Participants: Shelley Quinn (Host), Ernest Staats
Series Code: IAA
Program Code: IAA000331
00:30 Hello and welcome to again to "Issues and Answers."
00:33 We're so glad that you could join us today 00:35 and you're going to be glad too. 00:36 I want to encourage you to get a pencil and a paper, 00:39 no matter where you are. 00:41 And if particularly if you're a parent, 00:43 we are going to be talking today about identity theft. 00:47 And this is something that is happening 00:49 to all age groups, not just adults. 00:52 You're going to be shocked, at least I was. 00:55 And I want you to sit down and write down 00:58 some of this information, 00:59 so that you will know how to protect your identity. 01:02 This is something that identity theft is becoming 01:06 much more prevalent than we realize. 01:08 And it can be very dangerous 01:10 and cause you a lot of problems. 01:12 You know, the Lord Jesus said in Matthew 10:16. 01:16 He said, "Behold I'm sending you out like sheep 01:19 in the midst of the wolves, be wary, 01:23 be wise as serpents and gentle as doves." 01:27 We've got to become wise as those serpents 01:30 who are trying to steal our identity. 01:32 And here today to tell us how we might protect 01:35 that identity is Ernest Staats. 01:38 Ernest, thank you so much for joining us again. 01:40 You're welcome. 01:41 You know, I always enjoy when you're here 01:42 because you're very knowledgeable on this topic of. 01:46 You're, I mean your degree is in actually, 01:49 your masters, isn't it? 01:50 My masters, yes. Is in internet--I mean-- 01:53 Network Security. Network Security. 01:56 And so you are the IT Director 01:58 for the Georgia-Cumberland Academy. 02:01 And that is in... 02:04 Calhoun, Georgia. Calhoun, Georgia. 02:06 I had a brain freeze in. Anyway, we're glad you're back. 02:10 So tell me you and I were talking before the program. 02:15 And you shocked me because I've only thought 02:18 of identity theft as being an issue for adults. 02:22 You said, otherwise. That's right. 02:24 I wish it was just an adult issue 02:26 because I know it would be one less thing I have to do. 02:28 But I have, I have young girl, 4-years-old, Nariah. 02:31 But the statistics are proving out 02:33 the last few years has been really a surprise. 02:36 People have been turning 18 and they'd be finding out 02:38 they have a horrible credit rating. 02:40 And they're trying to figure what's going on 02:41 and they found out that, 02:43 they found that social security numbers 02:45 were not that protective of young people. 02:47 Schools, public schools, you know that different areas 02:50 where it's-- they were people getting-- 02:51 if we can hold of the social security number, 02:53 they then just change the birth date. 02:55 So they're finding that the actual largest growing 02:57 market of identity theft right now today 03:00 is in young children. 03:01 And I don't suppose people think to even, 03:04 I certainly wouldn't think to check 03:06 the credit reports on my child. 03:10 Right. I wouldn't have thought about it either. 03:12 When I was at cyber crime seminar 03:13 which is a gathering of all the top FBI people, 03:15 dealing with this type of issue in Atlanta, 03:17 year ago they talked about the fact 03:19 that this is becoming such a large issue now 03:21 that they are recommending every parent, 03:24 if your child is over 2 years of age 03:26 to start checking their credit report 03:28 history every year, once a year. 03:30 There is just one more thing to worry about, isn't there? 03:33 So what can we do to protect our family's identity? 03:37 There is a lot of steps you can take. 03:38 First of all, you're going to be careful about 03:39 who you give your information to. 03:41 You want to make sure that they're being careful 03:43 with the information and you have every right to say, 03:46 how is this going to be stored? 03:48 You know, if you walk into a place 03:49 where you see credit card number is just stacked up, 03:51 there's a problem. Okay. 03:52 You know, if nobody's there watching the counter. 03:54 But you want to just take some precautionary steps, 03:57 we recommend and actually the FBI also recommends 04:00 that you don't receive any type of mail 04:02 to your mailbox unless it's a locked mailbox. 04:05 Or you have it deliver to a post office box. 04:08 You just have your personal mail coming there, 04:10 but no financial information whatsoever. 04:12 We've gone at our house, we've gone to all online banking 04:15 and we even get our statements electronically. 04:18 You see, there's something think 04:19 oh, mercy now that's really dangerous to do online banking. 04:23 But you are saying it's actually safer. 04:25 I think it's a lot safer in lot of ways 04:26 because a lot of people are doing 04:27 what are called, what's called dumpster diving 04:29 or trash diving where there's actually companies 04:32 that hire people that when your trash gets taken out, 04:34 they go through the trash 04:35 looking for that type of information. 