Hello and welcome to again to "Issues and Answers." 00:00:30.73\00:00:33.84 We're so glad that you could join us today 00:00:33.87\00:00:35.00 and you're going to be glad too. 00:00:35.03\00:00:36.74 I want to encourage you to get a pencil and a paper, 00:00:36.77\00:00:39.69 no matter where you are. 00:00:39.72\00:00:41.50 And if particularly if you're a parent, 00:00:41.53\00:00:43.94 we are going to be talking today about identity theft. 00:00:43.97\00:00:47.47 And this is something that is happening 00:00:47.50\00:00:49.93 to all age groups, not just adults. 00:00:49.96\00:00:52.55 You're going to be shocked, at least I was. 00:00:52.58\00:00:55.87 And I want you to sit down and write down 00:00:55.90\00:00:58.36 some of this information, 00:00:58.39\00:00:59.59 so that you will know how to protect your identity. 00:00:59.62\00:01:02.74 This is something that identity theft is becoming 00:01:02.77\00:01:06.12 much more prevalent than we realize. 00:01:06.15\00:01:08.51 And it can be very dangerous 00:01:08.54\00:01:10.68 and cause you a lot of problems. 00:01:10.71\00:01:12.57 You know, the Lord Jesus said in Matthew 10:16. 00:01:12.60\00:01:16.38 He said, "Behold I'm sending you out like sheep 00:01:16.41\00:01:19.90 in the midst of the wolves, be wary, 00:01:19.93\00:01:23.62 be wise as serpents and gentle as doves." 00:01:23.65\00:01:27.20 We've got to become wise as those serpents 00:01:27.23\00:01:30.53 who are trying to steal our identity. 00:01:30.56\00:01:32.52 And here today to tell us how we might protect 00:01:32.55\00:01:35.21 that identity is Ernest Staats. 00:01:35.24\00:01:38.07 Ernest, thank you so much for joining us again. 00:01:38.10\00:01:40.63 You're welcome. 00:01:40.66\00:01:41.69 You know, I always enjoy when you're here 00:01:41.72\00:01:42.83 because you're very knowledgeable on this topic of. 00:01:42.86\00:01:46.12 You're, I mean your degree is in actually, 00:01:46.15\00:01:49.74 your masters, isn't it? 00:01:49.77\00:01:50.91 My masters, yes. Is in internet--I mean-- 00:01:50.94\00:01:53.83 Network Security. Network Security. 00:01:53.86\00:01:55.99 And so you are the IT Director 00:01:56.02\00:01:58.27 for the Georgia-Cumberland Academy. 00:01:58.30\00:02:01.34 And that is in... 00:02:01.37\00:02:04.39 Calhoun, Georgia. Calhoun, Georgia. 00:02:04.42\00:02:06.08 I had a brain freeze in. Anyway, we're glad you're back. 00:02:06.11\00:02:10.39 So tell me you and I were talking before the program. 00:02:10.42\00:02:15.45 And you shocked me because I've only thought 00:02:15.48\00:02:18.56 of identity theft as being an issue for adults. 00:02:18.59\00:02:22.53 You said, otherwise. That's right. 00:02:22.56\00:02:24.70 I wish it was just an adult issue 00:02:24.73\00:02:26.47 because I know it would be one less thing I have to do. 00:02:26.50\00:02:28.40 But I have, I have young girl, 4-years-old, Nariah. 00:02:28.43\00:02:31.37 But the statistics are proving out 00:02:31.40\00:02:33.37 the last few years has been really a surprise. 00:02:33.40\00:02:35.98 People have been turning 18 and they'd be finding out 00:02:36.01\00:02:38.09 they have a horrible credit rating. 00:02:38.12\00:02:40.03 And they're trying to figure what's going on 00:02:40.06\00:02:41.13 and they found out that, 00:02:41.16\00:02:43.16 they found that social security numbers 00:02:43.19\00:02:45.00 were not that protective of young people. 00:02:45.03\00:02:47.34 Schools, public schools, you know that different areas 00:02:47.37\00:02:50.20 where it's-- they were people getting-- 00:02:50.23\00:02:51.26 if we can hold of the social security number, 00:02:51.29\00:02:53.56 they then just change the birth date. 00:02:53.59\00:02:55.41 So they're finding that the actual largest growing 00:02:55.44\00:02:57.76 market of identity theft right now today 00:02:57.79\00:03:00.01 is in young children. 00:03:00.04\00:03:01.30 And I don't suppose people think to even, 00:03:01.33\00:03:04.60 I certainly wouldn't think to check 00:03:04.63\00:03:06.86 the credit reports on my child. 00:03:06.89\00:03:10.19 Right. I wouldn't have thought about it either. 00:03:10.22\00:03:12.00 When I was at cyber crime seminar 00:03:12.03\00:03:13.40 which is a gathering of all the top FBI people, 00:03:13.43\00:03:15.90 dealing with this type of issue in Atlanta, 00:03:15.93\00:03:17.70 year ago they talked about the fact 00:03:17.73\00:03:19.44 that this is becoming such a large issue now 00:03:19.47\00:03:21.81 that they are recommending every parent, 00:03:21.84\00:03:24.32 if your child is over 2 years of age 00:03:24.35\00:03:26.06 to start checking their credit report 00:03:26.09\00:03:27.98 history every year, once a year. 00:03:28.01\00:03:30.80 There is just one more thing to worry about, isn't there? 00:03:30.83\00:03:33.15 So what can we do to protect our family's identity? 00:03:33.18\00:03:37.12 There is a lot of steps you can take. 00:03:37.15\00:03:38.59 First of all, you're going to be careful about 00:03:38.62\00:03:39.71 who you give your information to. 00:03:39.74\00:03:41.64 You want to make sure that they're being careful 00:03:41.67\00:03:43.40 with the information and you have every right to say, 00:03:43.43\00:03:46.22 how is this going to be stored? 00:03:46.25\00:03:48.05 You know, if you walk into a place 00:03:48.08\00:03:49.15 where you see credit card number is just stacked up, 00:03:49.18\00:03:51.27 there's a problem. Okay. 00:03:51.30\00:03:52.73 You know, if nobody's there watching the counter. 00:03:52.76\00:03:54.91 But you want to just take some precautionary steps, 00:03:54.94\00:03:57.24 we recommend and actually the FBI also recommends 00:03:57.27\00:04:00.07 that you don't receive any type of mail 00:04:00.10\00:04:02.34 to your mailbox unless it's a locked mailbox. 00:04:02.37\00:04:05.78 Or you have it deliver to a post office box. 00:04:05.81\00:04:08.63 You just have your personal mail coming there, 00:04:08.66\00:04:10.20 but no financial information whatsoever. 