WEEk 1
WEEk 1
Data and information protection is the most technical and tangible of the three pillars. The data we
gather comes from multiple sources, such as information technology (IT), operational technology
(OT), personal data and operational data. It must be properly managed and protected every step of
the way.
11 Ways to Protect Your Personal Information Online
If you were to leave your smartphone in a coffee shop or taxi, would the person who found it be
able to access what’s on it? That’s a scary scenario. Losing your smartphone is one thing, but
giving the finder access to everything from your email and social media accounts to all the
personal information you may have stored on the device could play havoc with your life. Make
sure to use a passcode to help keep your apps, accounts, and personal information protected. Do
the same for your laptops and even desktop computers.
Create strong and unique passwords for your online accounts
If you have an online account with a company that suffered a data breach, ideally, that one
account is your only concern. But if you use the same login credentials on other accounts, then
that single breach incident could give hackers access to your other accounts, as well. That’s why
it makes sense to use a unique password for each of your online accounts.
If you’re like me and have way too many sets of online credentials to commit to memory,
consider using a password manager to keep track of those many, unique passwords. There are
several out there with different prices and plans, but it shouldn’t take you too long to figure out
which one works best for you. Just do an Internet search for “password managers” and see what
suits your needs.
Limit social media sharing
Sharing too much on social media may put your personal information in the wrong hands. Pay
attention to not only the pictures and posts you share, but also to your privacy settings, as well,
so that you’re limiting the number of people who can see what you’re sharing. The Center for
Identity at the University of Texas offers tips for managing privacy settings on a variety of
social media platforms. If your kids are on social media, you may also want to check their
privacy settings. And when it comes to posting, make sure they understand what’s safe to share
—and what’s not.
Be wary of free Wi-Fi
You get what you pay for, right? Free public Wi-Fi is a good example. Sure, it’s convenient, but
in terms of security, most free public Wi-Fi networks don’t offer much. That means, with the
right tools, anyone else on the same Wi-Fi network could be “eavesdropping” on your online
activity. Given that, would you want to log in to your bank account or enter a credit card number
while on public Wi-Fi? The answer is, no!
Even a password-protected Wi-Fi network is only as safe as the people who have the password.
Save transactions for when you’re on a secure network, perhaps at home. If you must log in or
transact online on public Wi-Fi, use a VPN (virtual private network), which encrypts your
activity so that others on the same network can’t easily see what you’re doing.
Close unused accounts
Think about all of the online accounts you’ve opened over time. Now, consider which ones are
still open, but that you never use. If there’s a breach involving one of those entities, hackers may
have access to whatever personal information is tied to that account. An old email account, for
instance, could be holding any number of past bank statements and healthcare forms—and those
documents may be filled with personal data that could lead to identity theft. Invest some time in
identifying unused online accounts and, then, shutting them down. The less personal information
you have stored online, the better.
No one can prevent all identity theft, but by using these tips, you’ll help keep your personal
information a little more “personal” online—and in this digitally connected age, that’s something
to strive for.
ONLINE IDENTITY
Our online identity is all the information we leave on the Internet. It’s our digital footprint, with
such details as our email address, date of birth, bank details, and even our purchasing habits
on online stores.
Online identity goes beyond what we do online. It also verifies that we are who we say we are.
From traditional passwords to facial recognition and fingerprints, we have many ways
to identify ourselves online.
1. Protect our devices and data: Only browse websites that begin with “https”. If you need to
sign up to anything, use passwords that are hard to crack.
2. Be discrete on and offline: Avoid sharing personal or confidential information, especially on
social media. You can also check your accounts and profiles’ privacy and security settings.
3. Think before clicking or responding: Be wary of surprise emails and messages that ask you
to click a link, download a file, give confidential information or carry out other actions.
4. Keep your passwords safe: Passphrases of three or more words are much more unbreakable.
Never share them.
5. If it looks off, report it: Organizations’ cyber security teams can cut off or stifle an attack if
we let them know of a possible threat early.
A security suite is a collection of tools that prevent malicious software from compromising your data. It
offers anti-theft features such as anti-spam, website authentication, password storage, and spam
detection to prevent sensitive data exposure and data breach.
