Identity Theft and Account Takeover Prevention

Similar documents
How to Keep Your Personal Information Secure

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Target Breach Overview

ID Theft and Data Breach Mitigation

Identity Theft and Online Security

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Safety and Security. April 2015

Identity Theft and Online Security

Retail/Consumer Client Internet Banking Awareness and Education Program

Who We Are! Natalie Timpone

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group

5LINX ID GUARD Product Overview. Credit/Presenter Goes Here

Employee Security Awareness Training

Why you MUST protect your customer data

Beware! Identity Theft

Security Awareness. Chapter 2 Personal Security

Credit Card Frauds Sept.08, 2016

Page 1 of 6 Bank card and cheque fraud

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft. Ley Mills IRS Stakeholder Liaison December 20, 2017

Security Now. Howard Verne. Is My Private Information Safe?

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

Identity Theft Victim s Complaint and Affidavit

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

Newcomer Finances Toolkit. Fraud. Worksheets

Electronic Identity Theft and Basic Security

Red Flag Regulations

TWINSBURG COMMUNITY SERVICE BUREAU. Senior Scam Workshop. Presented by Officer Ron Fruscella and Officer Greg Kopniske

Guide to credit card security

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning

Protect Yourself From. Identify Theft

ELECTRONIC BANKING & ONLINE AUTHENTICATION

Personal Cybersecurity

SPRING 2018 HERSHEYSMILL FRAUD PREVENTION NEWSLETTER

Cyber Insurance: What is your bank doing to manage risk? presented by

Federal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision

It pays to stop and think

PCI Compliance. What is it? Who uses it? Why is it important?

Identity Theft and Data Breach. How to protect yourself?

How Cyber-Criminals Steal and Profit from your Data

IDENTITY THEFT PREVENTION Policy Statement

Preventing Tax Preparer Data Theft

Best Practices Guide to Electronic Banking

Protect Yourself. Collaboration between Texas A&M Information Technology and Human Resources. Newsletters Presentations Outreach Activities

Data Security Essentials

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

FREQUENTLY ASKED QUESTIONS

Consumer Online Banking Application

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Data Compromise Notice Procedure Summary and Guide

Your security on click Jobs

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

June 2 nd, 2016 Security Awareness

Frequently Asked Questions. OPM Data Breach. Department of the Navy

Toolkit for March Fraud Prevention Month 2017 Senior Support. FRAUD Recognize It Reject It Report It.

Identity theft is the fastest growing

Technology in Action

What is a Breach? 8/28/2017

What is Mobile Deposit? What items can be deposited via Mobile Deposit? What items cannot

IMPORTANT SECURITY CHANGES LOGGING ON. We are replacing the existing enhanced authentication.

Frequently Asked Questions. OPM Data Breach. Department of the Navy

ID Theft Information Form - Instructions

FAQ: Privacy, Security, and Data Protection at Libraries

Keeping It Under Wraps: Personally Identifiable Information (PII)

Introduce yourself (best to provide brief bio to host so he or she can give your background) I m with American Century Investments and it is a

Cybersecurity in Higher Ed

AARP WATCHDOG ALERT HANDBOOK

CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL

Us bank phishing letter. Us bank phishing letter

Client Resources. participant guide

Preventing fraud in public sector entities

FFIEC CONSUMER GUIDANCE

How to Build a Culture of Security

Copyright

INFORMATION ABOUT SCAMS FOR RESIDENTS

ASSESSMENT LAYERED SECURITY

Today s Security Threats: Emerging Issues Keeping CFOs Up at Night Understanding & Protecting Against Information Security Breaches

Breaches and Remediation

Frequently Asked Questions. OPM Data Breach. Department of the Navy

Legal Aspects of Cybersecurity

DeMystifying Data Breaches and Information Security Compliance

Digital Crime and Cybersecurity. Scott D. Ramsey, Managing Director May 2017

( Utility Name ) Identity Theft Prevention Program

FAQ. Usually appear to be sent from official address

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Cyber Crime Seminar. No Victim Too Small Why Small Businesses Are Low Hanging Fruit

How Breaches Really Happen

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

Identity Theft: Enterprise-Wide Strategies for Prevention, Detection and Remediation

South Central Power Stop Scams

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Financial scams. What to look for and how to avoid them.

1 of 11 10/1/ :26 AM

Taking control of your finances... 5 Use these tips to manage your finances

Protecting Digital Assets

In this chapter, I explain who identity theft affects, how it happens, and

2016 Tri-State CF Partnership Webinar Series. Cyber Crime Trends a State of the Union April 7, 2016

Prevention of Identity Theft in Student Financial Transactions AP 5800

City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program

Transcription:

Identity Theft and Account Takeover Prevention Sgt. Rick Radinsky,CFE 520-837-7814 Det. Jeff Van Norman 520-837-7827

Introduction Tucson Police Financial Crimes Unit Responsible for investigation of fraud schemes, identity theft, check and credit card forgery, and most other white-collar crimes. Composed of 1 Sergeant and 6 Detectives. Receive about 2,400 cases per year, of which slightly less than 10% will be assigned. Working Relationships Memberships in IAFCI and ACFE. 3 Certified Fraud Examiners Financial Crimes Task Force Secret Service, USPIS, Marana Police Other local, state and federal agencies

Meet Darryl P.

Identity Theft Definition ARS 13-2008: Taking the identity of another person or entity Knowingly Personal Identifying Information (PII) (ARS 13-2001) Name, screen name, signature Driver license, military ID, or social security number Access device or account numbers Birthdate, mother s maiden name, or other info as delineated in the statute For any unlawful purpose or to cause economic loss Class 4 felony Most cases that are reported are the use of credit card or bank information. Tax ID theft is on the rise.

Identity Theft Prevalence Federal Trade Commission Consumer Sentinel Reports Increase from 290,102 in 2013 to 490,220 in 2015 (68%) Unrelated factors may have influenced the numbers Amount of feeder agencies reporting may have increased May double count cases (someone reports to feeder agency as well as FTC) 2013 290,102 332,647 2014 490,220 2015

Identity Theft Prevalence Tucson Police Reports Instances reported increased from 636 in 2013 to 812 in 2015 or just over 27%. As of 5/19/16, there have been 312 reports generated 636 694 2013 2014 812 2015

How do they get your information? Technology assisted Phishing emails Computer spyware/malware Internet underground markets Hacks of sensitive databases Old-school Dumpster diving Theft (purse, wallet, vehicle break-ins) Dishonest people with access to records Social engineering Mail theft

How much data is stolen? According to the Identity Theft Resource Center, There were 781 breaches that exposed at least 169 million records in 2015. T-Mobile / Experian 15 million records, including name, address, SSN, DOB, any ID number used to verify identity Scottrade 4.6 million records. Claim only contact info was stolen, though SSN and other data was in same accessed system UCLA Health 4.5 million reocrds. Names, addresses, SSN, and medical data. Army National Guard 850,000 records, including Names, SSN, DOB and home address Trend does not appear to be slowing down in 2016

Don t be an ostrich

Get SHREDded From ID Theft Resource Center

Other prevention tips Check mail as soon as practical. Do not put outgoing mail in an unsecured mailbox. Invest in a crosscut shredder, and use it. File your taxes as early in the tax year as practical. Sign up for online access to Social Security. Keep papers with PII locked up in your home. Do not leave important papers or computers with data on them in your vehicle.

Monitor proactively From IdentityTheft.gov: Indicators your info has been stolen Unexplainable bank withdrawls Debt collectors call Unfamiliar accounts on credit reports Insurance shows payment for treatment you never received Letter from IRS that more than one tax return was filed, or you neglected to include income for work you never did Expected mail never arrives Keep computer updated with latest version of operating systems and security patches. Be especially aware when using public computers or Wi-Fi.

Monitoring services Things to consider: What information will they be actively monitoring? What services are provided when I become a victim? Are there any financial safety nets (insurance) available in the event I suffer a monetary loss? What s the company s online reviews and BBB standing? What is the cost, and is it worth it for the service that they will provide? Basically, it s like any other purchase do your due diligence.

Identity Theft - Recovery Identity theft is a difficult and time consuming crime to recover from. Much of the work must be done by the victim, increasing the level of frustration. www.identitytheft.gov Sponsored by the FTC. This site will provide a personalized, step by step recovery plan. For the less internet savvy, copies of the Taking Charge book are available at all Tucson Police substations Monday through Friday 8am-5pm Important to follow the steps! This will minimize further damage to your identity, and provide an idea as to how extensive the damage already done is.

Account Takeover Fraud Account takeovers occur when someone, committing identity theft, takes control of your financial account(s) for their own purposes. Accounts can be taken over by many methods, but almost always due to the compromise of PII Weak or non-existent passwords Phishing emails, phone calls and fake websites Email compromise Social engineering When account takeover is successful, anything you could do in your account, the fraudster can do. Transfer money, change billing address, etc.

Account Takeover Prevention Password! Should be unique for each financial institution, and associated email addresses Should be at least 8 characters, and have mixture of capital letters, numbers and symbols. Words and names should be avoided. Two-Factor authentication This should be used whenever available. This provides a text message when an unrecognized computer attempts to sign into your account.

Account Takeover Prevention On mobile devices, require a PIN to open your financial account and email apps, if available. Ensure your phone s lockscreen requires a PIN or other type of code to unlock it. Apply security updates for both mobile and PCs as soon as practical after they become available. Utilize security software to scan for viruses and malware. Be skeptical of any emails, texts or phone calls that seek PII and claim to be from a financial institution.

Summary All the preventive measures in the world are ineffective if you provide passwords to fraudsters, even if by accident. Prevention is much easier, and cheaper, than recovery. Take active steps to protect your identity, and monitor it constantly.

Further Resources IdentityTheft.gov Federal Trade Commission s official website for victims of identity theft ID Theft Resource Center (www.idtheftcenter.org) Wide range of information and assistance available for any and all aspects of identity theft

Contact Information Sgt. Rick Radinsky 520-837-7814 Rick.Radinsky@TucsonAZ.gov Det. Jeff VanNorman 520-837-7827 Jeff.VanNorman@TucsonAZ.gov