00:04:10.23\00:04:12.85 We've gone at our house, we've gone to all online banking 00:04:12.88\00:04:15.88 and we even get our statements electronically. 00:04:15.91\00:04:18.56 You see, there's something think 00:04:18.59\00:04:19.73 oh, mercy now that's really dangerous to do online banking. 00:04:19.76\00:04:23.45 But you are saying it's actually safer. 00:04:23.48\00:04:25.32 I think it's a lot safer in lot of ways 00:04:25.35\00:04:26.62 because a lot of people are doing 00:04:26.65\00:04:27.68 what are called, what's called dumpster diving 00:04:27.71\00:04:29.69 or trash diving where there's actually companies 00:04:29.72\00:04:32.29 that hire people that when your trash gets taken out, 00:04:32.32\00:04:34.82 they go through the trash 00:04:34.85\00:04:35.88 looking for that type of information. 00:04:35.91\00:04:37.56 Now say I use a shredder at home, 00:04:37.59\00:04:39.58 I mean, for everything just about 00:04:39.61\00:04:41.17 that has to do with any kind of personal information, 00:04:41.20\00:04:43.27 any kind of I use a shredder for credit card offers, 00:04:43.30\00:04:48.33 you know, anything like that. 00:04:48.36\00:04:50.48 And that's what you should be doing. 00:04:50.51\00:04:51.56 That's excellent. 00:04:51.59\00:04:52.62 Because shredders are cheap, 00:04:52.65\00:04:54.41 you know, compared to someone who has lost their identity. 00:04:54.44\00:04:56.38 And I had someone you know, take my identity once also. 00:04:56.41\00:04:59.78 And it took me months to re-gather 00:04:59.81\00:05:01.52 all the information that they took 00:05:01.55\00:05:03.45 and they charged up stuff on my 00:05:03.48\00:05:04.97 and it was going straight out of my debit card, 00:05:05.00\00:05:06.70 so it came straight out of my account. 00:05:06.73\00:05:08.44 So with that paper shredder, you know for 20, 30, 00:05:08.47\00:05:12.06 even 50 bucks if you go buy an expensive one 00:05:12.09\00:05:14.14 that will shred CDs that has electronic data. 00:05:14.17\00:05:16.87 You know, that's not a huge expense. 00:05:16.90\00:05:19.10 And the other thing that I do is recently 00:05:19.13\00:05:21.95 we had a laptop computer that was beyond repair. 00:05:21.98\00:05:26.80 And so before I donated it to someone else, 00:05:26.83\00:05:30.16 I took out all the hard drive, I took out anything that could 00:05:30.19\00:05:34.19 have any kind of data, 00:05:34.22\00:05:35.42 even though it had been erased stuff out now, 00:05:35.45\00:05:36.99 I know somebody could be smart enough to retrieve it. 00:05:37.02\00:05:39.55 So I'm very careful that way. 00:05:39.58\00:05:40.99 And that's really important, because like for us, 00:05:41.02\00:05:43.60 the financial computer we retired last year, 00:05:43.63\00:05:46.08 one of the computers at GCA. 00:05:46.11\00:05:47.78 We formatted the hard drive. Right. 00:05:47.81\00:05:49.91 Then we formatted it was a drill 00:05:49.94\00:05:52.66 and we took a drill and went through it several times 00:05:52.69\00:05:54.89 with a drill and literally went through physically destroyed it, 00:05:54.92\00:05:58.54 because it had the financial data 00:05:58.57\00:05:59.98 of people who came to our academy and stuff. 00:06:00.01\00:06:01.60 That's the only way to truly be make sure 00:06:01.63\00:06:04.74 that it is beyond anybody getting information 00:06:04.77\00:06:07.45 of if it's physically destroyed. 00:06:07.48\00:06:08.69 Even if you format it, 00:06:08.72\00:06:09.84 I have software where I can unformat it. 00:06:09.87\00:06:12.02 And it's open to the public, it's online. 00:06:12.05\00:06:14.39 All right. So we got to be careful. 00:06:14.42\00:06:16.21 What are some other ways? 00:06:16.24\00:06:17.67 Besides we want to make sure 00:06:17.70\00:06:18.73 that you protect your information, 00:06:18.76\00:06:20.16 you want to make sure you receiving stuff 00:06:20.19\00:06:21.71 in a secured fashion. 00:06:21.74\00:06:23.22 If you receive stuff on your computer 00:06:23.25\00:06:25.19 and people say oh, you know, 00:06:25.22\00:06:26.32 you do any electronic transactions 00:06:26.35\00:06:27.69 you need to be really worried about that. 00:06:27.72\00:06:29.33 To me, I'm more worried honestly 00:06:29.36\00:06:31.03 than the electronic transactions, 00:06:31.06\00:06:32.87 I'm more worried about handing my debit card 00:06:32.90\00:06:34.64 to someone at a restaurant. 00:06:34.67\00:06:36.16 You actually had an experience, didn't you? 00:06:36.19\00:06:37.63 I had an experience and it bit me. 00:06:37.66\00:06:39.45 And I handed a debit card 00:06:39.48\00:06:40.62 and they charged a bunch of things 00:06:40.65\00:06:41.90 and it came straight out of my account. 00:06:41.93\00:06:43.48 Now I always make sure it's a credit card 00:06:43.51\00:06:45.79 that I can go back and I can dispute the charges. 00:06:45.82\00:06:48.79 Debit card never leaves my hand, it's my philosophy. 00:06:48.82\00:06:52.66 So but a credit card then I can get of someone, 00:06:52.69\00:06:55.06 because you get something to stand on. 00:06:55.09\00:06:56.73 The other issues you want to look at 00:06:56.76\00:06:58.33 as you're doing this and you're trying to keep yourself safe, 00:06:58.36\00:07:01.12 you want to make sure that you have everything secured 00:07:01.15\00:07:03.64 including your computer, most people think about this, 00:07:03.67\00:07:05.79 they will go home and they will put wireless in their house 00:07:05.82\00:07:08.51 because it's convenient, they don't realize 00:07:08.54\00:07:10.21 that their neighbors over there can see everything 00:07:10.24\00:07:11.84 they're doing on their wireless network 00:07:11.87\00:07:13.42 including their banking transactions 00:07:13.45\00:07:15.63 and other thing, so you want to be-- 00:07:15.66\00:07:16.69 Oh, really, I was just thinking of having wireless 00:07:16.72\00:07:18.46 in my home but you're saying that's not a good. 00:07:18.49\00:07:20.58 No, it's not bad to do it all, I've got wireless 00:07:20.61\00:07:23.05 but on my website es-es.net. 00:07:23.08\00:07:26.60 I have narrative PowerPoint that tells 00:07:26.63\00:07:28.13 you how to secure you wireless. 