Safeguarding Against Fraud and Identity Theft: Essential Tips

 
Protecting Private Information: Preventing Fraud and Identity Theft
 
 
Pete  Begin –  VP Senior Security Officer
Mascoma Bank
 
 
Pete Begin –  VP Security Officer
Mascoma Bank
 
 
19 years, Mascoma Bank, security and fraud
prevention.
 
24 years, Lebanon NH Police Department
 
Security and Fraud Prevention Liaison with local, state,
and federal agencies throughout New England.
 
Working and living in a time of fraud and identity theft . . .
Reducing the risk and taking precautionary steps.
 
Protecting NPPI
Non-Public Personal Information
 
Protecting NPPI
Non Public Personal Information
 
Tax ID Numbers, personal and business
 
 
Protecting NPPI
Non Public Personal Information
 
Tax ID Numbers, personal and business
 
Date of Birth
 
Tax ID Numbers, personal and business
 
Date of Birth
 
Bank Account and Credit Card Numbers
 
Protecting NPPI
Non Public Personal Information
 
How is NPPI accessed by identity thieves?
 
Line of Sight
Unlocked Computer Screens
Paper forms
 
Line of Sight
Unlocked computer screens
Paper forms
 
Phishing
Requests for seemingly harmless information
Telephone
Email
 
Line of Sight
Unlocked computer screens
Paper forms
 
Phishing
Requests for seemingly harmless information
Telephone
Email
 
Network and Computer Use
Unsecure networks, out of date software
Easy to guess passwords
Sending unsecure electronic information
Code and links embedded in email
 
Social Engineering
Definition: 
Social engineering
, in the context of
information security, refers to psychological
manipulation of people into performing actions
or divulging confidential information.
 
Social Engineering
Definition: 
Social engineering
, in the context of
information security, refers to psychological
manipulation of people into performing actions
or divulging confidential information.
 
Who might use social engineering to obtain NPPI?
 
Social Engineering
Definition: 
Social engineering
, in the context of
information security, refers to psychological
manipulation of people into performing actions
or divulging confidential information.
 
Who might use social engineering to obtain NPPI?
 
How do they access information?
 
Information Security
 
Best Practices -
How to set your sails to navigate around theft and fraud.
 
 - 
sometimes shortened to 
InfoSec
, is the practice of preventing
unauthorized access, use, disclosure, disruption, modification,
inspection, recording or destruction of 
information
. It is a
general term that can be used regardless of the form the data
may take (e.g. electronic, physical).
 
Information Security
 
Protecting Your Clients, Protecting Yourself.
 
Best Practices
How to set your sails to navigate around theft and fraud.
 
Make a plan, identify areas in your office that may be at risk.
BEC/Dual control/Follow the rules
 
 
 
 
Best Practices
How to set your sails to navigate around theft and fraud.
 
Make a plan, identify areas in your office that may be at risk.
 
Set expectations and support each other in staying aware,
    make taking steps to protect information natural and familiar.
 
 
 
 
 
Best Practices
How to set your sails to navigate around theft and fraud.
 
Make a plan, identify areas in your office that may be at risk.
 
Set expectations and support each other in staying aware,
    make taking steps to protect information natural and familiar.
 
Keep your radar up, who is around you?
 
 
 
 
 
Best Practices
How to set your sails to navigate around theft and fraud.
 
Make a plan, identify areas in your office that may be at risk.
 
Set expectations and support each other in staying aware,
    make taking steps to protect information natural and familiar.
 
Keep your radar up, who is around you?
 
Know your customer and your audience when at work
and in the community.
 
Best Practices
How to set your sails to navigate around theft and fraud.
 
Physical
 
Electronic
 
Phone and email inquiries
 
Vendors, third parties
 
Social Media, private and public forums
 
The many benefits of your commitment…
 
to protect NPPI
 
I invite any questions you have currently,
Thank you for your time and consideration.
 
