SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
Certified Risk Management Consultant
• Protecting Families, Finances and Your Future •
Sponsored by Harvard Risk Management Corporation © 2013
Harvard Risk Management Corporation invites you to participate in a complimentary
webinar entitled Identity Theft in the Workplace and its Impact on HR. Mr. Kris Evans, a
Certified Risk Management Consultant, is a national expert on identity theft and corporate
data breaches. During this webinar, Mr. Evans will be discussing how this growing crime
is affecting businesses and their employees. Never before has there been a greater need for
HR professionals to understand identity theft and its impact on the workplace.
 ID theft is one of the fastest growing crimes
in the US.
 There are over 27,000 victims EVERY DAY!
 Every year businesses lose millions of dollars
because of identity theft and data breaches.
 The average cost of a data breach is 7.2
million dollars, up seven percent from last
year.
 There are five major types of identity theft.
 The average victim spends over 600 hours
in the process of restoration.
 Over three million children have already
become a victim of identity theft.
 Identity theft education can save employers
and employees thousands of dollars in
potential losses.
Register now at:
use access code:
Kris Evans
Nashville, TN
CRMC
IDT 265542
Anthony "Tony" Morales
Certified Risk Management Consultant: Cell Phone
(832) 593-3914:

Contenu connexe

En vedette

Identity Theft Coverage - How are Insurers Protecting Their Customers
Identity Theft Coverage - How are Insurers Protecting Their CustomersIdentity Theft Coverage - How are Insurers Protecting Their Customers
Identity Theft Coverage - How are Insurers Protecting Their CustomersCorporate Insight
 
Guide for Assisting Identity Theft Victims
Guide for Assisting Identity Theft VictimsGuide for Assisting Identity Theft Victims
Guide for Assisting Identity Theft Victims- Mark - Fullbright
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Identity Theft Protection From Legalshield
Identity Theft Protection From LegalshieldIdentity Theft Protection From Legalshield
Identity Theft Protection From LegalshieldRob Taylor
 
Identity Theft
Identity TheftIdentity Theft
Identity TheftBlinsink
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRon Drew
 
Protecting Families, Finances, and Your Future
Protecting Families, Finances, and Your FutureProtecting Families, Finances, and Your Future
Protecting Families, Finances, and Your FutureMax Charles Alperstein
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationpaulgundersen9
 
Understanding victims of identity theft
Understanding victims of identity theftUnderstanding victims of identity theft
Understanding victims of identity theftsavelkoul
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
PrePaid Legal Life Events Legal Plan, Legal Shield, Identity Theft Shield and...
PrePaid Legal Life Events Legal Plan, Legal Shield, Identity Theft Shield and...PrePaid Legal Life Events Legal Plan, Legal Shield, Identity Theft Shield and...
PrePaid Legal Life Events Legal Plan, Legal Shield, Identity Theft Shield and...paulgundersen9
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps - Mark - Fullbright
 

En vedette (17)

Identity Theft Coverage - How are Insurers Protecting Their Customers
Identity Theft Coverage - How are Insurers Protecting Their CustomersIdentity Theft Coverage - How are Insurers Protecting Their Customers
Identity Theft Coverage - How are Insurers Protecting Their Customers
 
Guide for Assisting Identity Theft Victims
Guide for Assisting Identity Theft VictimsGuide for Assisting Identity Theft Victims
Guide for Assisting Identity Theft Victims
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity Theft Protection From Legalshield
Identity Theft Protection From LegalshieldIdentity Theft Protection From Legalshield
Identity Theft Protection From Legalshield
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Protecting Families, Finances, and Your Future
Protecting Families, Finances, and Your FutureProtecting Families, Finances, and Your Future
Protecting Families, Finances, and Your Future
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Understanding victims of identity theft
Understanding victims of identity theftUnderstanding victims of identity theft
Understanding victims of identity theft
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
PrePaid Legal Life Events Legal Plan, Legal Shield, Identity Theft Shield and...
PrePaid Legal Life Events Legal Plan, Legal Shield, Identity Theft Shield and...PrePaid Legal Life Events Legal Plan, Legal Shield, Identity Theft Shield and...
PrePaid Legal Life Events Legal Plan, Legal Shield, Identity Theft Shield and...
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 