00:07:28.16\00:07:30.11 If you don't secure your wireless, 00:07:30.14\00:07:31.61 then you're asking for trouble. 00:07:31.64\00:07:33.36 But if you secure your wireless, it's not a problem at all. 00:07:33.39\00:07:36.27 Because there's not too many, 00:07:36.30\00:07:37.49 I know that sophisticated hackers might get beyond 00:07:37.52\00:07:41.46 some firewalls and the decryption things 00:07:41.49\00:07:44.79 but for most of your neighbors 00:07:44.82\00:07:46.78 are not going to have that kind of look. 00:07:46.81\00:07:49.62 And that's probably, you know, you need to take 00:07:49.65\00:07:51.04 in consideration where you are at, 00:07:51.07\00:07:52.24 if you're living in downtown, metropolitan area. 00:07:52.27\00:07:54.03 You know, if you're living out in the country, 00:07:54.06\00:07:56.03 I still would put security on it. 00:07:56.06\00:07:58.11 But you know I won't be quite so worried 00:07:58.14\00:07:59.73 as going to the high level, 00:07:59.76\00:08:00.79 I always put what's called WPA security. 00:08:00.82\00:08:03.44 And if you go on to my website, 00:08:03.47\00:08:05.31 you can look at the PowerPoint it will explain all this to you. 00:08:05.34\00:08:08.09 And that's more than we have time for today 00:08:08.12\00:08:10.06 And one thing that I learned not to do many years ago, 00:08:10.09\00:08:13.87 I used to carry my social security card in my wallet 00:08:13.90\00:08:17.40 and I had my credit cards 00:08:17.43\00:08:18.73 and you got the checkbook in there 00:08:18.76\00:08:20.89 and I have my social security card. 00:08:20.92\00:08:22.52 And all of a sudden it dawned on me. 00:08:22.55\00:08:24.38 Well, if I ever lost my wallet my identity is gone. 00:08:24.41\00:08:27.92 It is. 00:08:27.95\00:08:28.98 And but I recommend also for people to do 00:08:29.01\00:08:31.37 and I've done this because we do quite a bit of traveling, 00:08:31.40\00:08:33.45 my wife and myself with our little girl. 00:08:33.48\00:08:35.80 I've taken out everything that's in her purse 00:08:35.83\00:08:37.88 and everything that's in my wallet and I've photocopied it. 00:08:37.91\00:08:40.75 And then I sent it to a friend who I know 00:08:40.78\00:08:42.83 he's got a fire safe and I trust him implicitly. 00:08:42.86\00:08:45.58 He's an accountant. 00:08:45.61\00:08:48.46 He has it saved there, so it's inner fire safe, 00:08:48.49\00:08:51.06 so if something happens, I can call him 00:08:51.09\00:08:52.71 and get on my numbers right away. 00:08:52.74\00:08:53.97 Oh, that's smart. 00:08:54.00\00:08:55.03 So, or you know, we've also sent stuff, 00:08:55.06\00:08:57.29 we've got pictures of our first little girl who passed away. 00:08:57.32\00:08:59.70 I've got copies of those at my house 00:08:59.73\00:09:01.43 and then I've also have a copy at my parent's house 00:09:01.46\00:09:03.28 in case we had a house fire. 00:09:03.31\00:09:05.19 You know, there are some things that you want them 00:09:05.22\00:09:06.79 that are a worth more value to that you 00:09:06.82\00:09:08.11 want to make sure that you have copies or duplicates of. 00:09:08.14\00:09:11.19 And that's one of the things I recommend is 00:09:11.22\00:09:12.72 if you do a lot of traveling to do that, 00:09:12.75\00:09:14.60 if you're going to be leaving the country, 00:09:14.63\00:09:15.86 that's very important. Okay. 00:09:15.89\00:09:17.47 So how about, can't you place a fraud alert 00:09:17.50\00:09:22.41 on your credit cards? 00:09:22.44\00:09:24.02 Yes, you can. 00:09:24.05\00:09:25.08 And matter of fact I just received the notice 00:09:25.11\00:09:26.61 because I used to work for the State of Georgia 00:09:26.64\00:09:27.89 that I need to put a fraud alert alarms, 00:09:27.92\00:09:29.30 because they just lost the hard drive that had all the data, 00:09:29.33\00:09:31.79 all of those personal information on 00:09:31.82\00:09:33.53 for all the employees of the state of Georgia 00:09:33.56\00:09:35.19 for the last 15 years. 00:09:35.22\00:09:37.27 So but when you do that, 00:09:37.30\00:09:38.70 you want to place your fraud alert, 00:09:38.73\00:09:39.78 you can also go to annualreport.com. 00:09:39.81\00:09:42.52 You know, and your creditreport.com, 00:09:42.55\00:09:44.28 it's on my website, you can link from my website. 00:09:44.31\00:09:47.11 If you don't remember the URL and it will take you out 00:09:47.14\00:09:48.96 and there's 3 different companies out there 00:09:48.99\00:09:51.11 that you can go through and check your credit reports. 00:09:51.14\00:09:53.66 I only check one at a time, I don't do all three. 00:09:53.69\00:09:55.73 Explain why? 00:09:55.76\00:09:56.88 Because I check the first one, I wait about 3 months 00:09:56.91\00:09:59.47 then I check the second one. 00:09:59.50\00:10:00.98 Then I wait about 3 months and then I check the third one. 00:10:01.01\00:10:03.53 So that I'm kind of getting them throughout 00:10:03.56\00:10:04.99 the whole year, not just once a year doing it. 00:10:05.02\00:10:07.90 That way I can go through just because if something shows up 00:10:07.93\00:10:10.18 kind of funky on one then I can say, 00:10:10.21\00:10:11.91 okay, there is something going on, I can go ahead if I need to, 00:10:11.94\00:10:13.83 I can run the second one against it, 00:10:13.86\00:10:15.59 because it's been long enough time period. 