• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact Us
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
/ Identity Theft Awareness Week

Identity Theft Awareness Week

About:

Note: Information about Identity Theft Awareness Week is from the FTC website.

The Federal Trade Commission is launching Identity Theft Awareness Week, Feb. 1-5, 2021, with a series of events to highlight steps consumers can take to help reduce their risk of identity theft and recover if identity theft occurs.

Identity theft happens when someone steals personal information about you such as your Social Security number or credit card information, and uses it to commit fraud. Reports about any type of identity theft topped the list of consumer complaints (link is external) submitted to the FTC through the third quarter of 2020.

As part of Identity Theft Awareness Week, the FTC will participate in webinars and other events to highlight what you can do to protect your personal information, red-flag warning signs of possible identity theft, and steps to take if identity theft happens to you. Events include a webinar on Monday, Feb. 1, with Identity Theft Resource Center and FTC experts discussing identity theft during the pandemic, and a Facebook Live discussion on Thursday, Feb. 4, hosted by the AARP Fraud Watch Network, focused on COVID-19-related identity theft, current trends, and ways to protect yourself.

Events:

You can find the full list of events at ftc.gov/IDtheftweek, along with details on how to participate and tips on how to reduce the risk of identity theft.

  • Webinar: Ripple Effects of COVID-19 Related Identity Theft & Tips to Protect Yourself in 2021 (Monday, Feb. 1, at 1 p.m. ET)
    Join experts from the Identity Theft Resource Center and the FTC for a discussion of identity theft during the pandemic — and steps you can take to protect your personal information. We’ll explore topics including identity theft involving unemployment benefits, federal stimulus payments, Small Business Administration loans, and more. The webinar is free, but space is limited. Please register for the event. The webinar also will be available for later viewing.
  • The FTC and Identity Theft Resource Center partner for a LinkedIn Story “takeover” (Wednesday, Feb. 3, all day)
    The FTC will take over the Identity Theft Resource Center’s (ITRC’s) LinkedIn Story to offer tips on protecting yourself against identity theft. Visit the ITRC’s LinkedIn page to learn about different types of identity theft, their warning signs, and how to recover if identity theft happens to you.
  • Facebook Live: The FTC and AARP discuss identity theft (Thursday, Feb. 4, at 2 p.m. ET)
    The AARP Fraud Watch Network talks with Shameka Walker, the FTC’s Identity Theft Program Manager, about COVID-19-related identity theft, current trends, and how to protect yourself. Join the conversation on the AARP Fraud Watch Network Facebook Page.
  • Podcast: The FTC and Identity Theft Resource Center talk about identity theft and COVID-19 Shameka Walker, the FTC’s Identity Theft Program Manager, and ITRC leaders Eva Velasquez and James Lee, talk about current trends in identity theft, the impact of COVID-19-related identity theft, and tips to help keep your personal information safe on the ITRC podcast, The Fraudian Slip, available beginning 8 AM ET on Feb. 5.

Resources

CSIAC Cyber Awareness Videos

Personally Identifiable Information (PII) – What is it?

Privacy of User Data – Today’s Predictions for Tomorrow’s Internet

Share your privacy knowledge: Participate in CSIAC Discussions on identity theft (specifically tax identity theft) with your fellow community members. This short video will show you how to participate in the CSIAC forum. Here are the tax identity theft topics:

Topic: Tax Identity Theft – Part 1 – The Basics
Topic Questions:

  1. What is tax identity theft?
  2. How common is tax identity theft? Are you really at risk?

Topic: Tax Identity Theft – Part 2 – Warning Signs, If You’re a Victim, Minimizing Risk
Topic Questions:

  1. What are some warning signs that you might be a victim of tax identity theft?
  2. What steps should you take if you find out you’re a victim of tax identity theft?
  3. What are some of the effects of being a victim of tax identity theft?
  4. How can you minimize your risk of becoming a victim of tax identity theft?

You can help people learn about identity theft — whether you’re chatting with friends and family, sharing info on a social networking site, or taking resources to a religious group or PTA meeting. It’s easy to use and share these free resources from the FTC.

  • Report Identity Theft and Get a Recovery Plan – IdentityTheft.gov
  • Identity Theft Help Center – Identity Theft Resource Center
  • Preventing and Responding to Identity Theft – the Cybersecurity & Infrastructure Security Agency (CISA)
  • IdentityTheft.gov Presentation
    Use this PowerPoint to show how IdentityTheft.gov makes it easier to report and recover from identity theft.
  • IdentityTheft.gov Video
  • Identity Theft Topics – Steps from the Federal Trade Commission that you can take to protect your identity.
Data Breach? Lost Info?