04:37 Now say I use a shredder at home, 04:39 I mean, for everything just about 04:41 that has to do with any kind of personal information, 04:43 any kind of I use a shredder for credit card offers, 04:48 you know, anything like that. 04:50 And that's what you should be doing. 04:51 That's excellent. 04:52 Because shredders are cheap, 04:54 you know, compared to someone who has lost their identity. 04:56 And I had someone you know, take my identity once also. 04:59 And it took me months to re-gather 05:01 all the information that they took 05:03 and they charged up stuff on my 05:05 and it was going straight out of my debit card, 05:06 so it came straight out of my account. 05:08 So with that paper shredder, you know for 20, 30, 05:12 even 50 bucks if you go buy an expensive one 05:14 that will shred CDs that has electronic data. 05:16 You know, that's not a huge expense. 05:19 And the other thing that I do is recently 05:21 we had a laptop computer that was beyond repair. 05:26 And so before I donated it to someone else, 05:30 I took out all the hard drive, I took out anything that could 05:34 have any kind of data, 05:35 even though it had been erased stuff out now, 05:37 I know somebody could be smart enough to retrieve it. 05:39 So I'm very careful that way. 05:41 And that's really important, because like for us, 05:43 the financial computer we retired last year, 05:46 one of the computers at GCA. 05:47 We formatted the hard drive. Right. 05:49 Then we formatted it was a drill 05:52 and we took a drill and went through it several times 05:54 with a drill and literally went through physically destroyed it, 05:58 because it had the financial data 06:00 of people who came to our academy and stuff. 06:01 That's the only way to truly be make sure 06:04 that it is beyond anybody getting information 06:07 of if it's physically destroyed. 06:08 Even if you format it, 06:09 I have software where I can unformat it. 06:12 And it's open to the public, it's online. 06:14 All right. So we got to be careful. 06:16 What are some other ways? 06:17 Besides we want to make sure 06:18 that you protect your information, 06:20 you want to make sure you receiving stuff 06:21 in a secured fashion. 06:23 If you receive stuff on your computer 06:25 and people say oh, you know, 06:26 you do any electronic transactions 06:27 you need to be really worried about that. 06:29 To me, I'm more worried honestly 06:31 than the electronic transactions, 06:32 I'm more worried about handing my debit card 06:34 to someone at a restaurant. 06:36 You actually had an experience, didn't you? 06:37 I had an experience and it bit me. 06:39 And I handed a debit card 06:40 and they charged a bunch of things 06:41 and it came straight out of my account. 06:43 Now I always make sure it's a credit card 06:45 that I can go back and I can dispute the charges. 06:48 Debit card never leaves my hand, it's my philosophy. 06:52 So but a credit card then I can get of someone, 06:55 because you get something to stand on. 06:56 The other issues you want to look at 06:58 as you're doing this and you're trying to keep yourself safe, 07:01 you want to make sure that you have everything secured 07:03 including your computer, most people think about this, 07:05 they will go home and they will put wireless in their house 07:08 because it's convenient, they don't realize 07:10 that their neighbors over there can see everything 07:11 they're doing on their wireless network 07:13 including their banking transactions 07:15 and other thing, so you want to be-- 07:16 Oh, really, I was just thinking of having wireless 07:18 in my home but you're saying that's not a good. 07:20 No, it's not bad to do it all, I've got wireless 07:23 but on my website es-es.net. 07:26 I have narrative PowerPoint that tells 07:28 you how to secure you wireless. 07:30 If you don't secure your wireless, 07:31 then you're asking for trouble. 07:33 But if you secure your wireless, it's not a problem at all. 07:36 Because there's not too many, 07:37 I know that sophisticated hackers might get beyond 07:41 some firewalls and the decryption things 07:44 but for most of your neighbors 07:46 are not going to have that kind of look. 07:49 And that's probably, you know, you need to take 07:51 in consideration where you are at, 07:52 if you're living in downtown, metropolitan area. 07:54 You know, if you're living out in the country, 07:56 I still would put security on it. 07:58 But you know I won't be quite so worried 07:59 as going to the high level, 08:00 I always put what's called WPA security. 