SlideShare a Scribd company logo
1 of 44
Identity Theft
Protecting Your Personal Data
Eastham Public Library
March 2018
“Identity Theft Is Becoming the Third Certainty in Life.
It’s Prevalent, It’s Getting Worse.”
Adam K. Levin
Former Director, New Jersey Office of Consumer Affairs
At Some Point In Our Lives
Most Of Us Will Experience It To Some Degree.
WHAT MAKES UP YOUR IDENTITY?
IT’S YOUR PERSONALLY IDENTIFYING INFORMATION
• Name, Address
• Date of Birth
• Email Address
• Passport Number
• Biometrics
• Facial Recognition, Fingerprints, Retina Scanning, Voice
Recognition
• SOCIAL SECURITY NUMBER
Think For A Moment About All The Places This PDI May Be Stored!
There Are Many Things We Can Do To Protect Ourselves.
Some Are Easy, Others Are More Complicated.
We Should Do The Easy Things Diligently.
We Should Consider Which of the Complicated Things
Are Necessary For Our Lifestyle.
We Should Each Have In Place
A System of Data Protection
That Fits Our Lifestyle.
BOTH OFFLINE AND ONLINE ACTIONS CAN RESULT IN IDENTITY
THEFT OR DIRECT THEFT OF YOUR MONEY
DETECTIVE SERGEANT ADAM BOHANNON WILL FOCUS ON SCAMS THAT
ATTEMPT TO STEAL FROM YOU DIRECTLY ON APRIL 10
THIS PRESENTATION WILL FOCUS ON ONLINE
CAPTURE AND USE AND OF YOUR PERSONAL DATA
WHICH CAN LEAD TO ANNOYANCE AND
THEFT OF YOUR IDENTITY
WHAT WE’RE GOING TO DISCUSS TODAY
• Protecting Your Data From Tracking, Abuse and Theft
• Techniques And Tools For Protection In A Connected World
• A Few ‘Roberts Rules’ For Protecting Yourself, Your Devices
The Word ‘Online’ Chosen To Include
Internet, Mobile And Other Connected Devices
All Of This Applies to Both Internet And Mobile
• Most Of Your Account Settings Carry Over To Mobile
• Mobile Less Likely To Have Viruses and Malware
• Sadly, That Is Beginning To Change
WARNING SIGNS OF A VIRUS ON A MOBILE DEVICE
• Unwarranted Increase In Data Use
• Apps Crashing
• Pop-Up Ads Appearing Frequently
• App You Are Not Aware of Downloading (Don’t Open!)
• Significant Drop in Battery Life
You May Have To Format Your Phone
Ask Your Mobile Provider For Help!
!! MOST IMPORTANT-KEEP SETTINGS UPDATED !!
ALSO
• Turn On 2-Factor Authentication
• Enable Passcode In Case Phone
Lost Or Stolen (Each Sign-in)
• Both Protect Your Phone Number
• Don’t Download Unknown Apps
• Don’t Click On Unknown Links
PROTECTING THE DATA THAT’S ALREADY OUT THERE
Businesses
Health Care Providers, Financial Services Firms
Government
Educational Institutions
Charitable Organizations
According to Privacy Rights Clearinghouse
10,062,681,966 Accounts were Compromised in 2017
2017
• Equifax
• Recent info says tax and driver’s
license numbers as well as email
• Verizon
• Columbia Falls, Montana
• Indiana Medicaid, PA Women’s
Health Center, Washington St. U
Prior
• Yahoo (2013; Revealed 2016)
• Uber (2016)
• eBay (2014)
• Target (2013)
READ PRIVACY POLICIES
• On Websites
• When Mailed
• Financial Services, Health Care
• Pay Attention to Privacy Notices
If You Set Up Accounts--
With Retailers for Example—
Don’t Save Your Credit Card Number.
PREVENTING ADVERTISERS AND OTHERS
FROM TRACKING YOU
HOW IMPORTANT TO PREVENT EMAIL TRACKING?
• DO Protect Your Email Account
• 2 Step Verification (Every Sign In)
• 2 Factor Authentication
(When Account Changes Made)
• Should You Protect Your Email Content?
• Never Send Sensitive Information By Email
• Account Numbers, Passwords, etc.
• Then Don’t Worry About Encryption
PROTECTING YOURSELF WHILE BROWSING THE WEB
• There Are A Number Of Browser Extensions That Block Ads
• Some Are Open Source And Free
• All Work Differently/Work On Various Browsers
• Google Chrome Has A New Blocker
• Adblock Plus, Disconnect, Ublock Origin, Ghostery
• Protecting Against ISP Selling Web Use Data—Explained On
Privacy Policy
• HTTPS Everywhere
• Use a VPN
• Adjust DNS—Fairly Technical
• Will ISP Block Your Service If You Use Any Of These?
PROTECTING YOURSELF FROM UNWANTED PHONE CALLS
NOT ONLY ANNOYING, THEY ARE OFTEN SCAMMING
• Stopping Robo Calls on Your Land Line
• Sign Up For The Do Not Call Registry (FCC)
• Nomorobo
• Stopping Robo Calls on Your Smart Phone
• Most Carriers Offer An App To Block Robo Calls
PROTECTING YOUR DATA ON THE WEB
A Virtual Public Network Is A Secure Private Network Built
On Public Infrastructure (The Web).
It Encrypts The Data Traveling Over The Network
And Adds Other Security Measures.
Use A Highly Rated One.
Most Have Free Trials, Even Free Plans, For Low Volume
Users.
ROBERTS’ RULES FOR FINDING A GOOD VPN—
OR ANY OTHER INTERNET TOOL
• Search “The Best”
• Consider Adding The Current Year To Your Search Term
• Read The Reviews
• In 2018 Don’t Consider Reviews Written Before 2017
• Choose The Tool That Best Meets Your Needs And Lifestyle
• Download The Tool
• Follow Instructions
• Carefully Examine The Settings
https://youtu.be/iynVbynSwOg
There Is Also The Tor Browser
It Uses Technology
That Significantly Slows Your Browsing
PREVENTING THEFT OF YOUR DATA
THE IMPORTANCE OF STRONG PASSWORDS
CANNOT BE OVERSTATED
• Never Reuse Passwords
• Passwords Should Be Long, Strong and Complex
• Don’t Use Obvious Terms—Address, Birthday, Children, Pets, etc.
• Be Careful Where You Store Them
• Use Multi-Factor Authentication Whenever Possible
TOO MUCH TROUBLE, RIGHT???
THERE IS AN ANSWER—
AN EFFECTIVE PASSWORD MANAGER!
A PASSWORD MANAGER HAS SEVERAL FUNCTIONS
• Secure Way To Keep Track Of All Your Passwords
• Can Build Strong Passwords For All Your Accounts
• Can Automatically Sign You Into Many Accounts
• Can Store Credit Card Info, Making Purchasing Online (Too?) Easy
• 1Password Can Now Determine If Your Password Has Been pwned (defeated)
• Again, Choose Carefully (Roberts’ Rules)
SECURITY PROGRAM ESSENTIAL
• Virus Protection
• Firewall
• Other Features
• Parental Controls; Gaming Protection; Protect Email Against
Spam, Spyware, Phishing
• Most ISPs Offer Free Security Program
• If You Choose Your Own, Use A Paid Program
MOST DATA THEFT IS RESULT OF SOME TYPE OF MALWARE
• “All The Bad Stuff”
• Viruses And More
• Good Security Program Will Get Most
• A Good Anti-Malware Package Will Catch A Few More
• There Are Free Versions
FOR SERIOUS PROBLEMS, HAVE YOUR COMPUTER PROFESSIONALLY CLEANED.
Potentially Unwanted Program
WHAT ABOUT THIRD-PARTY
IDENTITY PROTECTION SERVICES?
PROTECTING YOURSELF IN A CONNECTED WORLD
Anything Connected To The Internet Is Capable of
Collecting And Transmitting Data.
The Questions Are ‘What Data,’ ‘What Uses?’
If It’s Free, There’s A High Probability the App/Tool is Collecting Data.
This Also Applies To Advertising Supported Sites.
Anything Data Stored, By Any Service, Is Susceptible To Hacking.
ITEMS IN YOUR HOME THAT COLLECT DATA
THE QUESTION IS—DO THEY STORE IT, SELL IT?
HOW TO PROTECT YOUR ‘SMART HOME’ SYSTEM
• ALWAYS Change The Default Password Of Any New Device
• Update All Security Settings on Devices, Even New Ones
• Be Thoughtful About The Maker Of The Product
• Be Wary Of Public Wi-Fi
• Study The Settings Of Your Device--Can Do, Can’t Do
• Put Connected Devices on Separate Network From
Computer, Phone
Dojo By BullGuard Monitors A Home System
• Should Be Approved By One Of FTC-Approved Watchdogs
• Search Online, Especially News
• Read Privacy Policy Carefully
• If Third Parties Involved In Data Handling, Research Them
• Connect Toys Only To Secure Wi-Fi
• If It Uses Bluetooth, That Should Require PINs, Passwords
• Data Transmission To Wi-Fi Should Be Encrypted
• If It Can Receive Updates, Security Patches, Keep Them
Updated
How Old Should Children Be To Have A Toy With Such Capabilities?
• Devices Can Not Only Listen To You, The TV, But Potentially
All Conversations Within Range
• Use Voice Recognition
• Use A PIN With The Purchasing Function
• Recordings Are Sent To Storage; Listen And Then Delete Them
• Don’t Connect Speaker To Home Security - Smart Door Locks, etc.
• Don’t Store Sensitive Info – Bank Account, Credit Card, etc.
• Mute It When Leaving For Long Period Of Time
SOME MORE OF ROBERTS’ RULES
FOR LIVING SAFELY IN A CONNECTED WORLD
THE ESSENTIALS
• First, Think Carefully About How Connected You Want To Be
• Then Think About Who You Want To Share With
• Think About How Devices Can Make Your Life Safer, More
Convenient, More Enjoyable
• Add The Security Features That Fit Your Life
NEVER MAKE TWO CHANGES TO YOUR SYSTEM AT ONCE!
MAKE A CHANGE, WAIT A COUPLE OF WEEKS TO BE SURE IT’S
WORKING, THEN MAKE ANOTHER CHANGE.
THEN THINK ABOUT ADD-ONS
• Be Careful About Devices That Say They’ll Solve All Problems
• Don’t Believe Promises Unless They Are Backed In Writing
• Do You Know And Trust The Company?
• Don’t Throw Money At Unnecessary Solutions
• Do Your Own Homework – Especially Before Hiring Someone
Don’t Be Afraid To Call In Professional Help When Needed!
THANK YOU!
AND NOW FOR QUESTIONS!