Similaire à IDT Webinar Flyer Anthony (1)

Harvard Risk Management Corporation: 2014 Benefits Presentation
Harvard Risk Management Corporation: 2014 Benefits PresentationHarvard Risk Management Corporation: 2014 Benefits Presentation
Harvard Risk Management Corporation: 2014 Benefits PresentationJames Snow
 
Life Lock Customer Selling
Life Lock Customer SellingLife Lock Customer Selling
Life Lock Customer SellingCharles Seay
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT- Mark - Fullbright
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftCase IQ
 
Risky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and TomorrowRisky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and TomorrowDigiliti Money
 
Prevent Identity Theft
Prevent Identity TheftPrevent Identity Theft
Prevent Identity TheftSara Harris
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCBIZ, Inc.
 
Analysis Of BJG Cybersecurity Consultants
Analysis Of BJG Cybersecurity ConsultantsAnalysis Of BJG Cybersecurity Consultants
Analysis Of BJG Cybersecurity ConsultantsHeidi Maestas
 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overviewbpeacher
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...Declan Winston Ramsaran
 
HRs emerging role in workplace violence prevention
HRs emerging role in workplace violence preventionHRs emerging role in workplace violence prevention
HRs emerging role in workplace violence preventionRnelson881_2
 
Cyber Security Protection
Cyber Security ProtectionCyber Security Protection
Cyber Security ProtectionMark Cook
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDjonaspatrick12
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Peter1020
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideInspiring Women
 

Similaire à IDT Webinar Flyer Anthony (1) (20)

Harvard Risk Management Corporation: 2014 Benefits Presentation
Harvard Risk Management Corporation: 2014 Benefits PresentationHarvard Risk Management Corporation: 2014 Benefits Presentation
Harvard Risk Management Corporation: 2014 Benefits Presentation
 
Equifax Data Breach
Equifax Data BreachEquifax Data Breach
Equifax Data Breach
 
Life Lock Customer Selling
Life Lock Customer SellingLife Lock Customer Selling
Life Lock Customer Selling
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
Risky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and TomorrowRisky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and Tomorrow
 
Prevent Identity Theft
Prevent Identity TheftPrevent Identity Theft
Prevent Identity Theft
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
Analysis Of BJG Cybersecurity Consultants
Analysis Of BJG Cybersecurity ConsultantsAnalysis Of BJG Cybersecurity Consultants
Analysis Of BJG Cybersecurity Consultants
 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overview
 
Health Case Study
Health Case StudyHealth Case Study
Health Case Study
 
Health Case Study
Health Case StudyHealth Case Study
Health Case Study
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
HRs emerging role in workplace violence prevention
HRs emerging role in workplace violence preventionHRs emerging role in workplace violence prevention
HRs emerging role in workplace violence prevention
 
Cyber Security Protection
Cyber Security ProtectionCyber Security Protection
Cyber Security Protection
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyID
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 

IDT Webinar Flyer Anthony (1)

  • 1. Certified Risk Management Consultant • Protecting Families, Finances and Your Future • Sponsored by Harvard Risk Management Corporation © 2013 Harvard Risk Management Corporation invites you to participate in a complimentary webinar entitled Identity Theft in the Workplace and its Impact on HR. Mr. Kris Evans, a Certified Risk Management Consultant, is a national expert on identity theft and corporate data breaches. During this webinar, Mr. Evans will be discussing how this growing crime is affecting businesses and their employees. Never before has there been a greater need for HR professionals to understand identity theft and its impact on the workplace.  ID theft is one of the fastest growing crimes in the US.  There are over 27,000 victims EVERY DAY!  Every year businesses lose millions of dollars because of identity theft and data breaches.  The average cost of a data breach is 7.2 million dollars, up seven percent from last year.  There are five major types of identity theft.  The average victim spends over 600 hours in the process of restoration.  Over three million children have already become a victim of identity theft.  Identity theft education can save employers and employees thousands of dollars in potential losses. Register now at: use access code: Kris Evans Nashville, TN CRMC IDT 265542 Anthony "Tony" Morales Certified Risk Management Consultant: Cell Phone (832) 593-3914: