Understanding and Ways of Dealing with Identity Theft

identity_theft_basics

Identity theft is a serious area of cybercrime. In simple terms, identity theft, as the term suggests, is committed when a cyber thief impersonates a person’s identity and obtains important personal information such as Social Security Number, health records or debit or credit card details, and opens a financial account or starts spending using the victim’s information. When identity theft happens, people realize that the money in the bank account or credit cards is siphoned off. More often than not, this realization dawns only after the theft is carried out.

A perspective of the seriousness of this issue can be had from these statistics:

  • The government-run Bureau of Justice Statistics (BJS) states that in 2014, over 17.5 Americans became victims of identity theft. It is estimated that the loss from these thefts crossed $16 billion
  • One identity theft happens in less than every two seconds in the US
  • 13 percent of the 2.5 million complaints that the Federal Trade Commission (FTC) heard in 2014 were related to identity theft
  • In that year, as many 86 million healthcare records were exposed as a result of identity theft.
  • Students are most likely to have their details stolen

With organizations having to deal with an assortment of confidential, finance-related information about their employees, such as payroll and many more; cyber thieves have discovered newer sources to target, becoming smarter and more ingenious in the process. Employers need to keep ahead of these crooks and have to continually keep upgrading their techniques and technologies for detecting and stopping identity thefts.

A webinar to give full understanding of identity theft

This topic will be covered in detail at a webinar that is being organized by TrainHR, a leading provider of professional trainings for the human resources industry. The speaker at this training session is Paula Pierce, an Austin, Texas attorney who provides legal services to identity theft victims. She previously founded a regional legal services program for victims of identity theft and financial fraud, and has authored numerous publications for victims of identity theft and for attorneys and is a frequent speaker on identity theft and financial fraud.

In order to have your knowledge of all areas of identity theft brushed up and to derive the benefit of the speaker’s experience in dealing with identity theft; please enroll for this webinar by visiting  TrainHR

Viewing this webinar, its entirety qualifies for a recertification credit hour that may be counted toward SHRM-CP and SHRM-SCP recertification from SHRM.
Credit is awarded based on the actual educational time spent in the program.

This webinar has been approved for 1 HR (General) recertification credit hours toward aPHR, PHR, PHRca, SPHR, GPHR, PHRi and SPHRi recertification through HR Certification Institute (HRCI).

Discussion on all areas of identity theft

Considering the pace at which identity theft has been growing, it looks likely that no organization is possibly fully safe. Any organization can be a victim of identity theft of any nature, at any time. Understanding the basics of identity theft will go a long way in helping them understand the ways of dealing with it.

Paula will familiarize participants with these at this webinar. In this session, which HR professionals at nearly every level and department managers and others related to the subject will find highly valuable; Paula will cover the following areas:

  • What is identity theft?
  • What are the different kinds of identity theft?
  • What personal information is valuable to identity thieves?
  • Why do identity thieves specifically target payroll records?
  • How do thieves use stolen information?
  • What is my company’s risk if payroll records are compromised?
  • How should a company respond if payroll records are compromised?
  • What can be done to avoid identity theft in the workplace?

 

Advertisements

Guarding against Ransomware

ransomware-expert-tips-featured

Ransomware is a malicious software that attacks the vital IT systems of organizations. Most ransomware attacks come in the form of normal mails, eliciting that the user open an attachment. When unsuspecting employees or individuals do so, the virus blocks their access to files in the system. The attackers unlock or release the access to the files only when the ransom, usually in the form of money, is transferred to their account through surreptitious means. Hence the name.

Typically, people who operate ransomware hold sensitive personal and organizational date to ransom. Sometimes, they could even seek just information and not money in return for releasing the files. This adds to the complexity and variety of the issue.

The size of the organization is not a criterion for a ransomware attack

The traditional belief has been that small organizations are vulnerable to ransomware attacks. However, the recent WannaCry attack has demonstrated that the reach and power of such cyberattacks are wider and stronger than believed. If governmental organizations such as the UK’s National Health Service could be targeted, one can imagine the fate of smaller organizations. This recent WannaCry attack also showed the particular penchant that these attackers have for assailing data related to health. It is true that in the US, health information commands a higher price in the black market than even social security and credit card information.

This, however, is not to suggest that other sector need to be complacent and develop a sense of false security. Just any organization, doing a business of any kind, located in any part of the world, and of any size, could be a potential target for ransomware attacks. If this were not to be the case; the estimated loss that organizations around the world suffer on account of ransomware attacks would not be amounting to around the $ 3.5 trillion annually that they currently do.

Learning on how to prevent ransomware

Given the nature and intensity of the problem, and considering that almost any and every PC, laptop, tablet or mobile –i.e., just about any device –could be a source of a ransomware attack; how do organizations deal with an issue as big and serious as this?

The ways of learning to spot a ransomware attack and preventing it will be the learning a webinar from TrainHR, a leading provider of professional trainings for the human resources industry, will offer. Paula Pierce, an Austin, Texas attorney who provides legal services to identity theft victims, has authored numerous publications for victims of identity theft and for attorneys and is a frequent speaker on identity theft and financial fraud, and previously founded a regional legal services program for victims of identity theft and financial fraud; will be the speaker at this webinar.

Want to understand how to tackle ransomware? Please register for this webinar by visiting TrainHR  to benefit from Paula’s rich experience in this area. Viewing this webinar, its entirety qualifies for a recertification credit hour that may be counted toward SHRM-CP and SHRM-SCP recertification from SHRM. Credit is awarded based on the actual educational time spent in the program.

This webinar has been approved for 1 HR (General) recertification credit hours toward aPHR, PHR, PHRca, SPHR, GPHR, PHRi and SPHRi recertification through HR Certification Institute (HRCI).

In this highly relevant session on this very pertinent topic, Paula will cover the following areas:

  • What is Malware?
  • What is Ransomware?
  • How does Ransomware Work?
  • How can Employees Recognize Potential Malware?
  • What should Employees do when they see Potential Malware?
  • What should you do if you become the victim of a Ransomware Attack?