More Related Content

What's hot

It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Deepak Khari
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationGoutama Bachtiar
 
Information security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaInformation security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaChandan Singh Ghodela
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technicalStephen Cobb
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Security In A Connected Society
Security In A Connected SocietySecurity In A Connected Society
Security In A Connected SocietyCentraComm
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crimevishalgohel12195
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessJohann Lo
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 

What's hot (20)

It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
Cyber security
Cyber security Cyber security
Cyber security
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
What is data privacy?
What is data privacy?What is data privacy?
What is data privacy?
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and Investigation
 
Information security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaInformation security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh Ghodela
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Security In A Connected Society
Security In A Connected SocietySecurity In A Connected Society
Security In A Connected Society
 
Dangers of Computer devices
Dangers of Computer devices Dangers of Computer devices
Dangers of Computer devices
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 

Similar to Protecting Yourself From Data and Identity Theft

Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)ameyjakate
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miismcgilla
 

Similar to Protecting Yourself From Data and Identity Theft (20)

Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 

More from Mary Lou Roberts

Organic Vegetable Gardening
Organic Vegetable GardeningOrganic Vegetable Gardening
Organic Vegetable GardeningMary Lou Roberts
 
Growing Berries and Small Fruits on Cape Cod
Growing Berries and Small Fruits on Cape CodGrowing Berries and Small Fruits on Cape Cod
Growing Berries and Small Fruits on Cape CodMary Lou Roberts
 
Wellfleet Harbor And Dermo
Wellfleet Harbor And DermoWellfleet Harbor And Dermo
Wellfleet Harbor And DermoMary Lou Roberts
 
Wellfleet’S Other Salt Marshes
Wellfleet’S Other Salt MarshesWellfleet’S Other Salt Marshes
Wellfleet’S Other Salt MarshesMary Lou Roberts
 
Science In The Cape Cod National Seashore
Science In The Cape Cod National SeashoreScience In The Cape Cod National Seashore
Science In The Cape Cod National SeashoreMary Lou Roberts
 
Herring River Restoration Project
Herring River Restoration ProjectHerring River Restoration Project
Herring River Restoration ProjectMary Lou Roberts
 
Investigation Of Common Eider Mortailty Events At Cape Cod Ellis, Courchesne...
Investigation Of Common Eider Mortailty Events At Cape Cod  Ellis, Courchesne...Investigation Of Common Eider Mortailty Events At Cape Cod  Ellis, Courchesne...
Investigation Of Common Eider Mortailty Events At Cape Cod Ellis, Courchesne...Mary Lou Roberts
 

More from Mary Lou Roberts (11)

Organic Vegetable Gardening
Organic Vegetable GardeningOrganic Vegetable Gardening
Organic Vegetable Gardening
 
Growing Berries and Small Fruits on Cape Cod
Growing Berries and Small Fruits on Cape CodGrowing Berries and Small Fruits on Cape Cod
Growing Berries and Small Fruits on Cape Cod
 
Birding With Henry Beston
Birding With Henry BestonBirding With Henry Beston
Birding With Henry Beston
 
Monitoring Cape Cod Bay
Monitoring Cape Cod BayMonitoring Cape Cod Bay
Monitoring Cape Cod Bay
 
Wellfleet Harbor And Dermo
Wellfleet Harbor And DermoWellfleet Harbor And Dermo
Wellfleet Harbor And Dermo
 
Wellfleet’S Other Salt Marshes
Wellfleet’S Other Salt MarshesWellfleet’S Other Salt Marshes
Wellfleet’S Other Salt Marshes
 
Science In The Cape Cod National Seashore
Science In The Cape Cod National SeashoreScience In The Cape Cod National Seashore
Science In The Cape Cod National Seashore
 
Wastewater on Cape Cod
Wastewater on Cape CodWastewater on Cape Cod
Wastewater on Cape Cod
 
Herring River Restoration Project
Herring River Restoration ProjectHerring River Restoration Project
Herring River Restoration Project
 
Management of Alewife
Management of AlewifeManagement of Alewife
Management of Alewife
 
Investigation Of Common Eider Mortailty Events At Cape Cod Ellis, Courchesne...
Investigation Of Common Eider Mortailty Events At Cape Cod  Ellis, Courchesne...Investigation Of Common Eider Mortailty Events At Cape Cod  Ellis, Courchesne...
Investigation Of Common Eider Mortailty Events At Cape Cod Ellis, Courchesne...
 

Recently uploaded

Virat Kohli Centuries In Career Age Awards and Facts.pdf
Virat Kohli Centuries In Career Age Awards and Facts.pdfVirat Kohli Centuries In Career Age Awards and Facts.pdf
Virat Kohli Centuries In Career Age Awards and Facts.pdfkigaya33
 
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncrdollysharma2066
 
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝 97111⇛⇛47426
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝  97111⇛⇛47426Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝  97111⇛⇛47426
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝 97111⇛⇛47426jennyeacort
 
83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...
83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...
83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...dollysharma2066
 
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar HealthywayAmit Kakkar Healthyway
 
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756dollysharma2066
 
Uttoxeter & Cheadle Voice, Issue 122.pdf
Uttoxeter & Cheadle Voice, Issue 122.pdfUttoxeter & Cheadle Voice, Issue 122.pdf
Uttoxeter & Cheadle Voice, Issue 122.pdfNoel Sergeant
 
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》rnrncn29
 
FUNDAMENTALS OF ARNIS ARNIS ARNIS ARNIS ARNIS
FUNDAMENTALS OF ARNIS ARNIS ARNIS ARNIS ARNISFUNDAMENTALS OF ARNIS ARNIS ARNIS ARNIS ARNIS
FUNDAMENTALS OF ARNIS ARNIS ARNIS ARNIS ARNISe98298697
 
Dry and cracked heels foot cream in India
Dry and cracked heels foot cream in IndiaDry and cracked heels foot cream in India
Dry and cracked heels foot cream in IndiaUniqaya Lifestyle
 

Recently uploaded (11)

Call Girls 9953525677 Call Girls In Delhi Call Girls 9953525677 Call Girls In...
Call Girls 9953525677 Call Girls In Delhi Call Girls 9953525677 Call Girls In...Call Girls 9953525677 Call Girls In Delhi Call Girls 9953525677 Call Girls In...
Call Girls 9953525677 Call Girls In Delhi Call Girls 9953525677 Call Girls In...
 
