Outline ver6
Labor Law Made Easy In-House Seminar Outline ver6Labor Law Made Easy In-House Seminar Outline ver6
Labor Law Made Easy In-House Seminar Outline ver6
 
Хранение медицинских карточек в больнице
Хранение медицинских карточек в больницеХранение медицинских карточек в больнице
Хранение медицинских карточек в больнице
 
Kardex Remstar Megamat RS
Kardex Remstar Megamat RSKardex Remstar Megamat RS
Kardex Remstar Megamat RS
 
Digital strategy
Digital strategyDigital strategy
Digital strategy
 
2ª edição do «Dia do Software Livre na Escola».
2ª edição do «Dia do Software Livre na Escola».2ª edição do «Dia do Software Livre na Escola».
2ª edição do «Dia do Software Livre na Escola».
 
Propuesta del proyecto
Propuesta del proyectoPropuesta del proyecto
Propuesta del proyecto
 
Redbrick Offices_Akshay
Redbrick Offices_AkshayRedbrick Offices_Akshay
Redbrick Offices_Akshay
 
COPE Drive Systems for LOESCHE VRM - More Availability @ Lower TCO
COPE Drive Systems for LOESCHE VRM - More Availability @ Lower TCOCOPE Drive Systems for LOESCHE VRM - More Availability @ Lower TCO
COPE Drive Systems for LOESCHE VRM - More Availability @ Lower TCO
 
Aktiviti latihan untuk lari pecut
Aktiviti latihan untuk lari pecutAktiviti latihan untuk lari pecut
Aktiviti latihan untuk lari pecut
 

Ähnlich wie Fulcrum Rotary Club- Identity Theft

Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
mherr_riskconsult
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.Pdf
Sanea
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
efandeye
 

Ähnlich wie Fulcrum Rotary Club- Identity Theft (20)

ID Theft
ID TheftID Theft
ID Theft
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
Identity Theft Scams
Identity Theft ScamsIdentity Theft Scams
Identity Theft Scams
 
How To Protect Yourself From Identity Theft
How To Protect Yourself From Identity TheftHow To Protect Yourself From Identity Theft
How To Protect Yourself From Identity Theft
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.Pdf
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
HealthCo Accelerate 2016 speaker deck #2
HealthCo Accelerate 2016 speaker deck #2HealthCo Accelerate 2016 speaker deck #2
HealthCo Accelerate 2016 speaker deck #2
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
Guarding Vanderbilt information
Guarding Vanderbilt informationGuarding Vanderbilt information
Guarding Vanderbilt information
 
Protecting Vanderbilt Information
Protecting Vanderbilt InformationProtecting Vanderbilt Information
Protecting Vanderbilt Information
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 

Fulcrum Rotary Club- Identity Theft

  • 1. Network Integration * Security Consultation * DR/BC Planning I AM NOT A TARGET: How to protect yourself from identity theft.
  • 2. Identity Theft Leverage your people with technology What is identity theft? Basically, using your personal information without your knowledge or permission. Usually name, SS#, credit card. More than technology methods. In 1998, it became a Federal Crime. Why me? Wildebeest…
  • 3. Numbers Leverage your people with technology A U.S. Citizen has about a 4% chance of being a victim of identity theft. 85 million consumers alerted in the past 15 months. Total one year fraud estimates were at $56.6 billion in 2006. Gas well drillers using more than 2,000 gallons per month of city water will be charged a higher rate.
  • 4. Action Plan (3 Ds) Leverage your people with technology Deter- protect your information Defend- act as soon as you suspect, document Detect- monitor your statements and audit credit report
  • 5.
  • 6.
  • 7.
  • 8. Summary Leverage your people with technology Identity Theft- Bad Losing Money- Bad Not living in Dallas- Priceless Be proactive in protecting your assets. Research References http://www.idtheftcenter.org/index.shtml http://www.consumer.gov/idtheft/ http://www.privacyrights.org/itrc-quiz1.htm http://www.annualcreditreport.com Fort Worth Star Telegram- (articles last Sat and Sun)
  • 9.
  • 10. Questions Leverage your people with technology The Fulcrum Group, Inc. · 715 Katy Road, Suite 208A, Keller, TX 76248 ?