Insider`s Guide to Information Security and Avoiding Identity Theft 2

Transcription

Insider`s Guide to Information Security and Avoiding Identity Theft 2
Insider's Guide to Information Security
and Avoiding Identity Theft
Written & Presented By: Stephen M.Yoss, Jr., CPA
February 16, 2016 . Claremont, California
Insider's Guide to Information Security and Avoiding Identity Theft
1
NEXT
About the Presenter
Stephen M. Yoss, Jr., CPA
If I’m not speaking, in class, or developing
software then I must be getting my hands
dirty at a fireworks show!
‣
‣
Founder and principal of MantisPRO
‣
‣
Proud graduate of Loyola Marymount University
‣
Started working with technology at age 10 in family’s
accounting firm
‣
Actively works in software and technology product
development
Certified public accountant with experience in public and
private accounting
Currently pursuing a Master’s degree in Information
Systems and Technology at Claremont Graduate University
Insider's Guide to Information Security and Avoiding Identity Theft
2
NEXT
Top Left: 75th Anniversary of the Golden Gate Bridge, San Francisco, CA
Top Right: KGB Skyshow, San Diego, CA
Bottom Left: Brooklyn Bridge, New York, NY
Insider's Guide to Information Security and Avoiding Identity Theft
3
NEXT
Module One. Identity Theft.
4
NEXT
Trends in Security and Privacy
Privacy
The
Internet
A helpful Venn diagram of privacy and the Internet.
Insider's Guide to Information Security and Avoiding Identity Theft
5
NEXT
A Discussion on Identity Theft
‣ Defining identity theft
‣ Major breaches
‣ Signs of identity theft
‣ Medical identity theft
‣ Tax return identity theft
‣ Resolving identity theft & resources
Insider's Guide to Information Security and Avoiding Identity Theft
6
NEXT
Identity Theft Defined
According the US Dept. of Justice, identity theft is:
‣ "But he that filches from me my good name/Robs me
of that which not enriches him/And makes me poor
indeed.” - Shakespeare, Othello, act iii. Sc. 3.
‣ Identity
theft and identity fraud are terms used to
refer to all types of crime in which someone involves
frames or deception, typically for economic gain.
Want to Learn More? http://goo.gl/KnkNA
Essentially, someone exploiting your personal information
for their personal gain.
Insider's Guide to Information Security and Avoiding Identity Theft
7
NEXT
How Identity Theft Works
‣ Obtain.
Criminal obtains uniquely identifying
information about a target. The information can
come from online sources such as phishing emails
or physically obtained.
‣ Sell. Most of the time the people who obtain the
personal information sell it to other parties.
Want to Learn More? http://goo.gl/1Iq5M
‣ Exploit.
The uniquely identifying personal
information is used for financial gain through
opening credit cards or obtaining loans.
Insider's Guide to Information Security and Avoiding Identity Theft
8
NEXT
Identity Theft: By the Numbers
Want to Learn More? http://goo.gl/o1Azcv
‣
‣
Identity theft is the fastest growing crime in America.
‣
It takes the average victim an estimated $500 and 30
hours to resolve each identity theft crime.
‣
Financial institutions, like banks and creditors, usually
only hold the victim responsible for the first $50 of
fraudulent charges.
‣
Only 28% of identity theft cases involve credit or
financial fraud. Phone, utility, bank, and employment fraud
make up another 50% of cases.
Every minute about 19 people fall victim to identity
theft.
Insider's Guide to Information Security and Avoiding Identity Theft
9
NEXT
Recent Major Identity Theft Examples
Want to Learn More? http://goo.gl/Xt7MZd
‣
In 2013, Mauricio Warner of Atlanta, Georgia filed 5000
fraudulent tax returns using stolen information. He
received over $6M dollars in refunds. Victims were told
they could submit an application for a “stimulus
payment” or “free government money” by providing
their names and social security numbers.
‣
In 2011, Amar Singh and his associates stole in excess of
$13m dollars from victims in three months. The
obtained credit card information from fake websites as
well as RFID scanners in stores. They generated fake
new cards and spent as much as possible as quickly as
possible.
Insider's Guide to Information Security and Avoiding Identity Theft
10
NEXT
Recent Data Breach with the IRS
‣ Criminals used stolen information to gain access to past tax
‣
‣
‣
Want to Learn More? http://goo.gl/8RJ39f
‣
returns for more than 100K people using the Agency’s
electronic transcript service.
Criminals used information such as social security numbers,
dates of birth and other information obtained from other data
breeches to get through the multistep authentication process.