Protecting Private Information: Preventing Fraud and Identity Theft
 
 
Pete Begin
Vice President, Senior Security and Fraud Prevention
Officer
 
Mascoma Bank
Lebanon NH
 
Peter.begin@mascomabank.com
(603) 443-8664
Slide Note
Embed
Share

Learn how to protect your private information and prevent fraud and identity theft with insights from Pete Begin, VP Senior Security Officer at Mascoma Bank. Discover crucial precautions to reduce the risk of NPPI exposure and understand how identity thieves exploit vulnerabilities like unlocked computer screens and phishing requests.

  • Fraud Prevention
  • Identity Theft
  • Private Information
  • Security Measures
  • Risk Reduction

Uploaded on Oct 02, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Protecting Private Information: Preventing Fraud and Identity Theft

  2. Pete Begin VP Senior Security Officer Mascoma Bank

  3. Pete Begin VP Security Officer Mascoma Bank 19 years, Mascoma Bank, security and fraud prevention. 24 years, Lebanon NH Police Department Security and Fraud Prevention Liaison with local, state, and federal agencies throughout New England.

  4. Working and living in a time of fraud and identity theft . . . Reducing the risk and taking precautionary steps.

  5. Protecting NPPI Non-Public Personal Information Image result for Private Information

  6. Protecting NPPI Non Public Personal Information Tax ID Numbers, personal and business

  7. Protecting NPPI Non Public Personal Information Tax ID Numbers, personal and business Date of Birth

  8. Protecting NPPI Non Public Personal Information Tax ID Numbers, personal and business Date of Birth Bank Account and Credit Card Numbers

  9. How is NPPI accessed by identity thieves? Image result for spying on information

  10. Line of Sight Unlocked Computer Screens Paper forms

  11. Line of Sight Unlocked computer screens Paper forms Phishing Requests for seemingly harmless information Telephone Email

  12. Line of Sight Unlocked computer screens Paper forms Phishing Requests for seemingly harmless information Telephone Email Network and Computer Use Unsecure networks, out of date software Easy to guess passwords Sending unsecure electronic information Code and links embedded in email

  13. Social Engineering Definition: Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.

  14. Social Engineering Definition: Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. Who might use social engineering to obtain NPPI?

  15. Social Engineering Definition: Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. Who might use social engineering to obtain NPPI? How do they access information?

  16. Information Security Best Practices - How to set your sails to navigate around theft and fraud.

  17. Information Security Protecting Your Clients, Protecting Yourself. - sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical).

  18. Best Practices How to set your sails to navigate around theft and fraud. Make a plan, identify areas in your office that may be at risk. BEC/Dual control/Follow the rules Image result for Blue lock and key

  19. Best Practices How to set your sails to navigate around theft and fraud. Make a plan, identify areas in your office that may be at risk. Set expectations and support each other in staying aware, make taking steps to protect information natural and familiar.

  20. Best Practices How to set your sails to navigate around theft and fraud. Make a plan, identify areas in your office that may be at risk. Set expectations and support each other in staying aware, make taking steps to protect information natural and familiar. Keep your radar up, who is around you?

  21. Best Practices How to set your sails to navigate around theft and fraud. Make a plan, identify areas in your office that may be at risk. Set expectations and support each other in staying aware, make taking steps to protect information natural and familiar. Keep your radar up, who is around you? Know your customer and your audience when at work and in the community.

  22. Best Practices How to set your sails to navigate around theft and fraud. Physical Image result for Blue lock and key Electronic Phone and email inquiries Vendors, third parties Social Media, private and public forums

  23. The many benefits of your commitment to protect NPPI

  24. I invite any questions you have currently, Thank you for your time and consideration.

  25. Protecting Private Information: Preventing Fraud and Identity Theft Pete Begin Vice President, Senior Security and Fraud Prevention Officer Mascoma Bank Lebanon NH Peter.begin@mascomabank.com (603) 443-8664

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#