Norton Antivirus, McAfee, and AVG Internet Security are just a few well-known examples of security
suites that you can use to protect yourself online.
Confirming that applications are encrypted before making transactions online helps secure your identity.
For a start, you need to look out for the most trusted security lock symbol; the extra "s" after internet
protocol HTTP in the URL or web address bar.
This means that "HTTP" becomes "HTTPS" on a secure credit card website. You'll also see a lock icon
in your browser's address bar or bottom-left corner. These two signals show that the site is encrypted,
and no one can view the information provided to the owner. Encryption protects your identity, phone
number, address, payment card number, etc.
Another way to stay safe online is by creating a strong password. When creating a password, it's
crucial to select a passphrase that hackers can't guess easily.
For example, it's not a good idea to use a word or number that someone else can easily associate with
you, such as your first name, the name of your spouse or child, phone number, or any other characters or
symbols that can be used to identify you.
To protect yourself, choose a password with a mixture of letters, numbers, and symbols, as well as
uppercase and lowercase versions of the same number. You can also leverage password managers for
more security. It'll help you generate and store passwords, providing additional protection against
unauthorized access.
Password managers like NordPass and 1Password are some well-known password managers.
Have you ever encountered the display message, "this site may harm your computer"? This is a warning
display message that shows that the site you are about to access is blacklisted.
A web browser blacklist is a basic access control mechanism that blocks malicious attempts of hackers
from accessing your email addresses, user logins, and passwords. When you add a website or email
address to a blacklist, it means that they are potentially dangerous and not secure for visiting.
Blacklisting is an efficient method for keeping you safe from visiting websites or links that may cause
significant damage to your files. So, you must blacklist sites that show signs of phishing.
Private data protection is an additional layer of cybersecurity that keeps sensitive information away from
the public space. The privacy data protection suit keeps your data within your network and prevents
external access.
You'll be notified if unauthorized users try to get into your network. And until you grant them access,
their efforts will be in vain.
Cookies are little text files that enhance your surfing experience by allowing websites to remember your
browsing preferences. Cookies also make it possible for you to visit select websites without having to
sign in each time you visit.
Unfortunately, hackers can use the information obtained by these cookies to wreak havoc on your
company's computer infrastructure. This is because when cookies are enabled on a website, that site will
be able to track your browsing patterns on other websites. So, don't enable cookies on a site until you are
sure it's necessary.
There are several reasons why you should consider deleting cookies from your browser. They pose a
risk to your network as they could enable cybercriminals to gain access through accessing your browser
sessions.
Cookies can track your data, including search and browsing history, IP addresses, and other online
interactions.
Public Wi-Fi connections are open to just about anyone, and malicious actors can easily infiltrate them.
Hackers understand that many users connect to public Wi-Fi, and they devise means to break into
connected devices.
Make it a rule to steer clear of public internet connections, especially when you can't vouch for their
security. In situations where you have no choice but to utilize free access to the public internet, avoid
inputting anything that could compromise your identity.
You can also choose a secure Virtual Private Network (VPN) for browsing while you're away from
home. The information you send and receive will be encrypted, making it much harder for
cybercriminals to tap into them.
With the rise of social media apps such as TikTok, Twitter, Instagram, Discord, and Twitch, many users
are caught in the cycle of sharing too much personal information over the web. Most of the time, the
pieces of information users share on these social platforms lead to invasion of privacy and identity theft.
Be mindful of what you share with the online audience. If you don't post your personal details, attackers
won't have much information about you to work with. Data such as your home address, social security
number, credit card details, and bank information should be off limits.
Another way to secure your online identity against cyber threats is to limit your credit card use for
online shopping and general payments on third-party sites. But if you must shop online, be mindful
of online shopping security threats and how to prevent them.
How reputable is the store you are shopping on? Stores with a reputation put extra security measures in
place to secure their customers. When a site asks for your personal or financial information, look for
"HTTPS" in the URL to verify the site's safety and privacy.
Your identity is a huge part of who you are as a person. Protecting it is the same thing as protecting
yourself. As long as you know the potential indicators of identity theft, you'll have a better chance of
nipping it in its early stages, allowing you to continue enjoying the time you spend online.