Virat Kohli Centuries In Career Age Awards and Facts.pdf
Virat Kohli Centuries In Career Age Awards and Facts.pdfVirat Kohli Centuries In Career Age Awards and Facts.pdf
Virat Kohli Centuries In Career Age Awards and Facts.pdf
 
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr
 
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝 97111⇛⇛47426
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝  97111⇛⇛47426Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝  97111⇛⇛47426
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝 97111⇛⇛47426
 
83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...
83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...
83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...
 
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway
 
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756
 
Uttoxeter & Cheadle Voice, Issue 122.pdf
Uttoxeter & Cheadle Voice, Issue 122.pdfUttoxeter & Cheadle Voice, Issue 122.pdf
Uttoxeter & Cheadle Voice, Issue 122.pdf
 
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》
 
FUNDAMENTALS OF ARNIS ARNIS ARNIS ARNIS ARNIS
FUNDAMENTALS OF ARNIS ARNIS ARNIS ARNIS ARNISFUNDAMENTALS OF ARNIS ARNIS ARNIS ARNIS ARNIS
FUNDAMENTALS OF ARNIS ARNIS ARNIS ARNIS ARNIS
 
Dry and cracked heels foot cream in India
Dry and cracked heels foot cream in IndiaDry and cracked heels foot cream in India
Dry and cracked heels foot cream in India
 