More than 200,000 attempts to view the past returns using
stolen information were made from February to mid-May, and
about half were successful.
The Agency reportedly sent nearly $50M in refunds before the
fraud was detected.
The Agency strongly believes that the fraud was perpetrated by
organized crime syndicates from around the world.
Insider's Guide to Information Security and Avoiding Identity Theft
11
NEXT
Recent Data Breach with Federal OPM
‣
‣
‣
‣
‣
‣
In April 2015, the US Office of Personnel Management was attacked and
breached. Approximately 4M personnel records were compromised.
The breach focused on current and, former and prospective federal
government employees who had security clearances.
The breached data included detailed background security-clearancerelated background information.
The Chinese government is suspected as sponsoring the attack, but they
have denied the allegation.
The motive is unclear, but it is suspected that this information will be
used to help conceal future potential spies as well as expose US
government operatives.
Hacked federal files couldn't be encrypted because government
computers were too old.
Insider's Guide to Information Security and Avoiding Identity Theft
Want to Learn More? http://goo.gl/s1j7tG
12
NEXT
What Happens with Stolen Data?
Want to Learn More? http://goo.gl/TdiP
‣
Substantially all stolen data is sold on the Dark Web.
Most often using the TOR network. TOR is free software
for enabling online anonymity and censorship resistance.
‣
TOR directs Internet traffic through a free, worldwide,
volunteer network consisting of more than five thousand
relays to conceal a user's location or usage from anyone
conducting network surveillance or traffic analysis.
‣
The Dark Web contains vendors that sell everything
from illegal narcotics, to illegal steroids, to illegal
firearms. If is illegal, it can be found on the Dark Web.
Insider's Guide to Information Security and Avoiding Identity Theft
13
NEXT
Signs of Identity Theft
Signs that someone might have stolen your identity:
‣ You see withdrawals from your bank account that you
can’t explain.
‣ You don’t get your bills or other mail.
‣ Merchants refuse your checks.
‣ Debt collectors call you about debts that aren’t yours.
‣ You find unfamiliar accounts or charges on your credit
report.
‣ The IRS notifies you that more than one tax return was
filed in your name, or that you have income from an
employer you don’t work for.
Insider's Guide to Information Security and Avoiding Identity Theft
Want to Learn More? http://goo.gl/ZcNTmD
14
NEXT
Identity Theft and Social Media
‣ When you share your personal information, photos, and travel
plans on social media sites, you may be putting yourself at risk and
giving someone the keys to steal your identity. Avoid sharing too
much information:
‣ Don’t post or share your e-mail address on a public profile.
‣ Don’t share answers to common security questions like:
mother’s maiden name, high school, graduation date, mascot,
names of children, or pets.
‣ Be aware that hackers can find out personal information from
quizzes you answer.
‣ Be careful installing applications from sources you don’t trust.
‣ Avoid checking in from your GPS or posting your travel plans.
Want to Learn More? http://goo.gl/RZs8QW
Insider's Guide to Information Security and Avoiding Identity Theft
15
NEXT
Medical Identity Theft
‣ Medical identity theft occurs when a perpetrator uses a victim’s
Want to Learn More? http://goo.gl/WE4Dmq
name, health insurance information, or identifying information
to see a doctor, get prescription drugs, file a health insurance
claims, or get other care. Signs of medical identity theft include:
‣ A bill for medical services you didn’t receive.
‣ A call from a debt collector about a medical debt you don’t
owe.
‣ Medical collection notices on your credit report that you
don’t recognize.
‣ A notice from your health plan saying you reached your
benefit limit.
‣ A denial of insurance because your medical records show a
condition you don’t have.
Insider's Guide to Information Security and Avoiding Identity Theft
16
NEXT
Tax Return Identity Theft
Taxpayer Guide to Identity Theft
‣
Identity theft can also use personal information to file tax returns
to claim fraudulent refunds.
‣
In tax-related identity theft, the criminal generally will use a stolen
SSN to file a forged tax return and attempt to get a fraudulent
refund early in the filing season.
‣
You may be unaware that this has happened until you file your
return later in the filing season and discover that two returns have
been filed using the same SSN.
‣
In addition to the normal recovery procedures, the taxpayer
should complete Form 14039, Identity Theft Affidavit.
Insider's Guide to Information Security and Avoiding Identity Theft
Want to Learn More? http://goo.gl/MDWVk
17
NEXT
Are Identity Theft Losses Deductible?
‣ You can deduct losses related to identity theft
to the extent you are not reimbursed or
compensated for the loss.