So, keep yourself up to date with emerging cyber threats that endanger your identity online and
implement the necessary measures to stay safe.
Data storage security involves protecting storage resources and the data stored on them
– both on-premises and in external data centers and the cloud – from accidental or
deliberate damage or destruction and from unauthorized users and uses. It’s an area that
is of critical importance to enterprises because the majority of data breaches are
ultimately caused by a failure in data storage security.
Secure data storage applies to data at rest stored in computer/server hard disks, portable
devices – like external hard drives or USB drives – as well as online/cloud, network-
based storage area network (SAN) or network attached storage (NAS) systems.
Data protection is more about making sure data remains available after less nefarious
incidents, like system or component failures or even natural disasters.
But the two overlap in their shared need to ensure the reliability and availability of
information, as well as in the need to recover from any incidents that might threaten an
organization’s data. Storage professionals often find themselves dealing with data security
and data protection issues at the same time, and some of the same best practices can
help address both concerns.
Threat agents can be divided into two categories: external and internal.
Nation states
Terrorists
Hackers, cybercriminals, organized crime groups
Competitors carrying out “industrial espionage”
Internal threat agents include:
Malicious insiders
Poorly trained or careless staff
Disgruntled employees
Other threats include:
Storage Vulnerabilities:
Another huge driver of interest in data storage security is the vulnerabilities inherent in
storage systems. They include the following:
Lack of encryption — While some high-end NAS and SAN devices include automatic
encryption, plenty of products on the market do not include these capabilities. That
means organizations need to install separate software or an encryption appliance in
order to make sure that their data is encrypted.
Cloud storage — A growing number of enterprises are choosing to store some or all
of their data in the cloud. Although some argue that cloud storage is more secure
than on-premises storage, the cloud adds complexity to storage environments and
often requires storage personnel to learn new tools and implement new procedures
in order to ensure that data is adequately secured.
Incomplete data destruction — When data is deleted from a hard drive or other
storage media, it may leave behind traces that could allow unauthorized individuals to
recover that information. It’s up to storage administrators and managers to ensure
that any data erased from storage is overwritten so that it cannot be recovered.
Lack of physical security — Some organizations don’t pay enough attention to
the physical security of their storage devices. In some cases they fail to consider that
an insider, like an employee or a member of a cleaning crew, might be able to access
physical storage devices and extract data, bypassing all the carefully planned
network-based security measures.
1. Data storage security policies — Enterprises should have written policies specifying
the appropriate levels of security for the different types of data that it has. Obviously,
public data needs far less security than restricted or confidential data, and the
organization needs to have security models, procedures and tools in place to apply
appropriate protections. The policies should also include details on the security
measures that should be deployed on the storage devices used by the organization.
2. Access control — Role-based access control is a must-have for a secure data storage
system, and in some cases, multi-factor authentication may be appropriate.
Administrators should also be sure to change any default passwords on their storage
devices and to enforce the use of strong passwords by users.
3. Encryption — Data should be encrypted both while in transit and at rest in the
storage systems. Storage administrators also need to have a secure key management
systems for tracking their encryption keys.
4. Data loss prevention — Many experts say that encryption alone is not enough to
provide full data security. They recommend that organizations also deploy data loss
prevention (DLP) solutions that can help find and stop any attacks in progress.
5. Strong network security — Storage systems don’t exist in a vacuum; they should be
surrounded by strong network security systems, such as firewalls, anti-malware
protection, security gateways, intrusion detection systems and possibly advanced
analytics and machine learning based security solutions. These measures should
prevent most cyberattackers from ever gaining access to the storage devices.
6. Strong endpoint security — Similarly, organizations also need to make sure that
they have appropriate security measures in place on the PCs, smartphones and other
devices that will be accessing the stored data. These endpoints, particularly mobile
devices, can otherwise be a weak point in an organization’s cyberdefenses.
7. Redundancy — Redundant storage, including RAID technology, not only helps to
improve availability and performance, in some cases, it can also help organizations
mitigate security incidents.
8. Backup and recovery — Some successful malware or ransomware attacks
compromise corporate networks so completely that the only way to recover is to
restore from backups. Storage managers need to make sure that their backup
systems and processes are adequate for these type of events, as well as for disaster
recovery purposes. In addition, they need to make sure that backup systems have the
same level of data security in place as primary systems.
Secure data storage applies to data at rest stored in computer/server hard disks, portable
devices – like external hard drives or USB drives – as well as online/cloud, network-based
storage area network (SAN) or network attached storage (NAS) systems.
Every time we interact on the Internet we are generating loads of data: when you purchase,
take photos or videos and upload them to Dropbox or similar servers. When posting things
on Facebook, Instagram or Twitter or when using the Cloud (OneDrive, Google Drive, etc.).
When you use your email accounts and obviously when you move around with your
smartphone location tracking your movements or measuring your activity in a Fit app.
An initial distinction can be drawn depending where the data is physically stored. If it is stored
in the organisation’s own systems it is known as On-Premises data. On the other hand, if it is
stored with a service provider it will be located on the Cloud.
On-Premise
This is data stored by the organisations responsible for managing the data in physical systems
located on their Data Centers. This requires the organisation to have in-house servers,
software licences, qualified IT personnel and system maintenance and updates.
This option is ideal for storing sensitive user data or where required by the regulations.
Cloud
Gartner predicts that by the 2025, 80% of enterprises will shut down their traditional Data
Centers and also that Data Center is almost dead. Furthermore, according to the latest report
by Canalys, in 2018 spending in the worldwide cloud infrastructure market grew by
46.5%. This means that more and more businesses are considering the option of moving their
systems, and therefore their data, to the cloud.
Cloud service providers usually offer:
There are countries where data is regulated by laws governing their protection and use. In
the Euro zone we have the General Data Protection Regulation (GDPR), which regulates
the processing of personal data by individuals, businesses and organisations in the
European Union (EU).
? A couple of month ago also came into force and applies accross the EU the law PSD2: what
is it and how it affect you?
It is very important to consider where our data goes when we upload it to the Internet. A
recent example is the viral sensation FaceApp, which after uploading a photo of your face
simulates what you will look like when you get older. Many people did installed it and
celebrities even appeared on TV using the app.
But when you stop and read the fine print, you realise that you are granting your personal
data, in this case a photo of yourself, to the Russian company Wireless Lab. The terms and
conditions specify that they are not governed by the GDPR and accordingly we have no
idea what they are doing with our data or who is receiving it. Nor does it indicate how to
delete the data, as is the case with other apps like Facebook.
This data is very useful for training of facial recognition algorithms based on massive
databases of anonymous faces, a necessary step for Artificial Intelligence (AI) to be able to
read faces.
Accordingly, the only sure-fire way to know that the law protects your data is to read
the terms and conditions you agree to when entering your personal data.
While the Your Things Scorecard is not exhaustive, it launches an approach that
gives consumers more quantified insight into the data security requirements
they should look for when making their world smarter, allowing them to better
asses the risks associated with their IoT devices.
1. Smart TVs: With a click of a button or by the sound of our voice, our favourite shows will play,
pause, rewind ten seconds, and more – all thanks to smart TVs and streaming devices.
Although a great way to enjoy entertainment, it’s also a breeding ground for cyber-attacks; but
how do they do it? By infecting a computer or mobile device with malware, a cybercriminal could
gain control of your smart TV if your devices are using the same Wi-Fi.
2. Voice Controlled Assistants: Voice-controlled assistants and smart speakers are always
listening and, if hacked, could gain a wealth of information about you. Often used as a central
command hub, connecting other devices to them (ie. smart speakers, smart lights, security
cameras, refrigerator or smart locks). Some people even opt to connect accounts such as food
delivery, driver services, and shopping lists that use credit cards. If hacked, someone could gain
access to your financial information or even access to your home.
3. Connected Cars: Today, cars are essentially computers on wheels. Between backup cameras,
video screens, GPS systems, and Wi-Fi networks, they have more electronics stacked in them
than ever. Despite the advancements in technology, these remain access points for an attacker.