00:10:15.62\00:10:17.70 So if you do that every 3 or 4 months you know, 00:10:17.73\00:10:19.53 you can kind of go through and check through 00:10:19.56\00:10:21.31 and see exactly what's happening with your credit reports 00:10:21.34\00:10:23.45 and like I said I check my daughter's too 00:10:23.48\00:10:25.69 and she's only 4-years-old. 00:10:25.72\00:10:27.48 And what is the charge for something like that? 00:10:27.51\00:10:30.38 If you're doing the annualreport.com, 00:10:30.41\00:10:31.85 it's nothing, it's free. Annualreport.com. 00:10:31.88\00:10:35.30 Annualcreditreport.com and you can go through 00:10:35.33\00:10:37.55 and pull it off once a year 00:10:37.58\00:10:39.18 from each of those different agencies for free. 00:10:39.21\00:10:41.39 We can get all three for free. 00:10:41.42\00:10:42.99 You get all three as long as you only do one at a time. 00:10:43.02\00:10:46.25 So you spread them every 3 or 4 months, you know. 00:10:46.28\00:10:48.90 I just have got-- there are certain months 00:10:48.93\00:10:50.21 where I do things like taxes, when I do my taxes, 00:10:50.24\00:10:52.28 I do the credit reports at the same time. 00:10:52.31\00:10:54.70 How can you secure your online connections 00:10:54.73\00:10:56.84 when you're talking about the banking 00:10:56.87\00:10:59.55 and all of the stuff, let's talk about this more. 00:10:59.58\00:11:02.01 When yours, first of all you want to make sure 00:11:02.04\00:11:03.74 that your bank has good security in place 00:11:03.77\00:11:06.06 or if you're buying something online. 00:11:06.09\00:11:07.67 I mean, like we were talking offline, 00:11:07.70\00:11:09.29 I even buy my groceries online. 00:11:09.32\00:11:12.23 When I do that I got to make sure that it's a secure site. 00:11:12.26\00:11:15.08 It will usually say in the URL, https and it will have a colon. 00:11:15.11\00:11:20.00 And then it will have you know, and they will have a colon 00:11:20.03\00:11:22.02 and then have the rest of the website, 00:11:22.05\00:11:23.78 you know, www, whatever. 00:11:23.81\00:11:25.49 But the "s" means it's a secure connection. 00:11:25.52\00:11:28.35 Typically you will see if you have an older browser, 00:11:28.38\00:11:31.45 you will see a padlock down at the bottom right hand corner, 00:11:31.48\00:11:34.03 a golden padlock. 00:11:34.06\00:11:35.32 If that padlock is gold and it's locked it's secure. 00:11:35.35\00:11:38.67 If you have a newer browser 00:11:38.70\00:11:40.37 and it's not a secure connection, 00:11:40.40\00:11:42.13 it will pop up with an alert 00:11:42.16\00:11:43.49 and it will tell you Internet Explorer, Mozilla, 00:11:43.52\00:11:45.71 these newer browsers if they're latest versions they will say, 00:11:45.74\00:11:48.16 this is an unsecured connection, 00:11:48.19\00:11:49.68 do you want to go here? 00:11:49.71\00:11:51.36 If it's you bank or something you're buying from, no way. 00:11:51.39\00:11:54.33 You don't want to go there because there's a problem 00:11:54.36\00:11:55.95 that is being compromised. 00:11:55.98\00:11:57.30 You also want to make sure that any place 00:11:57.33\00:11:59.44 you're going to has a physical address. 00:11:59.47\00:12:01.09 I would never buy something 00:12:01.12\00:12:02.15 that's just purely an online site. 00:12:02.18\00:12:04.29 They don't have some type of physical address 00:12:04.32\00:12:05.82 that you can reference back to. 00:12:05.85\00:12:07.78 Because you have no idea who are you dealing with? 00:12:07.81\00:12:10.21 And where they are at, once you've done those steps, 00:12:10.24\00:12:12.48 then you want to make sure your basic computer is safe. 00:12:12.51\00:12:14.98 You want to make sure you've got all your Microsoft updates 00:12:15.01\00:12:17.05 if you're running Windows, if you're running Macintosh 00:12:17.08\00:12:19.80 or what, you know, Linux, one of these others, 00:12:19.83\00:12:21.51 you can also got to update those too. 00:12:21.54\00:12:23.40 You know, I'm rather, when you take Microsoft 00:12:23.43\00:12:26.20 updates I always get my entire virus software updates 00:12:26.23\00:12:30.30 just where it's an automatic thing. 00:12:30.33\00:12:32.22 But I'm reluctant about getting the updates on the Microsoft 00:12:32.25\00:12:36.69 because one time I didn't update it 00:12:36.72\00:12:39.06 and it messed up my computer so badly 00:12:39.09\00:12:41.19 and it took a week practically to get it all straightened out. 00:12:41.22\00:12:45.11 But you're saying that that is a good idea, 00:12:45.14\00:12:47.10 because there are new security enhancements in these updates. 00:12:47.13\00:12:51.68 What I typically do is I just make sure 00:12:51.71\00:12:53.32 it's the security enhancements, 00:12:53.35\00:12:54.73 I don't always go down like 00:12:54.76\00:12:56.02 they got a new player of windows media player 00:12:56.05\00:12:58.27 or something that, you know, it's an optional download, 00:12:58.30\00:13:00.50 I don't always do that, I only do the security enhancements. 00:13:00.53\00:13:03.63 You still can run into a problem but if you go to my website, 00:13:03.66\00:13:06.80 I'll step you through on how to do what's called 00:13:06.83\00:13:08.33 a restore point in Windows. 00:13:08.36\00:13:10.22 And let's talk about your website 00:13:10.25\00:13:11.77 because this is a free resource 00:13:11.80\00:13:13.38 that you just a part of your ministry. 00:13:13.41\00:13:16.35 And that website address, 00:13:16.38\00:13:17.85 if you want to write this down is es-es.net. 00:13:17.88\00:13:24.80 Let me repeat that es-es.net. 00:13:24.83\00:13:29.00 Not trying to sell you anything 00:13:29.03\00:13:30.98 but there is a narrative, there is a narrative PowerPoint 00:13:31.01\00:13:34.55 on there that will walk you through some of these things 00:13:34.58\00:13:36.85 as well as some good links. 00:13:36.88\00:13:38.34 It's very educational and it's free. 00:13:38.37\00:13:41.52 So that's quite a service and we thank you for that. 00:13:41.55\00:13:45.84 One of the things that when people are looking to save, 00:13:45.87\00:13:48.03 sometimes we get concerned because of its terminology, 00:13:48.06\00:13:50.51 well, I don't know that, you know, 00:13:50.54\00:13:51.91 people say I have Microsoft. 00:13:51.94\00:13:53.73 You know, I don't know if I got Windows or you know what I have. 00:13:53.76\00:13:56.59 But if you go through I would also, 00:13:56.62\00:13:58.39 you know, talk to young person at the church 00:13:58.42\00:14:00.78 who you go to church with you or some young person 00:14:00.81\00:14:02.66 that you feel like is a trustworthy young person, 00:14:02.69\00:14:04.79 they can help step you through this, 00:14:04.82\00:14:06.25 they can your antivirus up to date. 00:14:06.28\00:14:08.45 And you need to have antivirus software. 