26
1 Identity Theft: What You Need to Know

Id theft-phishing-research

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Id theft-phishing-research

1

Identity Theft:

What You Need to Know

Page 2: Id theft-phishing-research

2

What is Identity Theft?

Page 3: Id theft-phishing-research

3

Assess Your Identity Theft Risk

Answer the 20 questions

Total your score

What are your greatest risk exposures?

Page 4: Id theft-phishing-research

4

Identity Theft

Identity theft is a crime of stealing key pieces of someone’s identifying information, such as:

name,

address,

Social Security number,

birth date, and

mother’s maiden name

Page 5: Id theft-phishing-research

5

Common Forms of Identity Theft

Credit card fraud

Communications services fraud

Bank fraud

Fraudulent loans

Internet fraud

Page 6: Id theft-phishing-research

6

How Identity Theft OccursIdentity thieves…

steal wallets and purses containing your ID

steal your mail

complete false “change of address” forms

rummage through trash (“dumpster diving”)

pose fraudulently as someone else to get your information

Page 7: Id theft-phishing-research

7

More Ways Identity Theft Occurs

Identity thieves…

steal business or personnel records at your workplace.

find personal info in your home.

use info you put on the Internet.

buy personal info from “inside sources.”

“shoulder surf” at ATMs and telephones.

Page 8: Id theft-phishing-research

8

Technology Scams: Phishing,

Fraudulent E-mails, etc.

Page 9: Id theft-phishing-research

9

Look-Alike (Fake) Web Sites

Spoof e-mail messages sent to “verify” or “update” account info

Appears to come from reputable company• Example: eBay, Best Buy, banks, merchants

Looks “legitimate” Scam is called “phishing”

• Get people to disclose sensitive data

• Data used to commit identity theft

Page 10: Id theft-phishing-research

10

Red Flags of a Phishing Scam

E-mails that direct users to a Web site to “validate” or “update” info

E-mails warning accounts will be closed

Grammatical errors and typos

References to 9-11, the Patriot Act, etc.

Return addresses at yahoo.com, juno.com

Words Like “Urgent” and “Important”

Page 11: Id theft-phishing-research

11

Steps To Avoid Phishing

Be cautious: African refugees with $10 million, suspended FDIC insurance, etc.

Realize that banks never ask for account info, especially in an e-mail

Don’t click on any links in suspicious e-mails

Report suspicious e-mails to companies

D-E-L-E-T-E

Page 12: Id theft-phishing-research

12

Newest Scam: Medicare-Approved Drug Discount Cards Helpful callers or e-mails or door-to-door

fraudsters offer to help seniors get a Medicare-approved drug discount card

Fraudsters request SS # for ID Victims’ personal info used for:

• Identity theft crimes• Medicare fraud crimes

Page 13: Id theft-phishing-research

13

Recommended Technology Fraud Risk-Reduction Practices

NEVER click on unsolicited pop-up ads Avoid putting your e-mail address on public

Web pages (can be harvested by spammers) Don’t use “good” e-mail address in chat rooms Avoid short addresses like “John101” Keep virus software & patches up to date Never forward chain letters & virus warnings

Page 14: Id theft-phishing-research

14

Interesting Fact

58% of e-mail messages in 2003 were spam

Source: Kiplinger’s Personal Finance, March 2004

Page 15: Id theft-phishing-research

15

How Identity ThievesUse Your Information

Change mailing addresses on credit card accounts.

Open new credit card accounts.

Establish phone or wireless service in your name.

Open new bank accounts and write bad checks.

File for bankruptcy under your name.

Counterfeit checks or debit cards.

Buy and take out car loans in your name.

Page 16: Id theft-phishing-research

16

Reducing the Risk of Identity Theft

Destroy credit card applications, receipts, bank, and billing statements.

Avoid giving your SSN unless it’s absolutely necessary -- use other identifiers.

Pay attention to billing cycles.

Guard your mail from theft.

Put passwords on credit card, bank, and phone accounts.

Page 17: Id theft-phishing-research

17

More Ways toReduce the Risk of Identity Theft

Carry as little identification information as possible.

Limit the number of credit cards you carry.

Don’t give personal identification on the phone unless you initiate the call.

Be cautious with personal info in your home.

Check on who has access to your personal info at work.

Page 18: Id theft-phishing-research

18

Still More Ways toReduce the Risk of Identity Theft

Don’t carry your SS card.

Save ATM and credit card receipts to check against statements.

Alert family members to dangers of pretexting.

Be informed about your financial institutions’ policies of sharing information.

Make sure your credit reports are accurate.

Page 19: Id theft-phishing-research

19

How to Get Your Credit ReportsEquifax -- www.equifax.com

To order: 800-685-1111To report fraud: 800-525-6285

Experian -- www.experian.comTo order: 888-EXPERIAN

To report fraud: 888-EXPERIAN

Trans Union -- www.tuc.comTo order: 800-916-8800

To report fraud: 800-680-7289

New Jersey residents can receive one free credit report per year from each credit reporting agency

Page 20: Id theft-phishing-research

20

If You’re a Victim...

1. Contact the fraud departments of the three major credit bureaus.

2. Contact creditors or financial institutions for any accounts that have been tampered with.

3. File a report with local police or police where the theft took place.

Page 21: Id theft-phishing-research

21

Summary

Minimize the amount of information that can be stolen from you.

Reduce the amount of personal information “out there.”

Add extra security protection to your account.

Identity theft is a crime that must be reported.

Act immediately to stop further use of your identity.

Page 22: Id theft-phishing-research

22

ID Theft Study Purpose

• To understand what actions consumers are taking to reduce the risk of identity theft

Data collected from an online self-assessment tool (sample bias)

20 questions; 1 (never) to 5 (always)

Higher score: more frequent use of risk reduction practices

Data from 287 respondents in 2003

Page 23: Id theft-phishing-research

23

Web Site Address For The Online Identity Theft Quiz

www.rce.rutgers.edu/money/identitytheft/default.asp

The online quiz provides both personalized feedback to users and a database for ongoing research

Page 24: Id theft-phishing-research

24

Findings

Mean scores range from 2.1 to 4.4

Three least frequently reported practices:

• Checking credit report annually from 3 bureaus

• Post office box or locked mailbox-incoming mail

• Carrying SS card or ID card with SS number

Page 25: Id theft-phishing-research

25

Checking Credit Reports

Least frequently performed risk reduction practice (score of 2.1)

Almost a third of sample had respondents from the six states that mandate free reports

• CO, GA, MD, MA, NJ, and VT

Two groups of respondents compared

No difference found between groups

Cost may not be a primary barrier

Page 26: Id theft-phishing-research

26

Summary

Majority of sample used many risk reduction practices

Indication of consciousness-raising

• From government and non-profit agency info

• From media reports about identity theft

• From knowing a crime victim (1 in 50 people)

Not giving out SS and bank account # and having mail held: most frequently done