In fact, an attacker can take control of your car a couple of ways; either by physically implanting
a tiny device that grants access to your car through phone or by leveraging a black box tool and
your car’s diagnostic port completely remotely. Hacks can range anywhere from cranking the
radio up, to cutting the transmission or disabling the breaks.
4. Connected Baby Monitors: When you have a child, security and safety fuels most of your
thoughts. While smart baby monitors are helpful, they are also an easy target for cybercriminals.
5. Cell Phones: In any given day, we access financial accounts, check work emails and
communicate with family and friends. That’s why it’s shocking to know how surprisingly easy it
is for cybercriminals to access personal data on your cell phone. Phones can be compromised
in a variety of ways, here are a few: accessing your personal information by way of public Wi-Fi
(say, while you’re at a coffee shop using free Wi-Fi), implanting a bug, leveraging a flaw in the
operating system, or by infecting your device with malware by way of a bad link while surfing the
web or browsing email.
1. Change the default username and password. Always remember to change your passwords
regularly.
2. Stick with protected devices only.
3. Set up a guest Wi-Fi network.
4. Set up two-factor authentication.
5. Stay on-top of software updates.
6. Never manage your smart devices from public Wi-Fi networks.
7. Disable unnecessary features.
8. Use biometric authentication.
9. Secure your network fully and make sure you have a firewall.
10. Rename and reboot your router regularly.
Security for smart home devices is as critical as security on laptops and smartphones – and
because many are less user-friendly when it comes to customizing settings, it can take far
more effort to get right. While there’s absolutely no doubt that smart home/IoT devices make
life easier, our everyday items are extremely hackable.
Threats to smart devices are real. Here are the most common ones you
need to know about.
Hackers
Lack of security
Some of the features that make your smart devices convenient – like
geolocation, microphones, and cameras – may seem innocent enough
when in use.
KLE’S C.I.Munavalli, CS dept 20
5TH SEM SYLLABUS WEEK 1
Conclusion
Smart devices are like having a cool new best friend. They know a
bunch of new tricks and tips that you didn’t even know existed until
you met them, introducing you to a whole new way of doing things.
But smart devices, exciting and innovative as they are, have the
potential to pose new dangers and risks to your personal data. By
educating yourself on how to keep them safe from cyber attacks, you
can spend more time discovering new adventures together and less
time worrying about online threats.
Some hackers focus only on gaining notoriety or defeating computer systems, and some
could even have criminal intentions. The knowledge gained by these hackers and the self-
esteem boost that originates from successful hacking could become an addiction and a way
of life. Some hackers just aim at making your life miserable, whereas others just want to be
seen or heard. Some common reasons for hacking include basic bragging rights, curiosity,
revenge, boredom, challenge, theft for financial gain, sabotage, vandalism, corporate
espionage, blackmail, and extortion. Hackers are known to regularly cite these reasons to
explain their behavior.
Very often, hackers steal data to assume your identity and then use it for something else like
taking a loan, transferring money, etc. The occurrence of such incidents has increased after
mobile banking and Internet banking started to gain popularity. With the growth of mobile
devices and smartphones, the potential for monetary gain via hacking has also increased.
code can be one of the first steps in turning a user's computer into a zombie or bot.
Thus, the very aspect of possessing unprecedented access can lead to an unlimited
number of suspicious activities that a hacker can accomplish without even a trace of
being caught.
Data breaches
Malware
DDoS
SEO hacks
Web scrapers
Website defacement
Spam email attacks
OWASP Top 10 Security Risks
With cWatch you will be able to prevent an attack even before it could reach the network,
thus helping you to save time and cost. This web security tool achieves this with the help of
its key features which have been discussed below:
Malware Monitoring and Remediation: Detects malware, provides the methods and
tools to remove it, and helps to prevent future malware attacks.
Cyber Security Operations Center (CSOC): A team of always-on certified
cybersecurity professionals providing 24x7x365 surveillance and remediation
services.
Security Information and Event Management (SIEM): Advanced intelligence that
can leverage current events and data from 85M+ endpoints and 100M+ domains.
PCI Scanning: This scanning enables service providers and merchants to stay in
compliance with the Payment Card Industry Data Security Standard (PCI DSS).