00:14:08.48\00:14:11.74 You need to make sure that your firewall is turned on. 00:14:11.77\00:14:14.08 Windows comes built with a firewall. 00:14:14.11\00:14:16.21 You know, Macintosh comes built with a firewall. 00:14:16.24\00:14:19.14 They need to be turned on. They are not always turned on. 00:14:19.17\00:14:22.04 I'm not even sure, I didn't know that it came with the firewall. 00:14:22.07\00:14:24.51 So I'm sure mine is turned on. 00:14:24.54\00:14:26.17 But most of time in the newer version of Windows, 00:14:26.20\00:14:27.75 they will be a nice little red icon down 00:14:27.78\00:14:29.52 at the bottom right hand corner 00:14:29.55\00:14:30.61 if your firewall is turned off alerting you, 00:14:30.64\00:14:33.02 if you have a newer version of Windows. 00:14:33.05\00:14:34.92 You know saying there's a problem, 00:14:34.95\00:14:35.98 your firewall is off, do you want to turn it on? 00:14:36.01\00:14:37.88 Okay. And then you can say yes. 00:14:37.91\00:14:39.42 What about encrypting files that sounds 00:14:39.45\00:14:42.06 so sophisticated and difficult? 00:14:42.09\00:14:45.34 It sounds it but it's really not. 00:14:45.37\00:14:47.23 There are several different software packages out 00:14:47.26\00:14:49.03 in the market that make encrypting very easy. 00:14:49.06\00:14:51.20 I encrypt all of our personal banking, our tax records. 00:14:51.23\00:14:54.37 They go to a certain section on my hard drive 00:14:54.40\00:14:56.17 that I encrypt and I have to put a password to get into it. 00:14:56.20\00:14:59.42 And on my website there are several 00:14:59.45\00:15:00.66 different software packages 00:15:00.69\00:15:01.81 that I list out and I go for the ones that are free 00:15:01.84\00:15:04.32 because I like the price. 00:15:04.35\00:15:05.88 So explain that because some people may not know 00:15:05.91\00:15:07.96 what we're talking about encrypting a file. 00:15:07.99\00:15:10.31 When you encrypt a file basically it takes all 00:15:10.34\00:15:12.39 the data and it scrambles it into a mathematical formula. 00:15:12.42\00:15:15.93 And what it does it makes for somebody else, 00:15:15.96\00:15:17.73 it's very hard for someone else 00:15:17.76\00:15:18.82 to figure out what that data was. 00:15:18.85\00:15:20.68 So if you're at the airport 00:15:20.71\00:15:21.99 and your laptop is stolen as Cherri Peters 00:15:22.02\00:15:24.57 was recently traveling here 00:15:24.60\00:15:26.46 and she was running late for the airplane. 00:15:26.49\00:15:29.66 And so, and she went through security somehow 00:15:29.69\00:15:31.94 she got delayed for a moment. 00:15:31.97\00:15:33.64 And she picked up everything 00:15:33.67\00:15:34.84 and went dashing off to the gate 00:15:34.87\00:15:38.67 and realized, I got a light load. 00:15:38.70\00:15:40.80 She left her computer back on the belt and it was stolen. 00:15:40.83\00:15:45.80 So if your computer is stolen and your files are encrypted 00:15:45.83\00:15:49.51 there's important files they can't read it. 00:15:49.54\00:15:52.30 And I--we do that for all of our financial 00:15:52.33\00:15:55.24 or personal data on laptops. 00:15:55.27\00:15:56.60 And actually the North American division 00:15:56.63\00:15:58.48 and the general conference is highly recommending 00:15:58.51\00:16:00.33 for all the ministries. 00:16:00.36\00:16:01.39 If you have any personal information about people 00:16:01.42\00:16:04.02 that your laptop should, 00:16:04.05\00:16:05.23 your entire hard drive should be encrypted. 00:16:05.26\00:16:07.58 And that--did we just recently have something 00:16:07.61\00:16:10.03 with veterans that laptops were stolen 00:16:10.06\00:16:12.63 and all these identities were stolen because or at risk, 00:16:12.66\00:16:16.81 because this information had gotten out. 00:16:16.84\00:16:20.00 And that's what happens with me, 00:16:20.03\00:16:21.27 because I used to be a employee of the State of Georgia. 00:16:21.30\00:16:23.85 When I worked for the State of Georgia 00:16:23.88\00:16:24.91 that was non encrypted hard drive. 00:16:24.94\00:16:26.28 They did put it in the letter that what besides 00:16:26.31\00:16:28.39 letting us know this would happen they said 00:16:28.42\00:16:29.81 they are now making a policy to encrypt 00:16:29.84\00:16:32.21 all the removable storage, which I was, 00:16:32.24\00:16:35.11 should have happened before but you know, 00:16:35.14\00:16:36.91 that's something that is becoming 00:16:36.94\00:16:38.23 more and more part of life. 00:16:38.26\00:16:39.31 And it's not as hard basically just makes 00:16:39.34\00:16:41.35 one more password you have to remember. 00:16:41.38\00:16:44.44 You have the state method, 00:16:44.47\00:16:45.80 you say being online is like being in-- 00:16:45.83\00:16:48.93 The worst crime neighborhood in the world 00:16:48.96\00:16:51.20 and you need to realize that. 00:16:51.23\00:16:53.36 Because you have all of the criminals out there, 00:16:53.39\00:16:57.07 you also have some really great people. 00:16:57.10\00:16:58.39 But you seem to realize it's a high crime neighborhood. 00:16:58.42\00:17:00.98 And so we just have to learn how to protect ourselves 00:17:01.01\00:17:03.51 when we are online. That is correct. 00:17:03.54\00:17:06.35 Part of this is being smart when you are online, 00:17:06.38\00:17:09.00 but also just using a little bit of common sense 00:17:09.03\00:17:11.49 when you go out there. 00:17:11.52\00:17:12.55 If it's the site you've never seen, 00:17:12.58\00:17:13.74 if it offers too good to be true. 00:17:13.77\00:17:16.28 It's too good to be true. 00:17:16.31\00:17:17.68 If you get contacted by some brother 00:17:17.71\00:17:19.84 in another foreign country it says, brother in Christ, 00:17:19.87\00:17:22.41 I've got this money that we need to get to the United States. 