08:03 And if you go on to my website, 08:05 you can look at the PowerPoint it will explain all this to you. 08:08 And that's more than we have time for today 08:10 And one thing that I learned not to do many years ago, 08:13 I used to carry my social security card in my wallet 08:17 and I had my credit cards 08:18 and you got the checkbook in there 08:20 and I have my social security card. 08:22 And all of a sudden it dawned on me. 08:24 Well, if I ever lost my wallet my identity is gone. 08:27 It is. 08:29 And but I recommend also for people to do 08:31 and I've done this because we do quite a bit of traveling, 08:33 my wife and myself with our little girl. 08:35 I've taken out everything that's in her purse 08:37 and everything that's in my wallet and I've photocopied it. 08:40 And then I sent it to a friend who I know 08:42 he's got a fire safe and I trust him implicitly. 08:45 He's an accountant. 08:48 He has it saved there, so it's inner fire safe, 08:51 so if something happens, I can call him 08:52 and get on my numbers right away. 08:54 Oh, that's smart. 08:55 So, or you know, we've also sent stuff, 08:57 we've got pictures of our first little girl who passed away. 08:59 I've got copies of those at my house 09:01 and then I've also have a copy at my parent's house 09:03 in case we had a house fire. 09:05 You know, there are some things that you want them 09:06 that are a worth more value to that you 09:08 want to make sure that you have copies or duplicates of. 09:11 And that's one of the things I recommend is 09:12 if you do a lot of traveling to do that, 09:14 if you're going to be leaving the country, 09:15 that's very important. Okay. 09:17 So how about, can't you place a fraud alert 09:22 on your credit cards? 09:24 Yes, you can. 09:25 And matter of fact I just received the notice 09:26 because I used to work for the State of Georgia 09:27 that I need to put a fraud alert alarms, 09:29 because they just lost the hard drive that had all the data, 09:31 all of those personal information on 09:33 for all the employees of the state of Georgia 09:35 for the last 15 years. 09:37 So but when you do that, 09:38 you want to place your fraud alert, 09:39 you can also go to annualreport.com. 09:42 You know, and your creditreport.com, 09:44 it's on my website, you can link from my website. 09:47 If you don't remember the URL and it will take you out 09:48 and there's 3 different companies out there 09:51 that you can go through and check your credit reports. 09:53 I only check one at a time, I don't do all three. 09:55 Explain why? 09:56 Because I check the first one, I wait about 3 months 09:59 then I check the second one. 10:01 Then I wait about 3 months and then I check the third one. 10:03 So that I'm kind of getting them throughout 10:05 the whole year, not just once a year doing it. 10:07 That way I can go through just because if something shows up 10:10 kind of funky on one then I can say, 10:11 okay, there is something going on, I can go ahead if I need to, 10:13 I can run the second one against it, 10:15 because it's been long enough time period. 10:17 So if you do that every 3 or 4 months you know, 10:19 you can kind of go through and check through 10:21 and see exactly what's happening with your credit reports 10:23 and like I said I check my daughter's too 10:25 and she's only 4-years-old. 10:27 And what is the charge for something like that? 10:30 If you're doing the annualreport.com, 10:31 it's nothing, it's free. Annualreport.com. 10:35 Annualcreditreport.com and you can go through 10:37 and pull it off once a year 10:39 from each of those different agencies for free. 10:41 We can get all three for free. 10:43 You get all three as long as you only do one at a time. 10:46 So you spread them every 3 or 4 months, you know. 10:48 I just have got-- there are certain months 10:50 where I do things like taxes, when I do my taxes, 10:52 I do the credit reports at the same time. 10:54 How can you secure your online connections 10:56 when you're talking about the banking 10:59 and all of the stuff, let's talk about this more. 11:02 When yours, first of all you want to make sure 11:03 that your bank has good security in place 11:06 or if you're buying something online. 11:07 I mean, like we were talking offline, 11:09 I even buy my groceries online. 11:12 When I do that I got to make sure that it's a secure site. 11:15 It will usually say in the URL, https and it will have a colon. 11:20 And then it will have you know, and they will have a colon 11:22 and then have the rest of the website, 11:23 you know, www, whatever. 11:25 But the "s" means it's a secure connection. 11:28 Typically you will see if you have an older browser, 11:31 you will see a padlock down at the bottom right hand corner, 11:34 a golden padlock. 11:35 If that padlock is gold and it's locked it's secure. 11:38 If you have a newer browser 11:40 and it's not a secure connection, 11:42 it will pop up with an alert 11:43 and it will tell you Internet Explorer, Mozilla, 11:45 these newer browsers if they're latest versions they will say, 11:48 this is an unsecured connection, 11:49 do you want to go here? 11:51 If it's you bank or something you're buying from, no way. 11:54 You don't want to go there because there's a problem 11:55 that is being compromised. 11:57 You also want to make sure that any place 11:59 you're going to has a physical address. 12:01 I would never buy something 12:02 that's just purely an online site. 12:04 They don't have some type of physical address 12:05 that you can reference back to. 12:07 Because you have no idea who are you dealing with? 12:10 And where they are at, once you've done those steps, 12:12 then you want to make sure your basic computer is safe. 12:15 You want to make sure you've got all your Microsoft updates 12:17 if you're running Windows, if you're running Macintosh 12:19 or what, you know, Linux, one of these others, 12:21 you can also got to update those too. 12:23 You know, I'm rather, when you take Microsoft 12:26 updates I always get my entire virus software updates 12:30 just where it's an automatic thing. 12:32 But I'm reluctant about getting the updates on the Microsoft 12:36 because one time I didn't update it 12:39 and it messed up my computer so badly 12:41 and it took a week practically to get it all straightened out. 12:45 But you're saying that that is a good idea, 12:47 because there are new security enhancements in these updates. 12:51 What I typically do is I just make sure 12:53 it's the security enhancements, 12:54 I don't always go down like 12:56 they got a new player of windows media player 12:58 or something that, you know, it's an optional download, 13:00 I don't always do that, I only do the security enhancements. 13:03 You still can run into a problem but if you go to my website, 13:06 I'll step you through on how to do what's called 13:08 a restore point in Windows. 13:10 And let's talk about your website 13:11 because this is a free resource 13:13 that you just a part of your ministry. 13:16 And that website address, 13:17 if you want to write this down is es-es.net. 13:24 Let me repeat that es-es.net. 13:29 Not trying to sell you anything 13:31 but there is a narrative, there is a narrative PowerPoint 13:34 on there that will walk you through some of these things 13:36 as well as some good links. 13:38 It's very educational and it's free. 13:41 So that's quite a service and we thank you for that. 13:45 One of the things that when people are looking to save, 13:48 sometimes we get concerned because of its terminology, 13:50 well, I don't know that, you know, 13:51 people say I have Microsoft. 13:53 You know, I don't know if I got Windows or you know what I have. 13:56 But if you go through I would also, 13:58 you know, talk to young person at the church 14:00 who you go to church with you or some young person 14:02 that you feel like is a trustworthy young person, 14:04 they can help step you through this, 14:06 they can your antivirus up to date. 14:08 And you need to have antivirus software. 14:11 You need to make sure that your firewall is turned on. 14:14 Windows comes built with a firewall. 14:16 You know, Macintosh comes built with a firewall. 14:19 They need to be turned on. They are not always turned on. 14:22 I'm not even sure, I didn't know that it came with the firewall. 14:24 So I'm sure mine is turned on. 14:26 But most of time in the newer version of Windows, 14:27 they will be a nice little red icon down 14:29 at the bottom right hand corner 14:30 if your firewall is turned off alerting you, 14:33 if you have a newer version of Windows. 14:34 You know saying there's a problem, 14:36 your firewall is off, do you want to turn it on? 14:37 Okay. And then you can say yes. 14:39 What about encrypting files that sounds 14:42 so sophisticated and difficult? 14:45 It sounds it but it's really not. 14:47 There are several different software packages out 14:49 in the market that make encrypting very easy. 14:51 I encrypt all of our personal banking, our tax records. 14:54 They go to a certain section on my hard drive 14:56 that I encrypt and I have to put a password to get into it. 14:59 And on my website there are several 15:00 different software packages 15:01 that I list out and I go for the ones that are free 15:04 because I like the price. 15:05 So explain that because some people may not know 15:07 what we're talking about encrypting a file. 15:10 When you encrypt a file basically it takes all 15:12 the data and it scrambles it into a mathematical formula. 15:15 And what it does it makes for somebody else, 15:17 it's very hard for someone else 15:18 to figure out what that data was. 15:20 So if you're at the airport 15:22 and your laptop is stolen as Cherri Peters 15:24 was recently traveling here 15:26 and she was running late for the airplane. 15:29 And so, and she went through security somehow 15:31 she got delayed for a moment. 15:33 And she picked up everything 15:34 and went dashing off to the gate 15:38 and realized, I got a light load. 15:40 She left her computer back on the belt and it was stolen. 15:45 So if your computer is stolen and your files are encrypted 15:49 there's important files they can't read it. 15:52 And I--we do that for all of our financial 15:55 or personal data on laptops. 15:56 And actually the North American division 15:58 and the general conference is highly recommending 16:00 for all the ministries. 16:01 If you have any personal information about people 16:04 that your laptop should, 16:05 your entire hard drive should be encrypted. 16:07 And that--did we just recently have something 16:10 with veterans that laptops were stolen 16:12 and all these identities were stolen because or at risk, 16:16 because this information had gotten out. 16:20 And that's what happens with me, 16:21 because I used to be a employee of the State of Georgia. 16:23 When I worked for the State of Georgia 16:24 that was non encrypted hard drive. 16:26 They did put it in the letter that what besides 16:28 letting us know this would happen they said 16:29 they are now making a policy to encrypt 16:32 all the removable storage, which I was, 16:35 should have happened before but you know, 16:36 that's something that is becoming 16:38 more and more part of life. 16:39 And it's not as hard basically just makes 16:41 one more password you have to remember. 16:44 You have the state method, 16:45 you say being online is like being in-- 16:48 The worst crime neighborhood in the world 16:51 and you need to realize that. 16:53 Because you have all of the criminals out there, 16:57 you also have some really great people. 16:58 But you seem to realize it's a high crime neighborhood. 17:01 And so we just have to learn how to protect ourselves 17:03 when we are online. That is correct. 17:06 Part of this is being smart when you are online, 17:09 but also just using a little bit of common sense 17:11 when you go out there. 17:12 If it's the site you've never seen, 17:13 if it offers too good to be true. 17:16 It's too good to be true. 17:17 If you get contacted by some brother 17:19 in another foreign country it says, brother in Christ, 17:22 I've got this money that we need to get to the United States. 17:25 I can't tell you how often those come to me. 17:28 They are not a brother and they are, 17:29 you know, not really in Christ. 17:31 All they want to do is get your money. 17:33 One of the new type of things that's really happening 17:35 more to the retiring generation is called phone fishing. 17:39 Where they will call you up on the phone 17:40 and they will say I'm from your bank, 17:42 I need to verify such and such information. 17:45 And they will think okay, it's from my bank. 17:48 Hang up, call your bank back, 17:50 don't call back any number they give you 17:51 because they also have someone else on another line. 17:53 Say yes, I'm from your bank 17:55 and they want your information, they want your money. 17:58 So it's more important to always never 17:59 and any email you get that comes supposedly 18:02 from your bank or from Yahoo or Amazon, 18:05 delete it and then go, go straight to their website 18:08 and then find a number where you can call someone. 18:10 You know, I was getting some emails that said 18:12 it was from such and such bank and trying to verify 18:15 my account information and I thought 18:16 I don't have an account with that bank. 18:19 So I called the bank and they aren't even locally around here 18:23 and I called them and I said you know, 18:25 I'm on your email list and they are saying that and they said, 18:27 oh, this is a scam, you know, fraud alert, fraud alert, 18:30 we want you to talk to such and such department. 18:33 Well, it keeps on happening and now it's not just 18:36 with that one bank that I have four, five emails 18:39 from "supposed to be from different banks." 18:42 People and they look so official 18:44 and they got official logo and they wanting 18:47 to verify my account information. 18:50 Now it just so happens I didn't have one 18:53 but had my bank, the email come under 18:56 the name of my banks saying that, you know, 19:00 if you were just like you do so many emails 19:04 you just dash off response. 19:06 I could have accidentally leaked out 19:10 some information to some crooks. 19:11 And they're counting on that. 19:12 They're counting on do you want to be helpful. 19:15 And as one of the things it's called social engineering. 19:17 Where people they go on normal customs 19:20 where people are sitting here it's socially polite to hold 19:22 the door open for someone. You're right. 19:24 But if it's a locked down facility you better not be 19:26 holding that door even if they have a batch. 19:28 You know, even if they say 19:29 they are from the telephone company, you have no proof, 19:32 you need to call and verify. 19:35 Recently we had AT&T came into our building 19:37 and I--and the secretary comes in 19:39 and said AT&T is in our building. 19:40 I said, we have no scheduled repairs. 19:42 I immediately called off them and I said, what's going on? 19:45 And they start tracking down and said, 19:46 oh, we're switching you over to fiber optics from copper. 