Protecting Yourself From Data and Identity Theft

  • 1. Identity Theft Protecting Your Personal Data Eastham Public Library March 2018
  • 2. “Identity Theft Is Becoming the Third Certainty in Life. It’s Prevalent, It’s Getting Worse.” Adam K. Levin Former Director, New Jersey Office of Consumer Affairs At Some Point In Our Lives Most Of Us Will Experience It To Some Degree.
  • 3. WHAT MAKES UP YOUR IDENTITY? IT’S YOUR PERSONALLY IDENTIFYING INFORMATION • Name, Address • Date of Birth • Email Address • Passport Number • Biometrics • Facial Recognition, Fingerprints, Retina Scanning, Voice Recognition • SOCIAL SECURITY NUMBER Think For A Moment About All The Places This PDI May Be Stored!
  • 4. There Are Many Things We Can Do To Protect Ourselves. Some Are Easy, Others Are More Complicated. We Should Do The Easy Things Diligently. We Should Consider Which of the Complicated Things Are Necessary For Our Lifestyle.
  • 5. We Should Each Have In Place A System of Data Protection That Fits Our Lifestyle.
  • 6. BOTH OFFLINE AND ONLINE ACTIONS CAN RESULT IN IDENTITY THEFT OR DIRECT THEFT OF YOUR MONEY DETECTIVE SERGEANT ADAM BOHANNON WILL FOCUS ON SCAMS THAT ATTEMPT TO STEAL FROM YOU DIRECTLY ON APRIL 10 THIS PRESENTATION WILL FOCUS ON ONLINE CAPTURE AND USE AND OF YOUR PERSONAL DATA WHICH CAN LEAD TO ANNOYANCE AND THEFT OF YOUR IDENTITY
  • 7. WHAT WE’RE GOING TO DISCUSS TODAY • Protecting Your Data From Tracking, Abuse and Theft • Techniques And Tools For Protection In A Connected World • A Few ‘Roberts Rules’ For Protecting Yourself, Your Devices
  • 8. The Word ‘Online’ Chosen To Include Internet, Mobile And Other Connected Devices All Of This Applies to Both Internet And Mobile • Most Of Your Account Settings Carry Over To Mobile • Mobile Less Likely To Have Viruses and Malware • Sadly, That Is Beginning To Change
  • 9. WARNING SIGNS OF A VIRUS ON A MOBILE DEVICE • Unwarranted Increase In Data Use • Apps Crashing • Pop-Up Ads Appearing Frequently • App You Are Not Aware of Downloading (Don’t Open!) • Significant Drop in Battery Life You May Have To Format Your Phone Ask Your Mobile Provider For Help!
  • 10. !! MOST IMPORTANT-KEEP SETTINGS UPDATED !! ALSO • Turn On 2-Factor Authentication • Enable Passcode In Case Phone Lost Or Stolen (Each Sign-in) • Both Protect Your Phone Number • Don’t Download Unknown Apps • Don’t Click On Unknown Links
  • 11. PROTECTING THE DATA THAT’S ALREADY OUT THERE Businesses Health Care Providers, Financial Services Firms Government Educational Institutions Charitable Organizations
  • 12. According to Privacy Rights Clearinghouse 10,062,681,966 Accounts were Compromised in 2017 2017 • Equifax • Recent info says tax and driver’s license numbers as well as email • Verizon • Columbia Falls, Montana • Indiana Medicaid, PA Women’s Health Center, Washington St. U Prior • Yahoo (2013; Revealed 2016) • Uber (2016) • eBay (2014) • Target (2013)
  • 13.
  • 14.
  • 15. READ PRIVACY POLICIES • On Websites • When Mailed • Financial Services, Health Care • Pay Attention to Privacy Notices
  • 16. If You Set Up Accounts-- With Retailers for Example— Don’t Save Your Credit Card Number.
  • 17. PREVENTING ADVERTISERS AND OTHERS FROM TRACKING YOU
  • 18. HOW IMPORTANT TO PREVENT EMAIL TRACKING? • DO Protect Your Email Account • 2 Step Verification (Every Sign In) • 2 Factor Authentication (When Account Changes Made) • Should You Protect Your Email Content? • Never Send Sensitive Information By Email • Account Numbers, Passwords, etc. • Then Don’t Worry About Encryption
  • 19. PROTECTING YOURSELF WHILE BROWSING THE WEB • There Are A Number Of Browser Extensions That Block Ads • Some Are Open Source And Free • All Work Differently/Work On Various Browsers • Google Chrome Has A New Blocker • Adblock Plus, Disconnect, Ublock Origin, Ghostery • Protecting Against ISP Selling Web Use Data—Explained On Privacy Policy • HTTPS Everywhere • Use a VPN • Adjust DNS—Fairly Technical • Will ISP Block Your Service If You Use Any Of These?
  • 20. PROTECTING YOURSELF FROM UNWANTED PHONE CALLS NOT ONLY ANNOYING, THEY ARE OFTEN SCAMMING • Stopping Robo Calls on Your Land Line • Sign Up For The Do Not Call Registry (FCC) • Nomorobo • Stopping Robo Calls on Your Smart Phone • Most Carriers Offer An App To Block Robo Calls
  • 21. PROTECTING YOUR DATA ON THE WEB A Virtual Public Network Is A Secure Private Network Built On Public Infrastructure (The Web). It Encrypts The Data Traveling Over The Network And Adds Other Security Measures. Use A Highly Rated One. Most Have Free Trials, Even Free Plans, For Low Volume Users.
