1 00:00:06,810 --> 00:00:07,643 - [Instructor] Let's go over 2 00:00:07,643 --> 00:00:08,840 what is identity theft? 3 00:00:08,840 --> 00:00:10,660 And to go over this, 4 00:00:10,660 --> 00:00:14,260 I want to share a really amazing resource 5 00:00:14,260 --> 00:00:18,630 that the US government has in their website. 6 00:00:18,630 --> 00:00:22,740 So if you go to usa.gov/identity-theft 7 00:00:22,740 --> 00:00:24,620 as I'm showing in the screen, 8 00:00:24,620 --> 00:00:26,420 basically not only they define 9 00:00:26,420 --> 00:00:27,960 that identity theft happens 10 00:00:27,960 --> 00:00:30,550 whenever somebody steals your personal information 11 00:00:30,550 --> 00:00:31,783 to commit fraud. 12 00:00:31,783 --> 00:00:34,520 And I mean, of course they can use this information 13 00:00:34,520 --> 00:00:35,810 to do many different things, 14 00:00:35,810 --> 00:00:38,880 like apply for credit, file taxes, 15 00:00:38,880 --> 00:00:41,240 get medical services, and so on. 16 00:00:41,240 --> 00:00:43,930 But they also have different information 17 00:00:43,930 --> 00:00:46,810 about the warning signs of identity theft, 18 00:00:46,810 --> 00:00:49,090 potential victims of identity theft, 19 00:00:49,090 --> 00:00:51,590 and the types of identity theft, right? 20 00:00:51,590 --> 00:00:54,220 So I'm not gonna go into every single one of them in here. 21 00:00:54,220 --> 00:00:56,820 However, you know, it is very, very useful 22 00:00:56,820 --> 00:00:59,580 to actually know there's some early warnings 23 00:00:59,580 --> 00:01:02,800 that you may become aware 24 00:01:02,800 --> 00:01:04,650 to identify if somebody's potentially, 25 00:01:04,650 --> 00:01:08,310 you know, doing a social engineering attack 26 00:01:08,310 --> 00:01:10,900 for identity theft purposes, right? 27 00:01:10,900 --> 00:01:11,910 For example, you know, 28 00:01:11,910 --> 00:01:14,490 you could be a victim if you received some bills, 29 00:01:14,490 --> 00:01:17,944 even through the mail for items that you didn't buy. 30 00:01:17,944 --> 00:01:20,800 So I'm talking about not only email, 31 00:01:20,800 --> 00:01:22,616 but regular mail as well, right? 32 00:01:22,616 --> 00:01:25,780 Debt collections for accounts that you didn't open, 33 00:01:25,780 --> 00:01:28,500 denial for loans applications, 34 00:01:28,500 --> 00:01:30,870 in many cases, actually, nowadays 35 00:01:30,870 --> 00:01:33,274 if you are ordering something online 36 00:01:33,274 --> 00:01:34,680 and probably, you know, 37 00:01:34,680 --> 00:01:36,770 an attacker can impersonate, you know, 38 00:01:36,770 --> 00:01:39,750 some type of entity like Amazon, 39 00:01:39,750 --> 00:01:41,240 or, you know, eBay, or, you know, 40 00:01:41,240 --> 00:01:42,430 wherever you actually go 41 00:01:42,430 --> 00:01:45,730 and buy your goods and services from, 42 00:01:45,730 --> 00:01:47,870 they can then start 43 00:01:47,870 --> 00:01:51,670 either impersonating some type of bill 44 00:01:51,670 --> 00:01:54,520 or some type of error in an order, 45 00:01:54,520 --> 00:01:56,660 or even the ability for you to track an order. 46 00:01:56,660 --> 00:01:57,500 And then from there, 47 00:01:57,500 --> 00:02:00,200 steal your personal information to commit fraud. 48 00:02:00,200 --> 00:02:02,860 Now, anybody can be a victim of identity theft 49 00:02:02,860 --> 00:02:07,060 or a social engineering attack related to identity theft. 50 00:02:07,060 --> 00:02:09,660 However, children and seniors 51 00:02:09,660 --> 00:02:12,770 are the most vulnerable nowadays. 