Presentations

How Your Business can Protect Private Information (45 – 60 minutes)

Covers the 5 key principles of a sound data security plan and the steps required to implement those principles.

Your customers and employees are assets. Their information are assets. Don’t let an identity thief turn them into a liability.

Most companies keep sensitive personal information in their files—names, Social Security numbers, credit card, or other account data—that identifies customers or employees.

This information often is necessary to fill orders, meet payroll, or perform other necessary business functions. However, if sensitive data falls into the wrong hands, it can lead to fraud, identity theft, or similar harms. Given the cost of a security breach—losing your customers’ trust and perhaps even defending against a lawsuit—safeguarding personal information is just plain good business.

A data breach costs a business more than $200 per compromised record. If you have 1,000 customers, it could cost over $200,000. Small business loses $8 billion per year from compromised non-public personal information. Some businesses have lost 40% of their customers because of the lost trust.

How to Protect Your Personal Private Information (45 – 60 minutes)

Covers the 3 main areas of protecting your identity – Deter, Detect and Defend.

Every 2.8 seconds someone becomes a victim of Identity Theft. Last year over 8 million people were attacked and many of them did not find out about the attack for months. It cost them time and money. I do not want you to be a victim.

You will know how to limit your risk of Identity Theft. There are countless ways someone can steal your Private Information – the internet, social media, phishing, scams, US mail and many more. Proven methods you can use to protect yourself from being a victim are covered.

Methods to monitor your Identity are covered. The faster you uncover that your Social Security Number, Credit Card number or other private information has been stolen, the lower your cost and the shorter the time it will take you to recover your identity.

There are steps you need to take if your Credit and/or Identity is stolen. There is also a best order in which to take those steps. Most ‘experts’ do not tell you about the most important step. You will learn what it is and how to use it.

How to Protect Your Child’s Identity (45 – 60 minutes)

Children are victims of Identity Theft more often than adults. They are 51x more likely to be victims than adults. Over 10% of children will be a victim before age 18.

  • Do you want to know if your eight-year-old is in foreclosure on a home in another state?
  • Do you want to know if your three-year-old is in collection for a huge utility bill across town?
  • Do you want to know that if someone has a hunting license in the name of your five-year-old?
  • Do you want to know that your nine-year-old has a driver’s license and a car registered in his or her name?
  • Do you want now rather than age 18 if someone has applied for student loans in his or her name?

Covers why crooks want your child’s Social Security Number, why a credit check on a child only finds 1% of victims, how you can check if your child is a victim and were to go to learn how to protect your child from online predators and cyber bullies.

Their school records contain private information thieves and pedophiles covet: birthday, Social Security Number, parents, address, phone numbers and much more. Sadly these records are some of the least secure. Discover the steps you need to take with their school.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s