Did you get a notice that says a company lost your personal information in a data breach? Did you lose your wallet? Or learn that an online account was hacked? Here are steps you can take to help protect yourself from identity theft.

Protecting Your Identity

What can you do to keep your personal info secure? Are identity protection services worth the cost? What about credit freezes? Check out the FTC’s identity theft articles to find out.

Resources for Businesses

Many companies keep sensitive information about customers or employees in their files or on their network. The FTC has free data security resources — including free publications, videos, and tutorials — to help businesses of any size protect their customers and meet their legal obligations.

More Resources

Join the CSIAC Community of Practice

To be among the first to know when cutting-edge cybersecurity resources from Cyber Security & Information Systems Information Analysis Center (CSIAC) are released, join the CSIAC community of practice! csiac.org/register

As a member, you’ll receive exclusive benefits that include the regular CSIAC Cybersecurity Digest, ability to participate in community forums with your peers, and access to copies of CSIAC journals and State-of-the-Art reports. You’ll get news about the latest CSIAC webinars, podcasts, and more delivered straight to your inbox.

Registration is easy and only takes a few moments. csiac.org/register

Follow CSIAC on social media for additional Identity Threat Awareness Week updates, resources, tips and more!

Facebook
Twitter
LinkedIn
Instagram
YouTube

sidebar

Page Sidebar

Featured Content

The DoD Cybersecurity Policy Chart

The DoD Cybersecurity Policy Chart

This chart captures the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme.

View the Policy Chart

Featured Subject Matter Expert (SME): Daksha Bhasker

A dynamic CSIAC SME, Senior Principal Cybersecurity Architect, Daksha Bhasker has 20 years of experience in the telecommunications services provider industry. She has worked in systems security design and architecture in production environments of carriers, often leading multidisciplinary teams for cybersecurity integration, from conception to delivery of complex technical solutions. As a CSIAC SME, Daksha's contributions include several published CSIAC Journal articles and a webinar presentation on the sophiscated architectures that phone carriers use to stop robocalls.

View SME's Contributed Content

CSIAC Report - Smart Cities, Smart Bases and Secure Cloud Architecture for Resiliency by Design

Integration of Smart City Technologies to create Smart Bases for DoD will require due diligence with respect to the security of the data produced by Internet of Things (IOT) and Industrial Internet of Things (IIOT). This will increase more so with the rollout of 5G and increased automation "at the edge". Commercially, data will be moving to the cloud first, and then stored for process improvement analysis by end-users. As such, implementation of Secure Cloud Architectures is a must. This report provides some use cases and a description of a risk based approach to cloud data security. Clear understanding, adaptation, and implementation of a secure cloud framework will provide the military the means to make progress in becoming a smart military.

Read the Report

CSIAC Journal - Data-Centric Environment: Rise of Internet-Based Modern Warfare “iWar”

CSIAC Journal Cover Volume 7 Number 4

This journal addresses a collection of modern security concerns that range from social media attacks and internet-connected devices to a hypothetical defense strategy for private sector entities.

Read the Journal

CSIAC Journal M&S Special Edition - M&S Applied Across Broad Spectrum Defense and Federal Endeavors

CSIAC Journal Cover Volume 7 Number 3

This Special Edition of the CSIAC Journal highlights a broad array of modeling and simulation contributions – whether in training, testing, experimentation, research, engineering, or other endeavors.

Read the Journal

CSIAC Journal - Resilient Industrial Control Systems (ICS) & Cyber Physical Systems (CPS)

CSIAC Journal Cover Volume 7 Number 2

This edition of the CSIAC Journal focuses on the topic of cybersecurity of Cyber-Physical Systems (CPS), particularly those that make up Critical Infrastructure (CI).

Read the Journal

Recent Video Podcasts

  • A Brief Side-by-Side Comparison Between C++ and Rust – Part 3 Series: Programming Language Comparisons
  • A Brief Side-by-Side Comparison Between C++ and Rust – Part 2 Series: Programming Language Comparisons
  • A Brief Side-by-Side Comparison Between C++ and Rust – Part 1 Series: Programming Language Comparisons
  • Digital Engineering Implementation Progress and Plans Series: CSIAC Webinars
  • Assessing the Operational Risk Imposed by the Infrastructure Deployment Pipeline Series: The CSIAC Podcast
View all Podcasts

Upcoming Events

Jan 28

Data Privacy Day

January 28, 2022
Jan 28

Data Privacy Day

January 28, 2023
View all Events

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
US Department of Defense Logo USD(R&E) Logo DTIC Logo DoD IACs Logo

Copyright 2012-2021, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information
Accessibility / Section 508 | FOIA | Link Disclaimer | No Fear Act | Policy Memoranda | Privacy, Security & Copyright | Recovery Act | USA.Gov

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT