Cyber & IT Supervisory Forum - Additional Resources
TLP:GREEN
13.2.4 List of US State Specific Rights For Credit Freezes .............................................................. 77 Fraud Alert Overview .................................................................................................................. 77 13.3.1 Equifax Fraud Alert.............................................................................................................. 77 13.3.2 Experian Fraud Alert ........................................................................................................... 78 13.3.3 TransUnion Fraud Alert....................................................................................................... 78 Extended Fraud Alert Overview.................................................................................................. 78 13.4.1 How To Place An Extended Fraud Alert .............................................................................. 78 Social Security Number ............................................................................................................... 78 Area Number............................................................................................................................... 78 Group Number ............................................................................................................................ 79 Serial Number ............................................................................................................................. 79 Protecting Your SSN .................................................................................................................... 79 13.9.1 Alternative Form Of Identification...................................................................................... 79 13.9.2 Ask Why And How............................................................................................................... 80 13.9.3 Leave Your Card At Home ................................................................................................... 80 13.9.4 Shred Mail And Documents ................................................................................................ 80 13.9.5 Do Not Use Your SSN As A Password .................................................................................. 80 13.9.6 Do Not Send Your SSN Electronically .................................................................................. 80 13.9.7 Do Not Give Your SSN Out .................................................................................................. 80 13.9.8 Monitor Bank And Credit Card Accounts ............................................................................ 81 13.9.9 Use An Identity Protection Service ..................................................................................... 81 13.9.10 Protect Your Child's SSN...................................................................................................... 81 13.9.11 Block Access To Your SSN.................................................................................................... 81 13.9.12 E-Verify................................................................................................................................ 81 14 Wi-Fi, Bluetooth, Near Field Communication And MAC Address ....................................................... 83 WI-FI Overview............................................................................................................................ 83 14.1.1 Public Wi-Fi Recommendations .......................................................................................... 83 14.1.2 Home Wireless Network Security ....................................................................................... 84 14.1.3 Wi-Fi Tracking Opt Out........................................................................................................ 84 14.1.4 Hiding a Wi-Fi Network ....................................................................................................... 85 Bluetooth Overview .................................................................................................................... 85 14.2.1 Bluetooth As An Attack Vector ........................................................................................... 86 14.2.2 Notable Bluetooth Vulnerabilities ...................................................................................... 86
TLP:GREEN
Made with FlippingBook Annual report maker