  • 22. ROBERTS’ RULES FOR FINDING A GOOD VPN— OR ANY OTHER INTERNET TOOL • Search “The Best” • Consider Adding The Current Year To Your Search Term • Read The Reviews • In 2018 Don’t Consider Reviews Written Before 2017 • Choose The Tool That Best Meets Your Needs And Lifestyle • Download The Tool • Follow Instructions • Carefully Examine The Settings
  • 24. There Is Also The Tor Browser It Uses Technology That Significantly Slows Your Browsing
  • 25. PREVENTING THEFT OF YOUR DATA
  • 26. THE IMPORTANCE OF STRONG PASSWORDS CANNOT BE OVERSTATED • Never Reuse Passwords • Passwords Should Be Long, Strong and Complex • Don’t Use Obvious Terms—Address, Birthday, Children, Pets, etc. • Be Careful Where You Store Them • Use Multi-Factor Authentication Whenever Possible TOO MUCH TROUBLE, RIGHT???
  • 27. THERE IS AN ANSWER— AN EFFECTIVE PASSWORD MANAGER!
  • 28. A PASSWORD MANAGER HAS SEVERAL FUNCTIONS • Secure Way To Keep Track Of All Your Passwords • Can Build Strong Passwords For All Your Accounts • Can Automatically Sign You Into Many Accounts • Can Store Credit Card Info, Making Purchasing Online (Too?) Easy • 1Password Can Now Determine If Your Password Has Been pwned (defeated) • Again, Choose Carefully (Roberts’ Rules)
  • 29.
  • 30. SECURITY PROGRAM ESSENTIAL • Virus Protection • Firewall • Other Features • Parental Controls; Gaming Protection; Protect Email Against Spam, Spyware, Phishing • Most ISPs Offer Free Security Program • If You Choose Your Own, Use A Paid Program
  • 31. MOST DATA THEFT IS RESULT OF SOME TYPE OF MALWARE • “All The Bad Stuff” • Viruses And More • Good Security Program Will Get Most • A Good Anti-Malware Package Will Catch A Few More • There Are Free Versions FOR SERIOUS PROBLEMS, HAVE YOUR COMPUTER PROFESSIONALLY CLEANED.
  • 33. WHAT ABOUT THIRD-PARTY IDENTITY PROTECTION SERVICES?
  • 34. PROTECTING YOURSELF IN A CONNECTED WORLD
  • 35. Anything Connected To The Internet Is Capable of Collecting And Transmitting Data. The Questions Are ‘What Data,’ ‘What Uses?’ If It’s Free, There’s A High Probability the App/Tool is Collecting Data. This Also Applies To Advertising Supported Sites. Anything Data Stored, By Any Service, Is Susceptible To Hacking.
  • 36. ITEMS IN YOUR HOME THAT COLLECT DATA THE QUESTION IS—DO THEY STORE IT, SELL IT?
  • 37. HOW TO PROTECT YOUR ‘SMART HOME’ SYSTEM • ALWAYS Change The Default Password Of Any New Device • Update All Security Settings on Devices, Even New Ones • Be Thoughtful About The Maker Of The Product • Be Wary Of Public Wi-Fi • Study The Settings Of Your Device--Can Do, Can’t Do • Put Connected Devices on Separate Network From Computer, Phone
  • 38. Dojo By BullGuard Monitors A Home System
  • 39. • Should Be Approved By One Of FTC-Approved Watchdogs • Search Online, Especially News • Read Privacy Policy Carefully • If Third Parties Involved In Data Handling, Research Them • Connect Toys Only To Secure Wi-Fi • If It Uses Bluetooth, That Should Require PINs, Passwords • Data Transmission To Wi-Fi Should Be Encrypted • If It Can Receive Updates, Security Patches, Keep Them Updated How Old Should Children Be To Have A Toy With Such Capabilities?
  • 40. • Devices Can Not Only Listen To You, The TV, But Potentially All Conversations Within Range • Use Voice Recognition • Use A PIN With The Purchasing Function • Recordings Are Sent To Storage; Listen And Then Delete Them • Don’t Connect Speaker To Home Security - Smart Door Locks, etc. • Don’t Store Sensitive Info – Bank Account, Credit Card, etc. • Mute It When Leaving For Long Period Of Time
  • 41. SOME MORE OF ROBERTS’ RULES FOR LIVING SAFELY IN A CONNECTED WORLD
  • 42. THE ESSENTIALS • First, Think Carefully About How Connected You Want To Be • Then Think About Who You Want To Share With • Think About How Devices Can Make Your Life Safer, More Convenient, More Enjoyable • Add The Security Features That Fit Your Life NEVER MAKE TWO CHANGES TO YOUR SYSTEM AT ONCE! MAKE A CHANGE, WAIT A COUPLE OF WEEKS TO BE SURE IT’S WORKING, THEN MAKE ANOTHER CHANGE.
  • 43. THEN THINK ABOUT ADD-ONS • Be Careful About Devices That Say They’ll Solve All Problems • Don’t Believe Promises Unless They Are Backed In Writing • Do You Know And Trust The Company? • Don’t Throw Money At Unnecessary Solutions • Do Your Own Homework – Especially Before Hiring Someone Don’t Be Afraid To Call In Professional Help When Needed!
  • 44. THANK YOU! AND NOW FOR QUESTIONS!

Editor's Notes

  1. The SIM card/port scam
  2. http://www.information-age.com/10-biggest-hacks-rocked-business-world-2017-123469857/ http://www.healthcareitnews.com/slideshow/biggest-healthcare-breaches-2017-so-far?page=22
  3. https://arstechnica.com/information-technology/2018/02/new-tool-safely-checks-your-passwords-against-a-half-billion-pwned-passwords/
  4. Kaspersky
  5. Roomba w wifi 9 mo and up
  6. Smart TV can listen to conversations, but can turn that off