chap 7 c - Identity Theft Tactics (contd) Phishing: This...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Identity Theft Tactics (cont’d) Phishing: This occurs when pretexting happens online Pharming: Similar to phishing, but targeted to larger audiences, directs users to bogus Web sites to collect their personal information Abusing legitimate access to records Co-workers, places you do business, public records Identity Theft Tactics (cont’d) Crime rings Violating your mailbox Both incoming and outgoing mail can provide personal information Protecting Against Identity Theft Shielding personal information at home Remove items containing SSN from purse/wallet Document your accounts Buy a shredder and use it Do not have SSN printed on your checks Install a locked mailbox or rent a P.O. box Shop online only on secured sights Protecting Against Identity Theft (cont’d) Be suspicious of phone callers seeking personal information Mail all bills with account information in a U.S. Postal Service depository box Scrutinize bank and credit card statements Be careful using hand-held or cell phones when ordering merchandise
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 2

chap 7 c - Identity Theft Tactics (contd) Phishing: This...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online