Online Safety Community

Understanding and Ways of Dealing with Identity Theft

Identity theft is a serious area of cybercrime. In simple terms, identity theft, as the term suggests, is committed when a cyber thief impersonates a person’s identity and obtains important personal information such as Social Security Number, health records or debit or credit card details, and opens a financial account or starts spending using the victim’s information. When identity theft happens, people realize that the money in the bank account or credit cards is siphoned off. More often than not, this realization dawns only after the theft is carried out.

A perspective of the seriousness of this issue can be had from these statistics:

  • The government-run Bureau of Justice Statistics (BJS) states that in 2014, over 17.5 Americans became victims of identity theft. It is estimated that the loss from these thefts crossed $16 billion
  • One identity theft happens in less than every two seconds in the US
  • 13 percent of the 2.5 million complaints that the Federal Trade Commission (FTC) heard in 2014 were related  to identity theft
  • In that year, as many 86 million healthcare records were exposed as a result of identity theft.
  • Students are most likely to have their details stolen

With organizations having to deal with an assortment of confidential, finance-related information about their employees, such as payroll and many more; cyber thieves have discovered newer sources to target, becoming smarter and more ingenious in the process. Employers need to keep ahead of these crooks and have to continually keep upgrading their techniques and technologies for detecting and stopping identity thefts.

A webinar to give full understanding of identity theft

This topic will be covered in detail at a webinar that is being organized by TrainHR, a leading provider of professional trainings for the human resources industry. The speaker at this training session is Paula Pierce, an Austin, Texas attorney who provides legal services to identity theft victims. She previously founded a regional legal services program for victims of identity theft and financial fraud, and has authored numerous publications for victims of identity theft and for attorneys and is a frequent speaker on identity theft and financial fraud.

In order to have your knowledge of all areas of identity theft brushed up and to derive the benefit of the speaker’s experience in dealing with identity theft; please enroll for this webinar by visiting  TrainHR

Viewing this webinar, its entirety qualifies for a recertification credit hour that may be counted toward SHRM-CP and SHRM-SCP recertification from SHRM.
Credit is awarded based on the actual educational time spent in the program.

This webinar has been approved for 1 HR (General) recertification credit hours toward aPHR, PHR, PHRca, SPHR, GPHR, PHRi and SPHRi recertification through HR Certification Institute (HRCI).

Discussion on all areas of identity theft

Considering the pace at which identity theft has been growing, it looks likely that no organization is possibly fully safe. Any organization can be a victim of identity theft of any nature, at any time. Understanding the basics of identity theft will go a long way in helping them understand the ways of dealing with it.

Paula will familiarize participants with these at this webinar. In this session, which HR professionals at nearly every level and department managers and others related to the subject will find highly valuable; Paula will cover the following areas:

  • What is identity theft?
  • What are the different kinds of identity theft?
  • What personal information is valuable to identity thieves?
  • Why do identity thieves specifically target payroll records?
  • How do thieves use stolen information?
  • What is my company's risk if payroll records are compromised?
  • How should a company respond if payroll records are compromised?
  • What can be done to avoid identity theft in the workplace?

 

Views: 5

Comment

You need to be a member of Online Safety Community to add comments!

Join Online Safety Community

Take our poll!

Take our poll!

Latest Activity

Adam Fleaming posted a blog post

Learn How to Prevent Quality and Compliance Problems by having a strong system for Purchasing Controls!

In this era of globalization; outsourcing has become a major component of business. Outsourcing brings many benefits for companies. Short and long-term cost benefits, the ability to concentrate on their core activities and grow their business, and the freedom of avoiding the actual tasks that go into manufacturing are some of the stated…See More
4 hours ago
John Robinson posted blog posts
4 hours ago
Training Doyens posted events
5 hours ago
kate smith posted a blog post

Thorough Proofreading Finesses Documents, Raises the Organization’s Reputation

Proofreading qualifies for being both a process and an art. It finesses and trims important documents and gives them shape and proper form. It is essential for creating a good impact. It is necessary to cut out the errors that could cause embarrassment to the presenter. Sound proofreading, when combined with strong vocabulary; also helps to insert the most appropriate word in the right place in a document.Proofreading is a must for almost all kinds of documents that are used in a work…See More
8 hours ago

Forum

Risk Management Solutions

Risk is defined as the potential hazard, harm or side effect of an activity. Almost all activities come with some or another form of risk, which needs to be mitigated or eliminated. Risk management…Continue

Tags: risk, Banking, management, healthcare, Process

Started by John Robinson on Tuesday.

Occupational Health and Safety 4 Replies

Health and safety are important aspects of an organisation’s smooth and effective functioning.  Did you know that workplace health & safety injuries cost Australian businesses over $60 billion…Continue

Tags: Safety, and, Health, Occupational

Started by WHS Solutions. Last reply by John Robinson on Monday.

Introduction to PEGA-PRPC

Pega/PRPC is a popular rules engine and BPM tool from Pega systems that is gaining good market share among large corporations. Architects and developers build the Pega/PRPC instance while…Continue

Tags: training, course, online, pega

Started by Soujanya Naganuri Oct 6.

Introduction to PEGA-PRPC

Pega/PRPC is a popular rules engine and BPM tool from Pega systems that is gaining good market share among large corporations. Architects and developers build the Pega/PRPC instance while…Continue

Tags: training, course, online, pega

Started by Soujanya Naganuri Oct 6.

Introduction to PEGA-PRPC

Pega/PRPC is a popular rules engine and BPM tool from Pega systems that is gaining good market share among large corporations. Architects and developers build the Pega/PRPC instance while…Continue

Tags: training, course, online, pega

Started by Soujanya Naganuri Oct 6.

Badge

Loading…

© 2017   Created by Safety Community.   Powered by

Badges  |  Report an Issue  |  Terms of Service