Identity theft
Identity theft happens when someone steals your personal information to commit fraud.
This theft is committed in many ways by gathering personal information such as transactional
KEY TAKEAWAYS
Identity theft occurs when someone steals your personal information and
credentials to commit fraud.
There are various forms of identity theft, but the most common is financial.
Identity theft protection is a growing industry that keeps track of people's
credit reports, financial activity, and Social Security Number use.
Victims of identity theft often do not know their identity has been stolen until they
begin receiving calls from creditors or are turned down for a loan because of a bad
credit score.
The fraudster may use the child's name and Social Security Number to obtain a
residence, find employment, obtain loans, or avoid arrest on outstanding warrants.
Often, the victim is a family member, the child of a friend, or someone else close to
the perpetrator. Some people even steal the personal information of deceased
loved ones.1
Identity theft is a major problem in the United States. According to consulting firm Javelin
Strategy & Research, 13 million consumers fell victim in 2019—and it cost them $3.5
billion in out-of-pocket costs.
With technology evolving so rapidly, fraudsters now have more opportunities than ever
before to access your private data for their own gain. Safeguarding sensitive information can
help protect you from becoming a victim. In addition to being proactive, knowing how to
spot fraudulent activity that's already occurred can help you prevent further damage and
potentially regain your losses.
There are many different types of identity theft and fraud, including some lesser-known
schemes that could wreak havoc on your financial life if undetected. Here's what to look out
for and, most important, what to do if it happens to you.
Since criminals need access to your user credentials to break into your accounts and
impersonate you online, keeping this information safe is vital. This involves creating strong
passwords that are unique to each of your accounts. Opting for two-factor authentication and
using a VPN when accessing public Wi-Fi can add an extra level of security.
If you think you've been the victim of an account takeover, change your passwords
(especially if you use the same one for multiple accounts) and contact customer support to
see what recourse you may have. Many services allow you to see a list of devices your
account has been logged in from, and shut down any log-in instances that may seem
suspicious. If, for example, your bank account shows a log-in session from an iPhone in
Florida and you're an Android user living in Los Angeles, it's possible your account has been
compromised.
The good news is that many card issuers have systems in place to help prevent and identify
credit card fraud before it results in long-term harm. If you suspect this type of identity theft,
contact your card provider as soon as possible to prevent more unauthorized charges. Most
won't hold you accountable for charges you didn't authorize.
Once your driver's license number is in someone else's hands, a criminal could falsely use it
during a traffic stop to avoid a citation—which means it could end up on your driving
record. It's a form of criminal identity theft that could even result in an erroneous warrant for
your arrest. If your license goes missing, report it to the police and the DMV.
a coffee shop. Hackers can set up seemingly legitimate networks with the intention of
stealing the information of anyone who connects. That's why it's always smart to shop, do
your banking and handle any other sensitive information on a private Wi-Fi network you
trust.
Another form of this type of fraud involves compromising the website itself and gaining
access to accounts that way, either by stealing customer information or redirecting them to a
phony website. Pay close attention to the URL of the website you're using, and check to see
if the website is secure before entering your credit card information. Misspellings, low-
quality images or too-good-to-be-true deals may also be red flags for fraud. If you're
skeptical, don't go through with a purchase, or find it from another retailer you can trust.
When periodically checking your credit reports, check your identifying information closely.
Variations of your Social Security number will be listed. Names, addresses or other
identifying information you don't recognize could be signs of fraud. Those who've been
victimized can report it to the Social Security Administration and also notify their state's tax
office.
pose as grandchildren who are in trouble and need money. The Federal Trade Commission
reports that older consumers who experience fraud typically incur greater financial losses
than younger folks. Warning the seniors in your life about these scams can help prevent
them from being victimized.
Beware of any communication from someone posing as an IRS official requesting private
information. The IRS will never contact you in person or by phone or email without first
sending notice through the mail. If you've been the victim of tax identity theft, you'll want to
fill out an Identity Theft Affidavit with the IRS.
Biometric ID Theft
Biometric ID theft is a very real form of fraud that involves stealing or spoofing a person's
physical or behavior characteristics to unlock a device—think facial or voice recognition to
unlock your phone, or to tap into your other devices. Biometric ID theft can be a goldmine
KLE’S C.I.Munavalli, CS dept 30
5TH SEM SYLLABUS WEEK 1
for hackers, who can gain access to digital wallets and loads of private information. To
protect yourself from this type of identity theft, update your devices as recommended. Also
be sure your biometric data is being stored securely and safely by a company that requests it.
If it isn't, opt out.
From there, criminals can open new accounts, apply for credit, receive auto loans and
commit other types of financial crimes. If you start to receive mail or phone calls asking
about new credit accounts, or you get mail addressed to a different name, these could be
signs of synthetic ID theft.
No matter how it happens, medical identity theft could result in bills for medical services,
prescriptions or goods you never requested or received. Making a habit of reviewing your
medical claims can help you spot fraud and take steps to remedy it. This involves filing a
police report and contacting your insurer and medical providers to correct your medical files.
You can also consider filing a health privacy complaint with the U.S. Department of Health
& Human Services online or by calling 800-368-1019. If you suspect Medicare fraud, you
can report it to 800-HHS-TIPS.
Mortgage Fraud
Mortgage fraud doesn't just apply to buyers and sellers who lie on their mortgage
applications. It can also occur if an identity thief steals a homeowner's Social Security
number or comes across their mortgage account number. With this information, it might be
possible to take out a home equity line of credit or second mortgage, then make off with the
money. If it happens to you, contact your mortgage lender immediately. Learn different
ways to detect and avoid mortgage fraud.
Everything from smartphones to household appliances to cars are now synced up to the
internet and linked to one another. Smart devices that can tell you your day's schedule while
you brush your teeth, for example, are certainly convenient, but this so-called internet of
things (IoT) has also created a new vulnerability point for hackers to exploit. This type of
identity theft occurs when someone exploits a security flaw in an internet-connected device
to gain access to your personal data. Since devices are almost always connected to important
user accounts (such as your email), each device potentially represents an entry point for a
hacker.
If you use these devices, be sure to periodically check your financial statements and credit
reports for signs of fraud. If you spot something fishy, change your passwords on all
internet-connected devices as soon as possible. Secure your home's wireless network with a
secure password, and make sure all smart devices use the network you've set up. Or, you
may decide that these devices aren't worth the risk, and avoid bringing them into your home
altogether.
File a police report after identity theft, which is important to protect yourself if an ID
thief starts using your information to commit crimes. Get copies of the police
report—you may be asked for them when notifying your insurer, medical
providers, the credit bureaus and others that you have been victimized.
File an identity theft complaint with the Federal Trade Commission online or call the
FTC's toll-free hotline at 877-IDTHEFT (438-4338).
There are all kinds of identity theft and fraud—and innocent consumers are unfortunately
easy prey if they aren't paying attention. Staying on top of your credit is crucial. Experian
allows you to pull your credit report at no charge to help you spot potential identity fraud
sooner. Detecting threats and responding to them quickly is the best way to safeguard your
financial life.
Some clear indicators of identity theft include bills for items that you didn't buy;
these can be seen on your credit card or received via email or other means, calls
from debt collectors regarding accounts that you didn't open, and your loan
applications being denied when you believed your credit is in good standing.
Other warning signs include bounced checks, a warrant for your arrest,
unexplainable medical bills, utilities being shut off, inability to sign into accounts,
hard inquiries into your credit report not caused by your actions, and new credit
cards in your name that you didn't apply for.
Children may be victims of identity theft but not aware of it until they are adults.
Seniors often provide a lot of information to hospitals, caregivers, and doctor's
officers, where information can be obtained by those seeking to commit fraud.
KLE’S C.I.Munavalli, CS dept 34
5TH SEM SYLLABUS WEEK 1
If you believe you are a victim of identity theft, start by going to IdentityTheft.gov, a
website administered by the Federal Trade Commission (FTC). It provides
directions on how to help you recover your identity and repair any damage you
have experienced.