52 00:02:12,770 --> 00:02:14,740 As a matter of fact, we actually have a lot of resources 53 00:02:14,740 --> 00:02:17,430 in this website related to child identity theft, 54 00:02:17,430 --> 00:02:19,610 and also information that in many cases, 55 00:02:19,610 --> 00:02:22,200 senior share their personal information 56 00:02:22,200 --> 00:02:24,480 with doctors and caregivers, 57 00:02:24,480 --> 00:02:27,310 and attackers can impersonate, you know, 58 00:02:27,310 --> 00:02:29,370 those entities as well, right? 59 00:02:29,370 --> 00:02:31,460 Now there's different types of identity theft, 60 00:02:31,460 --> 00:02:34,100 there are tax ID thefts, medical ID thefts, 61 00:02:34,100 --> 00:02:35,560 social ID thefts. 62 00:02:35,560 --> 00:02:37,010 And there are others, 63 00:02:37,010 --> 00:02:39,760 depending on the geographical location that you reside. 64 00:02:39,760 --> 00:02:42,150 Of course, this is a US government site, 65 00:02:42,150 --> 00:02:44,150 so it's tailored to the US, 66 00:02:44,150 --> 00:02:47,310 but you may actually have similar resources 67 00:02:47,310 --> 00:02:49,800 and invite you to actually research a little bit, 68 00:02:49,800 --> 00:02:52,854 obtain information from your local government. 69 00:02:52,854 --> 00:02:55,110 Hopefully they have something similar than this. 70 00:02:55,110 --> 00:02:55,943 And if not, 71 00:02:55,943 --> 00:02:58,578 of course you can gather some really good, useful data 72 00:02:58,578 --> 00:03:00,540 from this site as well. 73 00:03:00,540 --> 00:03:03,110 Now, now this website also provides 74 00:03:03,110 --> 00:03:04,730 a lot of really good information 75 00:03:04,730 --> 00:03:06,760 on how to prevent identity theft. 76 00:03:06,760 --> 00:03:09,060 Some of these are very self explanatory, right? 77 00:03:09,060 --> 00:03:11,158 Never share your social security number. 78 00:03:11,158 --> 00:03:13,270 And if you're outside of the US, you know 79 00:03:13,270 --> 00:03:16,130 anything similar to a social security number 80 00:03:16,130 --> 00:03:20,180 or, you know, some government ID information, 81 00:03:20,180 --> 00:03:21,170 or birthdays, 82 00:03:21,170 --> 00:03:24,740 or bank accounts, you know, that's self explanatory. 83 00:03:24,740 --> 00:03:27,040 But also pay attention to your billing cycles, right? 84 00:03:27,040 --> 00:03:28,400 That's a really good one. 85 00:03:28,400 --> 00:03:29,846 They also go and suggest 86 00:03:29,846 --> 00:03:32,990 that you should update the firewall settings 87 00:03:32,990 --> 00:03:35,350 or any type of security tools 88 00:03:35,350 --> 00:03:37,890 that you may have installing your system. 89 00:03:37,890 --> 00:03:39,900 But also whenever you're in the public wifi, 90 00:03:39,900 --> 00:03:43,900 potentially you actually use a VPN to encrypt your traffic. 91 00:03:43,900 --> 00:03:46,190 And that actually allows you to protect 92 00:03:46,190 --> 00:03:48,240 also against man-in-the-middle attack. 93 00:03:48,240 --> 00:03:49,960 And you're gonna be learning about those 94 00:03:49,960 --> 00:03:52,490 a little bit later throughout the presentation 95 00:03:52,490 --> 00:03:54,040 and the course in here. 96 00:03:54,040 --> 00:03:55,730 Also review your credit card 97 00:03:55,730 --> 00:03:57,945 and bank account statements on a regular basis, right? 98 00:03:57,945 --> 00:04:01,920 These are all very well known best practices 99 00:04:01,920 --> 00:04:04,800 that of course, if you, you know, maintain it, 100 00:04:04,800 --> 00:04:06,738 and you follow them regularly, 101 00:04:06,738 --> 00:04:08,569 it will absolutely help you 102 00:04:08,569 --> 00:04:12,623 to prevent identity theft attacks, right? 103 00:04:13,530 --> 00:04:16,010 But again, this is a really good resource, 104 00:04:16,010 --> 00:04:18,237 at least from usa.gov 105 00:04:18,237 --> 00:04:22,970 that explains the threat of identity theft, 106 00:04:22,970 --> 00:04:26,053 and how to protect against those type of attacks.