00:17:22.44\00:17:25.22 I can't tell you how often those come to me. 00:17:25.25\00:17:27.97 They are not a brother and they are, 00:17:28.00\00:17:29.75 you know, not really in Christ. 00:17:29.78\00:17:31.59 All they want to do is get your money. 00:17:31.62\00:17:33.46 One of the new type of things that's really happening 00:17:33.49\00:17:35.46 more to the retiring generation is called phone fishing. 00:17:35.49\00:17:39.07 Where they will call you up on the phone 00:17:39.10\00:17:40.72 and they will say I'm from your bank, 00:17:40.75\00:17:42.68 I need to verify such and such information. 00:17:42.71\00:17:45.82 And they will think okay, it's from my bank. 00:17:45.85\00:17:48.12 Hang up, call your bank back, 00:17:48.15\00:17:50.28 don't call back any number they give you 00:17:50.31\00:17:51.84 because they also have someone else on another line. 00:17:51.87\00:17:53.80 Say yes, I'm from your bank 00:17:53.83\00:17:55.12 and they want your information, they want your money. 00:17:55.15\00:17:58.16 So it's more important to always never 00:17:58.19\00:17:59.95 and any email you get that comes supposedly 00:17:59.98\00:18:02.25 from your bank or from Yahoo or Amazon, 00:18:02.28\00:18:05.06 delete it and then go, go straight to their website 00:18:05.09\00:18:08.10 and then find a number where you can call someone. 00:18:08.13\00:18:10.21 You know, I was getting some emails that said 00:18:10.24\00:18:12.52 it was from such and such bank and trying to verify 00:18:12.55\00:18:15.28 my account information and I thought 00:18:15.31\00:18:16.88 I don't have an account with that bank. 00:18:16.91\00:18:19.71 So I called the bank and they aren't even locally around here 00:18:19.74\00:18:23.83 and I called them and I said you know, 00:18:23.86\00:18:25.40 I'm on your email list and they are saying that and they said, 00:18:25.43\00:18:27.57 oh, this is a scam, you know, fraud alert, fraud alert, 00:18:27.60\00:18:30.59 we want you to talk to such and such department. 00:18:30.62\00:18:33.37 Well, it keeps on happening and now it's not just 00:18:33.40\00:18:36.64 with that one bank that I have four, five emails 00:18:36.67\00:18:39.56 from "supposed to be from different banks." 00:18:39.59\00:18:42.91 People and they look so official 00:18:42.94\00:18:44.82 and they got official logo and they wanting 00:18:44.85\00:18:47.30 to verify my account information. 00:18:47.33\00:18:50.49 Now it just so happens I didn't have one 00:18:50.52\00:18:53.15 but had my bank, the email come under 00:18:53.18\00:18:56.76 the name of my banks saying that, you know, 00:18:56.79\00:19:00.57 if you were just like you do so many emails 00:19:00.60\00:19:04.08 you just dash off response. 00:19:04.11\00:19:06.50 I could have accidentally leaked out 00:19:06.53\00:19:09.97 some information to some crooks. 00:19:10.00\00:19:11.78 And they're counting on that. 00:19:11.81\00:19:12.84 They're counting on do you want to be helpful. 00:19:12.87\00:19:15.23 And as one of the things it's called social engineering. 00:19:15.26\00:19:17.92 Where people they go on normal customs 00:19:17.95\00:19:20.43 where people are sitting here it's socially polite to hold 00:19:20.46\00:19:22.77 the door open for someone. You're right. 00:19:22.80\00:19:24.39 But if it's a locked down facility you better not be 00:19:24.42\00:19:26.78 holding that door even if they have a batch. 00:19:26.81\00:19:28.86 You know, even if they say 00:19:28.89\00:19:29.92 they are from the telephone company, you have no proof, 00:19:29.95\00:19:32.23 you need to call and verify. 00:19:32.26\00:19:35.05 Recently we had AT&T came into our building 00:19:35.08\00:19:37.49 and I--and the secretary comes in 00:19:37.52\00:19:39.05 and said AT&T is in our building. 00:19:39.08\00:19:40.19 I said, we have no scheduled repairs. 00:19:40.22\00:19:42.35 I immediately called off them and I said, what's going on? 00:19:42.38\00:19:45.66 And they start tracking down and said, 00:19:45.69\00:19:46.84 oh, we're switching you over to fiber optics from copper. 00:19:46.87\00:19:50.59 And I said we were not informed of this 00:19:50.62\00:19:52.72 that person I want to know make sure 00:19:52.75\00:19:54.22 this is the right person and all they are like, 00:19:54.25\00:19:55.67 you're the first customer out of t the 50 different places 00:19:55.70\00:19:58.97 they been to that day that would actually ask, questioned it. 00:19:59.00\00:20:02.62 And these were big businesses 00:20:02.65\00:20:03.78 that they'd been to that they were telling me about. 00:20:03.81\00:20:06.07 So it could've been some crook. 00:20:06.10\00:20:07.37 It could have been any crook they walk-in just 00:20:07.40\00:20:08.52 because he had AT&T batch, 00:20:08.55\00:20:09.88 they were letting him go right into 00:20:09.91\00:20:11.29 where all those data is stored. 00:20:11.32\00:20:13.90 Now you know we often hear about personal computers 00:20:13.93\00:20:16.61 being compromised, what's the number one avenue 00:20:16.64\00:20:20.26 to compromise your personal computer? 00:20:20.29\00:20:22.38 The number one way, typically, 00:20:22.41\00:20:23.72 your computer gets compromises usually by something you do. 00:20:23.75\00:20:27.50 My wife loves to do different fonts she's a teacher, 00:20:27.53\00:20:31.14 she likes to have different pictures, 00:20:31.17\00:20:32.54 she's always going out saying, 00:20:32.57\00:20:33.60 oh, if I can make this look pretty 00:20:33.63\00:20:35.11 and she's in a quilting guild, she likes to, 00:20:35.14\00:20:36.73 you know, she makes the brochure for them. 00:20:36.76\00:20:39.34 Well, where she's going out 00:20:39.37\00:20:40.40 and getting these different funds, 00:20:40.43\00:20:41.46 often times you don't about the sites you're getting stuff from. 00:20:41.49\00:20:44.51 You have no guarantee that 00:20:44.54\00:20:45.57 they didn't pack a virus in with the font, 00:20:45.60\00:20:48.08 or they didn't pack a virus 00:20:48.11\00:20:49.14 in with that pretty picture or design. 