There are several identity theft protection services that help people avoid and
mitigate the effects of identity theft. Typically, such services provide information
helping people to safeguard their personal information; monitor public records and
private records, such as credit reports, to alert their clients of certain transactions
and status changes; and provide assistance to victims to help them resolve
problems associated with identity theft.
You can start by placing fraud alerts on all of your credit reports as well as freezing
your credit reports. Fraud alerts are an added layer of protection in that lenders
must confirm your identity before opening an account, usually via phone. Freezing
your reports prevents access to any credit information. Your credit report is
removed from circulation so that a lender will not have access to it. If they don't
have access to your report, they cannot open an account in your name.
Once you've managed the above, you need to contact all of the companies
involved. Demonstrate to companies that you are a victim of identity theft, that you
did not open these accounts, and that your accounts should be frozen.
You can demonstrate that you are a victim of fraud by filing complaints, disputing
charges, and showing any other reports you have filed, such as police reports or
reports with the FTC. The Fair Credit Billing Act and the Electronic Funds Transfer
Act work in your favor. You must also dispute any incorrect charges and
information on your credit reports as well.
This should be done once you have the report that you filed with the FTC. Banks
and credit card companies should close your old cards and send you new ones,
and you should change all of your login and password information.
From there, continue monitoring your reports to ensure that your information is no
longer available for thieves to use.
If you have detected that you are a victim of fraud, there are ways to dispute the
charges, fix the theft, and stop your information from being available to thieves. The
government provides many resources to help you get back to a good credit
standing.
Defence in depth
Cyber security, the new No. 1 priority for businesses
Cyber security has become a key area in all business sectors, particularly for companies that
store data. Security mismanagement can lead to very serious economic losses, as well as
affecting a company’s reputation.
Cyber crime can have a significant negative impact on your life or business if
proper precautions are not taken to prevent it.
Secure your networks and databases
Protect your networks by setting up firewalls and encrypting information. This
will help minimize the risk of cyber criminals gaining access to confidential
information. Make sure your Wi-Fi network is hidden and the password
protected. Make sure to be selective of the information that is being stored in
the company databases. Databases can be a great means for companies to
have a central location of data and documents, but this does not mean it is
favorable to store any and all information. Automatic backing up of company
data should be set to be completed either once a day or once a week,
depending on the level of activity within your company. Backing up your
company’s data will increase the likelihood that with a cyber attack, your
company’s data will not be lost completely, which is all too common.
Educate your employees
Talk to your employees about their role in securing and protecting the
information of their colleagues, customers, and the company. Have policies set
in place so they know what practices are acceptable and unacceptable. Limit
the number of users within the company who will have administrative access.
This will minimize the amount of programs they will be able to download,
therefore, minimizing the risks of downloading viruses and malicious software
Create security policies and practices
Establish practices and policies to protect your company from cyber attacks
and provide guidelines for resolving issues if they arise. Make sure to outline
how situations will be handled and the consequences if an employee violates
the policies. Control physical access to company devices and dispose of them
properly. Prevent access to company computers and handheld devices from
unauthorized users. Laptops and cellphones are easy targets for cyber theft
since they can be misplaced easily or stolen quickly. Reset devices that are
being disposed of back to factory setting. Never get rid of a cellphone or laptop
without completing this step. Failure to do so could result in company
information winding up in the hands of the cyber criminal.
Know how to distinguish between fake antivirus offers
and real notifications
Train your employees to be able to recognize fake antivirus warning messages
and alert IT as soon as they notice anything questionable occurring (if
necessary). Make sure your company has a policy in place for the steps to be
taken should an employee’s computer become infected with a virus. Malware is
a sneaky program that can obtain information by making its way onto devices
via the Internet, social media, email, attachments, and downloads. For
example, key-logging malware can track everything the user types on their
keyboard. This means cyber criminals could access bank accounts, customer
information, passwords, and other company-sensitive information. Make sure
to keep your security software up-to-date to help prevent malware from
sneaking onto your system and networks.
Inform your customers
Let your customers know the reasons why you collect their personal
information and what it is used for. Assure them that your company will not
request any sensitive information such as their social security number or their
bank account information over unprotected methods of communication, such
as through text message or email. Ask them to report suspicious
communications.