New NIHFCU Credit Cards

New NIHFCU Credit Cards

Protect Yourself and Your Identity From Financial Crimes Brooke Ball, NCCO, BSACS Director, Risk Management Whats in store for today

Identity Theft How does it happen How to protect yourself What to do if your information has been compromised Scams Questions

Identity Theft What is identity theft (ID Theft)? Crime in which an imposter obtains key pieces of personally identifiable information in order to assume that persons identity to

make transactions, open accounts, or takeover existing accounts. In 2015, approximately 13.1million US residents experienced some type of ID theft. In 2016, approximately 15.4 consumers experienced some type of ID theft.

There was a time when this is how identity theft occurred How does identity theft occur? Trash Fraudster may be able to piece together enough

information from old bills, financial statements, etc. to get your account number, social security number, etc. Mail Fraudster may take a pre-approved credit offer or obtain the same type of information obtained through the trash.

Data Breaches Incident in which sensitive or confidential information has been accessed, stolen, or used by someone who is unauthorized to do so.

Skimming Fraudster uses a device in an ATM or gas pump to steal credit or debit card information. Phishing Fraudster tries to deceive victim into opening or

responding to emails or text messages designed to capture personal information for fraudulent purposes. Equifax Names, Social Security Numbers, Birth Dates, Addresses and in some cases, drivers license numbers, of 145 million people were compromised Credit card numbers for about 209,000 people stolen Dispute documents with personal identifying information stolen on about 182,000

people Breach lasted from mid-May through July Have you been impacted? Visit: Ive been impacted, now what? Enroll in the TrustedID Premier credit monitoring service offered by

Equifax; its free for one year Place a credit freeze on your credit reports Place a fraud alert on your credit reports Monitor your accounts closely Report any suspicious activity immediately to your financial institution Sender information appears to be from legitimate company Recipients are enticed to click on embedded link or open an attachment

Link may be used to install malware on your computer Message indicates urgent action is necessary with the threat of something bad happening Focus: usernames, passwords, credit/debit card details Captures online banking login credentials and transfers funds to other institutions Other Scams

Sweetheart / Romance Scammer develops relationship with someone online, eventually luring them to provide their account information or to send them money. Phone

Scams Scammer calls and tries to convince you to provide secure information. They do this by promising a cheap vacation, that you will receive a special prize, etc. Website Spoofing

The act of creating a fake website with the intention of misleading viewers that the website has been created by a different person or organization. $200 million worth of losses per FBI; 12,500 complaints Duped into providing online banking login credentials Fraudster makes fraudulent deposits to victims account by check or

through ACH debits Checks or ACH debits returned taking account negative Victims become money mules instructed to send funds via western union or MoneyGram Thousands of people lose money to telephone scams every year; from hundreds to life savings Typically very friendly, at least initially, to gain your trust

Recent scam has a scammer call and say, Can you hear me? Its designed to trick victims into responding, Yes. The fraudster records the voice response and other responses to use later in an attempt to make fraudulent charges Claim to be from a legitimate company or organization, like the IRS Goal is for someone to enter secure information into the fake site vs

Misspelled words Low-resolution images How to Protect Yourself Always keep your information secure Shred documents with confidential information Keep your debit and credit cards in a safe location Monitor your account activity

Dont give out sensitive information in response to unsolicited messages Save online banking and shopping for when youre using a secure network Avoid unattached, outdoor ATMs when possible Avoid using gas pumps located far away from an entrance/supervision Dont use a gas pump with a broken security seal Use secure, known websites for making purchases online How to Protect Yourself

Dont answer calls from unknown numbers, let it go to voicemail Be cautious opening attachments or clicking on links in emails Dont be hesitant to hang up on someone if the caller is persistent and wont let you end the call If it seems to be good to be true, it just may be Trust your gut What if my information has already

been compromised? Credit monitoring service Monitor your transaction activity Place a fraud alert on your credit report Place a credit freeze on your credit report Review your credit report annually (you get one free copy per year) Notify your financial institutions of any confirmed identity theft Report confirmed identity theft, fake websites, and phishing calls to Resources Security Center

Recently Viewed Presentations

  • Como aplicaremos el PAE según las teoristas

    Como aplicaremos el PAE según las teoristas

    Valoracion y Aplicación del PAE según Faye Abdallah Aunque Abdellah habla del paciente centrada en los enfoques, Ella escribió las enfermeras deben identificar y resolver problemas específicos. Esta identificación y clasificación de los problemas que se llamaba la tipología de...
  • Linear Models and Effect Magnitudes for Research, Clinical ...

    Linear Models and Effect Magnitudes for Research, Clinical ...

    The generalized linear model predicts a dependent that can range continuously from ‑ to + , just as in the general linear model. For counts: the dependent is the log of the mean count. The model is called Poisson regression.
  • Chapter 2 Texas in the Federal System LEARNING

    Chapter 2 Texas in the Federal System LEARNING

    LO 2.2 Distinguish among the types of powers in our federal system, and explain dual and cooperative federalism within the context of the evolution of federalism in the United States. LO 2.3 Analyze Texas's relationship with the federal government and...
  • Master of Arts

    Master of Arts

    c) No adjustment for US: E.g. US could not reduce value of currency. Other countries take advantage Trade Convertibility 2) Globalization: Growth of short term financial flows/eroding of capital controls (1970s) E.g. "Euromarkets" Increased pressure on fixed exchange rates Major...
  • ntent: and Alliance ommon enemy eological differences ommunist

    ntent: and Alliance ommon enemy eological differences ommunist

    The Grand Alliance collapsed because… They went from allies to enemies because… Ideological differences meant that…. The USSR felt threatened because… The USA felt threatened because… The USA were a threat to the USSR because.. The USSR were a threat...
  • Demand -

    Demand -

    The Demand Curve. The DEMAND CURVE is a function that shows the inverse relationship between price and quantity (Law of Demand) The demand curve . ALWAYS SLOPES DOWN (and to the right) The demand curve is basically a "best fit"...
  • Poster Title Researchers/Presenters Names (Lead name first, then

    Poster Title Researchers/Presenters Names (Lead name first, then

    Copy and paste your text content here, adjusting the font size to fit. Take care with fonts. We suggest "Arial" as a sans-serif font, or "Time Roman" (not "Time New Roman") for a serif font. Use the "Symbol" font for...
  • Co-Teaching as Best Practice in Student Teaching

    Co-Teaching as Best Practice in Student Teaching

    JSU Co-Teaching Project and Timeline for 2012-2013. Initial training for JSU Faculty, LEA Administrators, Cooperating Teachers. Placement and training of initial group of selected JSU students. Initial implementation in Fall Practicum into Spring Internship. Embed co-teaching in all College of...