19:50 And I said we were not informed of this 19:52 that person I want to know make sure 19:54 this is the right person and all they are like, 19:55 you're the first customer out of t the 50 different places 19:59 they been to that day that would actually ask, questioned it. 20:02 And these were big businesses 20:03 that they'd been to that they were telling me about. 20:06 So it could've been some crook. 20:07 It could have been any crook they walk-in just 20:08 because he had AT&T batch, 20:09 they were letting him go right into 20:11 where all those data is stored. 20:13 Now you know we often hear about personal computers 20:16 being compromised, what's the number one avenue 20:20 to compromise your personal computer? 20:22 The number one way, typically, 20:23 your computer gets compromises usually by something you do. 20:27 My wife loves to do different fonts she's a teacher, 20:31 she likes to have different pictures, 20:32 she's always going out saying, 20:33 oh, if I can make this look pretty 20:35 and she's in a quilting guild, she likes to, 20:36 you know, she makes the brochure for them. 20:39 Well, where she's going out 20:40 and getting these different funds, 20:41 often times you don't about the sites you're getting stuff from. 20:44 You have no guarantee that 20:45 they didn't pack a virus in with the font, 20:48 or they didn't pack a virus 20:49 in with that pretty picture or design. 20:50 So you're saying it's just a free download, 20:52 is that what you're saying? Yeah, right. 20:53 So this free downloads are risky. 20:55 They are risky. 20:57 You have to realize that, you keep your antivirus running, 20:59 make sure your firewall's in place. 21:02 You know, I use special software to lock down the hard drive, 21:05 so if something like that happens on your computer, 21:07 I go back to the previous state without the virus there. 21:10 So and we've had a multiple times. 21:13 Really? Yes. 21:15 Now you know that's two things that I've learned 21:17 from you because that an encrypting. 21:19 I don't encrypt my files, but that's you're saying 21:21 that's easy, it sound difficult 21:23 but it's just a piece of software 21:25 and you just have to have the password, 21:27 and when the password's put in 21:28 and then it brings it back into a readable format. 21:31 Right. That's interesting. 21:32 So where there is there some of the safety, 21:35 let's talk about some of the safety consideration 21:37 for digital media and just too in general. 21:44 When you're dealing with digital media, 21:46 you want to make sure that you, if you're like say 21:50 for example a ministry, you want to make sure 21:52 that you've looked at all the considerations exactly 21:56 how we kept the data safe. 21:58 What are we doing with it, how are we storing it, 22:00 how are we transmitting it, 22:01 are we letting people know if something happens. 22:04 And also making sure that there could be 22:05 no other affiliation with your name, 22:08 it's very important to protect the name. 22:10 Then as an individual, 22:11 you want to take those same type of precautions to you, 22:14 with your identity, you're going to be very careful with, 22:17 who you give your information to, your private information, 22:20 your health data, your, you know, physical address, 22:23 your telephone numbers, your cell phone numbers. 22:25 Yeah,-- I just realized 22:28 I'm having a little procedure done in a couple of days 22:31 and I received a phone call on the way here to the studio today 22:35 that I wasn't expecting and they said this is the hospital 22:38 we want to pre register you and went through 22:41 and I gave them all my personal information 22:44 including my social security card 22:45 and then they asked for my husband 22:47 and his social security card and it was until I hung up 22:50 because I was just in the mad dash over here 22:52 from to the studio and I realized, 22:56 I hope this was really the hospital 22:58 because they just called me on my cell phone 23:00 and I started answering all this personal information. 23:05 Right and that's a very common thing that's happening. 23:08 And there's a gentleman who's actually being going 23:09 between America and Canada, we finally -- 23:12 and FBI finally caught him in Canada 23:14 but he was doing this exact thing, 23:16 doing phone fishing, he would pull 23:17 records out of hospitals this type of stuff 23:20 and they would pay different people on their salary 23:22 to give them this type of information 23:23 and then they would start calling people 23:24 and asking that type of information. 23:26 I know several people including people who work for the FBI, 23:29 when they go into a hospital, 23:30 they refuse to give their social security number. 23:33 Really? Refuse. 23:35 And they have to go ahead and, I mean... 23:37 They start to treat him, I'll give you my driver's license, 23:40 I'll give you that but I'll not give you 23:41 my social security number. 23:42 These are people who work 23:43 for the government in cyber security. 