00:20:49.17\00:20:50.39 So you're saying it's just a free download, 00:20:50.42\00:20:52.43 is that what you're saying? Yeah, right. 00:20:52.46\00:20:53.70 So this free downloads are risky. 00:20:53.73\00:20:55.96 They are risky. 00:20:55.99\00:20:57.26 You have to realize that, you keep your antivirus running, 00:20:57.29\00:20:59.85 make sure your firewall's in place. 00:20:59.88\00:21:02.43 You know, I use special software to lock down the hard drive, 00:21:02.46\00:21:05.20 so if something like that happens on your computer, 00:21:05.23\00:21:07.04 I go back to the previous state without the virus there. 00:21:07.07\00:21:10.82 So and we've had a multiple times. 00:21:10.85\00:21:13.44 Really? Yes. 00:21:13.47\00:21:15.12 Now you know that's two things that I've learned 00:21:15.15\00:21:17.53 from you because that an encrypting. 00:21:17.56\00:21:19.04 I don't encrypt my files, but that's you're saying 00:21:19.07\00:21:21.70 that's easy, it sound difficult 00:21:21.73\00:21:23.44 but it's just a piece of software 00:21:23.47\00:21:25.04 and you just have to have the password, 00:21:25.07\00:21:27.62 and when the password's put in 00:21:27.65\00:21:28.88 and then it brings it back into a readable format. 00:21:28.91\00:21:31.85 Right. That's interesting. 00:21:31.88\00:21:32.91 So where there is there some of the safety, 00:21:32.94\00:21:35.46 let's talk about some of the safety consideration 00:21:35.49\00:21:37.80 for digital media and just too in general. 00:21:37.83\00:21:44.62 When you're dealing with digital media, 00:21:44.65\00:21:46.87 you want to make sure that you, if you're like say 00:21:46.90\00:21:50.01 for example a ministry, you want to make sure 00:21:50.04\00:21:52.65 that you've looked at all the considerations exactly 00:21:52.68\00:21:56.60 how we kept the data safe. 00:21:56.63\00:21:58.65 What are we doing with it, how are we storing it, 00:21:58.68\00:22:00.56 how are we transmitting it, 00:22:00.59\00:22:01.62 are we letting people know if something happens. 00:22:01.65\00:22:04.47 And also making sure that there could be 00:22:04.50\00:22:05.94 no other affiliation with your name, 00:22:05.97\00:22:08.56 it's very important to protect the name. 00:22:08.59\00:22:10.56 Then as an individual, 00:22:10.59\00:22:11.75 you want to take those same type of precautions to you, 00:22:11.78\00:22:14.78 with your identity, you're going to be very careful with, 00:22:14.81\00:22:17.66 who you give your information to, your private information, 00:22:17.69\00:22:20.18 your health data, your, you know, physical address, 00:22:20.21\00:22:23.34 your telephone numbers, your cell phone numbers. 00:22:23.37\00:22:25.78 Yeah,-- I just realized 00:22:25.81\00:22:28.37 I'm having a little procedure done in a couple of days 00:22:28.40\00:22:31.95 and I received a phone call on the way here to the studio today 00:22:31.98\00:22:35.72 that I wasn't expecting and they said this is the hospital 00:22:35.75\00:22:38.80 we want to pre register you and went through 00:22:38.83\00:22:41.88 and I gave them all my personal information 00:22:41.91\00:22:44.08 including my social security card 00:22:44.11\00:22:45.83 and then they asked for my husband 00:22:45.86\00:22:47.40 and his social security card and it was until I hung up 00:22:47.43\00:22:50.89 because I was just in the mad dash over here 00:22:50.92\00:22:52.70 from to the studio and I realized, 00:22:52.73\00:22:56.30 I hope this was really the hospital 00:22:56.33\00:22:58.42 because they just called me on my cell phone 00:22:58.45\00:23:00.48 and I started answering all this personal information. 00:23:00.51\00:23:05.02 Right and that's a very common thing that's happening. 00:23:05.05\00:23:08.23 And there's a gentleman who's actually being going 00:23:08.26\00:23:09.82 between America and Canada, we finally -- 00:23:09.85\00:23:12.00 and FBI finally caught him in Canada 00:23:12.03\00:23:14.07 but he was doing this exact thing, 00:23:14.10\00:23:16.00 doing phone fishing, he would pull 00:23:16.03\00:23:17.86 records out of hospitals this type of stuff 00:23:17.89\00:23:20.24 and they would pay different people on their salary 00:23:20.27\00:23:22.21 to give them this type of information 00:23:22.24\00:23:23.42 and then they would start calling people 00:23:23.45\00:23:24.95 and asking that type of information. 00:23:24.98\00:23:26.71 I know several people including people who work for the FBI, 00:23:26.74\00:23:29.27 when they go into a hospital, 00:23:29.30\00:23:30.82 they refuse to give their social security number. 00:23:30.85\00:23:33.60 Really? Refuse. 00:23:33.63\00:23:35.69 And they have to go ahead and, I mean... 00:23:35.72\00:23:37.50 They start to treat him, I'll give you my driver's license, 00:23:37.53\00:23:40.12 I'll give you that but I'll not give you 00:23:40.15\00:23:41.72 my social security number. 00:23:41.75\00:23:42.81 These are people who work 00:23:42.84\00:23:43.87 for the government in cyber security. 00:23:43.90\00:23:46.36 So they've gone to that approach 00:23:46.39\00:23:48.31 and they said makes the hospital grumpy 00:23:48.34\00:23:49.80 but they eventually get over. 00:23:49.83\00:23:53.44 Now you tell me. 00:23:53.47\00:23:55.37 If only we'd had this conversation 00:23:55.40\00:23:57.44 just a few hour earlier. 00:23:57.47\00:23:59.57 But now it's interesting that you're talking about ministries 00:23:59.60\00:24:01.60 because I know that we do a lot here at 3ABN before firewalls 00:24:01.63\00:24:05.93 and protecting all this information, 00:24:05.96\00:24:07.70 make sure they're secured. 00:24:07.73\00:24:09.23 But are there templates and recommendations 00:24:09.26\00:24:12.10 from ministries about how they should handle 00:24:12.13\00:24:15.60 and protect the personal information that they receive? 00:24:15.63\00:24:18.66 They're and I actually have them on my website. 