‣ To
claim the deduction, complete IRS Form
4684, Casualties and Thefts. Part A is for
personal losses. Part B is for business losses.
‣ Keep meticulous records about the losses and
related expenses in case of audit.
Want to Learn More? http://goo.gl/M8FTWl
Insider's Guide to Information Security and Avoiding Identity Theft
18
NEXT
Child Identity Theft
‣ Children comprise the fastest-growing segment of identity theft
victims. There are approximately 500K cases of child identity theft
annually.
‣ Criminals target children as they have clean credit records, making it
easy for the criminal to create new accounts. Additionally, most
parents don’t check to see if their children have credit records, the
crime can go unnoticed for years.
‣ Many cases of child identity theft aren’t discovered until the child
applies for a driver’s license or first job.
‣ Child identity theft typically involves the creation of new accounts.
Want to Learn More? https://goo.gl/9w9uDz
According to the FTC, new account fraud causes considerably more
harm to victims in both out-of-pocket expense and the time it takes
to repair the damage.
Insider's Guide to Information Security and Avoiding Identity Theft
19
NEXT
Child Identity Theft
What to Look Out For
‣
‣
‣
‣
‣
‣
Want to Learn More? https://goo.gl/9w9uDz
‣
‣
Hospital records and physicians’ offices
School records
Day care centers
Library cards
Sports team applications
Online social networks, in which thieves coax information
from teens
Immunization records
Any type of public record where the child’s name, social
security number and date of birth are included
Insider's Guide to Information Security and Avoiding Identity Theft
20
NEXT
Put a Fraud Alert on Your Credit File
‣ Place
a fraud alert with the credit reporting
companies.
1-800-680-7289
http://goo.gl/qM47S6
‣ Get your free credit reports.
‣ Create
1-800-525-6285
http://goo.gl/VqNTN
an Identity Theft Report by filing a
complaint with the Federal Trade Commission
(https://www.ftccomplaintassistant.gov/) and your
local police department.
‣ Keep meticulous records and rigorously follow up
1-888-397-3742
http://goo.gl/mXzKo
with creditors and agencies.
Insider's Guide to Information Security and Avoiding Identity Theft
21
NEXT
Resources for Identity Theft Resolution
‣
The Federal Trade Commission is the primary
government agency for managing identity theft crimes. http://goo.gl/3ugBJ
‣
The United States Secret Service is responsible for
maintaining the integrity of the nation's financial
infrastructure and payment systems. http://goo.gl/JUfZ
‣
Local law enforcement agencies can help with filing
police reports, local investigations, and local resources.
‣
Private investigators and can be helpful in identifying
and finding perpetrators.
Insider's Guide to Information Security and Avoiding Identity Theft
22
NEXT
Identity Guard
Comprehensive identity theft protection and credit monitoring services.
Want to Learn More? http://goo.gl/IAxA
Identity Guard provides comprehensive credit and identity theft
prevention services that focus on:
‣ Monitor & Protect. They continually keep an eye out for
your personal information appearing where it shouldn’t. You
will be notified immediately in the event your identity or
credit is compromised.
‣ Recover. In the event your identity or credit is compromised,
they have a tools and services to help resolve the issue.
Additionally, they offer $1M in identity theft insurance.
‣ Credit Profiles. You can regularly get a copy of your credit
score and reports from all three major credit agencies.
Insider's Guide to Information Security and Avoiding Identity Theft
23
NEXT
Identity Theft & Passwords
Want to Learn More? http://goo.gl/WqNEm
‣
Email. Always use a separate and complex password
for your email. Never use it anywhere else.
‣
Password manager. Consider using a password
manager such as mSecure (https://
msevensoftware .com) or LastPass (https://
lastpass.com/).
‣
Password managers keep all your passwords
organized, secured, and stored in a single location.
‣
Easily generate long, highly complex passwords for
each individual website or service.
Insider's Guide to Information Security and Avoiding Identity Theft
24
NEXT
The Buck Stops with You
At the end of the day, you are
ultimately responsible for preventing,
detecting, stopping, resolving, and
managing your identity.
It’s your life.
Insider's Guide to Information Security and Avoiding Identity Theft
25
NEXT
Stephen M.Yoss, Jr., CPA
Feel free to call: (909) 694-0075
Send me an email:
[email protected]
Connect with me on
LinkedIn.
Insider's Guide to Information Security and Avoiding Identity Theft
26
NEXT
Thank you and good luck!
Thank for submitting your evaluation for this session.
Insider's Guide to Information Security and Avoiding Identity Theft
27
NEXT