23:46 So they've gone to that approach 23:48 and they said makes the hospital grumpy 23:49 but they eventually get over. 23:53 Now you tell me. 23:55 If only we'd had this conversation 23:57 just a few hour earlier. 23:59 But now it's interesting that you're talking about ministries 24:01 because I know that we do a lot here at 3ABN before firewalls 24:05 and protecting all this information, 24:07 make sure they're secured. 24:09 But are there templates and recommendations 24:12 from ministries about how they should handle 24:15 and protect the personal information that they receive? 24:18 They're and I actually have them on my website. 24:21 What I've done is they are legal office of the general conference 24:25 has developed a bunch of templates for the ministries. 24:27 As far as a privacy policy, as far as a release 24:31 form for pictures or media release, 24:34 they've made all these policies 24:35 and I've just put them on my website 24:37 because I've been working with them 24:38 as we've been making these different 24:40 media release forms and stuff like that. 24:41 So they're listed on my website, 24:42 you can download them for free, 24:44 you can go and change them, 24:45 modify them for your particular ministry. 24:48 Now we're talking today about protecting your identity 24:52 from identity theft and particularly, 24:54 your young children that because that's becoming prevalent. 24:57 What can we do if your identity 25:01 in the security has been breached 25:03 and your identity has been stolen, 25:04 what does somebody do? 25:06 First thing you do is you want to put a fraud alert 25:08 on your credit history. 25:10 Then you want to start calling all of the different people 25:12 that you have lines of credit with 25:13 and let them know what's going on. 25:15 You know, maker sure you're using numbers 25:16 that you know are valid and are good. 25:18 After when you've done that then you need 25:20 to take an assessment of where are you, 25:22 what's being impact often times it will, 25:24 you need to take a day off work to just sort of through 25:26 all the different complications we have 25:28 because you know some person will have a mortgage, 25:30 they will have you know, maybe a car loan or, you know, 25:33 college loan depending upon if they just got out of college. 25:35 You know, there's always different things 25:36 that have to be taken in consideration, 25:38 so you go through each one of those one by one 25:40 and be very careful and then really pay 25:42 close attention to your credit history. 25:45 After you've done that then the best thing you can do is try 25:47 and see how is it compromised, 25:49 try to determine exactly what, where it came from. 25:52 Once you know where it came 25:53 from then you can hopefully use your personal computer 25:55 if you're pretty sure it was there then deal with it there, 25:58 but I always try to track it back down 25:59 to its root source that way it won't happen again. 26:02 Okay, you know we had a gentleman here 26:04 at the ministry who had his laptop stolen. 26:08 He was on the road crew and traveling 26:10 and he had his laptop stolen from the hotel room 26:13 and literally it took him over a year 26:16 to get everything restored and back in place 26:19 when his identity was stolen. 26:21 And I'm sitting here thinking 26:23 that may be one good piece of advise 26:27 is don't get in a rush about things 26:28 because today I realize that I had, 26:33 I did two stupid things in giving out all this information 26:36 when I wasn't sure it was the hospital, 26:38 but I also got online paid a credit card bill without this, 26:42 usually I always look to make sure all the charges are mine 26:46 but this time I just paid it because I was in a hurry 26:49 and that's one way we need to check all of our charges too 26:52 to make sure someone's not out there using our charge. 26:55 Very much so that's actually 26:56 how I found that my identity had been stolen 26:58 because mine the time when mine happened was, 27:00 I gave someone a debit card. 27:02 Yeah, so that's something. 27:04 Thank you so much and let me give your information 27:06 at one more time if you want to go to this website, 27:08 it's es-es.net and there is free information 27:14 on how to protect yourself in this. 27:16 Ernest you had just been a wealth of information 27:19 and we've learned so much, 27:20 I'm so glad that you made this your ministry. 27:22 Thank you. And thank you for coming. 27:25 For those of you who are at home, 27:26 remember and share this with all the parents that you know. 27:30 It's not just as adults we're working 27:32 and having banking information that get our identity stolen, 27:35 but the identity thefts are going after children's identity 27:39 and kids by the time they are 18 are finding 27:42 they've got horrible credit reports 27:43 because someone has been using their identity. 27:46 Let's protect our identity and be thankful 27:49 that we have a new identity in Christ Jesus. 27:53 Thank you for joining us. |
Revised 2014-12-17