00:24:18.69\00:24:21.85 What I've done is they are legal office of the general conference 00:24:21.88\00:24:25.00 has developed a bunch of templates for the ministries. 00:24:25.03\00:24:27.74 As far as a privacy policy, as far as a release 00:24:27.77\00:24:31.40 form for pictures or media release, 00:24:31.43\00:24:33.97 they've made all these policies 00:24:34.00\00:24:35.45 and I've just put them on my website 00:24:35.48\00:24:37.19 because I've been working with them 00:24:37.22\00:24:38.67 as we've been making these different 00:24:38.70\00:24:39.97 media release forms and stuff like that. 00:24:40.00\00:24:41.47 So they're listed on my website, 00:24:41.50\00:24:42.71 you can download them for free, 00:24:42.74\00:24:44.24 you can go and change them, 00:24:44.27\00:24:45.71 modify them for your particular ministry. 00:24:45.74\00:24:48.33 Now we're talking today about protecting your identity 00:24:48.36\00:24:52.16 from identity theft and particularly, 00:24:52.19\00:24:54.34 your young children that because that's becoming prevalent. 00:24:54.37\00:24:57.88 What can we do if your identity 00:24:57.91\00:25:01.90 in the security has been breached 00:25:01.93\00:25:03.21 and your identity has been stolen, 00:25:03.24\00:25:04.92 what does somebody do? 00:25:04.95\00:25:06.49 First thing you do is you want to put a fraud alert 00:25:06.52\00:25:08.15 on your credit history. 00:25:08.18\00:25:10.10 Then you want to start calling all of the different people 00:25:10.13\00:25:11.99 that you have lines of credit with 00:25:12.02\00:25:13.35 and let them know what's going on. 00:25:13.38\00:25:15.30 You know, maker sure you're using numbers 00:25:15.33\00:25:16.77 that you know are valid and are good. 00:25:16.80\00:25:18.83 After when you've done that then you need 00:25:18.86\00:25:20.21 to take an assessment of where are you, 00:25:20.24\00:25:22.74 what's being impact often times it will, 00:25:22.77\00:25:24.95 you need to take a day off work to just sort of through 00:25:24.98\00:25:26.75 all the different complications we have 00:25:26.78\00:25:28.76 because you know some person will have a mortgage, 00:25:28.79\00:25:30.66 they will have you know, maybe a car loan or, you know, 00:25:30.69\00:25:33.29 college loan depending upon if they just got out of college. 00:25:33.32\00:25:35.16 You know, there's always different things 00:25:35.19\00:25:36.24 that have to be taken in consideration, 00:25:36.27\00:25:38.16 so you go through each one of those one by one 00:25:38.19\00:25:40.63 and be very careful and then really pay 00:25:40.66\00:25:42.79 close attention to your credit history. 00:25:42.82\00:25:45.77 After you've done that then the best thing you can do is try 00:25:45.80\00:25:47.57 and see how is it compromised, 00:25:47.60\00:25:49.67 try to determine exactly what, where it came from. 00:25:49.70\00:25:52.40 Once you know where it came 00:25:52.43\00:25:53.46 from then you can hopefully use your personal computer 00:25:53.49\00:25:55.56 if you're pretty sure it was there then deal with it there, 00:25:55.59\00:25:58.33 but I always try to track it back down 00:25:58.36\00:25:59.67 to its root source that way it won't happen again. 00:25:59.70\00:26:02.22 Okay, you know we had a gentleman here 00:26:02.25\00:26:04.57 at the ministry who had his laptop stolen. 00:26:04.60\00:26:08.34 He was on the road crew and traveling 00:26:08.37\00:26:10.30 and he had his laptop stolen from the hotel room 00:26:10.33\00:26:13.43 and literally it took him over a year 00:26:13.46\00:26:16.47 to get everything restored and back in place 00:26:16.50\00:26:19.22 when his identity was stolen. 00:26:19.25\00:26:21.29 And I'm sitting here thinking 00:26:21.32\00:26:23.08 that may be one good piece of advise 00:26:23.11\00:26:27.06 is don't get in a rush about things 00:26:27.09\00:26:28.84 because today I realize that I had, 00:26:28.87\00:26:33.76 I did two stupid things in giving out all this information 00:26:33.79\00:26:36.20 when I wasn't sure it was the hospital, 00:26:36.23\00:26:38.21 but I also got online paid a credit card bill without this, 00:26:38.24\00:26:42.47 usually I always look to make sure all the charges are mine 00:26:42.50\00:26:46.03 but this time I just paid it because I was in a hurry 00:26:46.06\00:26:49.43 and that's one way we need to check all of our charges too 00:26:49.46\00:26:52.58 to make sure someone's not out there using our charge. 00:26:52.61\00:26:55.43 Very much so that's actually 00:26:55.46\00:26:56.65 how I found that my identity had been stolen 00:26:56.68\00:26:58.33 because mine the time when mine happened was, 00:26:58.36\00:27:00.72 I gave someone a debit card. 00:27:00.75\00:27:02.14 Yeah, so that's something. 00:27:02.17\00:27:04.21 Thank you so much and let me give your information 00:27:04.24\00:27:06.54 at one more time if you want to go to this website, 00:27:06.57\00:27:08.59 it's es-es.net and there is free information 00:27:08.62\00:27:14.87 on how to protect yourself in this. 00:27:14.90\00:27:16.86 Ernest you had just been a wealth of information 00:27:16.89\00:27:19.85 and we've learned so much, 00:27:19.88\00:27:20.91 I'm so glad that you made this your ministry. 00:27:20.94\00:27:22.92 Thank you. And thank you for coming. 00:27:22.95\00:27:25.38 For those of you who are at home, 00:27:25.41\00:27:26.64 remember and share this with all the parents that you know. 00:27:26.67\00:27:30.49 It's not just as adults we're working 00:27:30.52\00:27:32.66 and having banking information that get our identity stolen, 00:27:32.69\00:27:35.77 but the identity thefts are going after children's identity 00:27:35.80\00:27:39.62 and kids by the time they are 18 are finding 00:27:39.65\00:27:42.05 they've got horrible credit reports 00:27:42.08\00:27:43.88 because someone has been using their identity. 00:27:43.91\00:27:46.32 Let's protect our identity and be thankful 00:27:46.35\00:27:49.54 that we have a new identity in Christ Jesus. 00:27:49.57\00:27:53.11 Thank you for joining us. 00:27:53.14\00:27:54.40