Combating Identity FraudI   N   A   V   I   R   T   U   A   L   W   O   R   L   D
MoreConnectedand MobileThan EverMobile devices are rapidlyovertaking PCs, and companiesare embracing “BYOD.”Sources:CTIA. ...
ConsumersBy 2015, more people will access the Internet from mobiledevices than from desktop computers.Source: Morgan Stanl...
Enterprise67% of surveyed companies expect either to purchase tablets orprovide support for employee-owned tablets.Source:...
Good News for BusinessMobile devices enable knowledge workers to take care ofbusiness from virtually anywhere, at any time.
What’s the Catch?Mobile, social media-savvy employees and customers maybe more likely to become identity fraud victims.
What Puts Users at Risk?Even sophisticated ecommerce and social media usersare at higher risk.Source: Javelin Strategy &Re...
What Puts Users at Risk?“People are adopting newmethods of interacting [online]faster than we can educate themon safe beha...
What Puts Users at Risk?“The more information youshare, and the more youtransact, the more you’re at risk.One is simply a ...
Security BreachesBecoming More CommonSony PlayStation Network                                                            L...
What are the Costs?In 2011…› 11.6 million adults were victims of identity fraud.› Identity fraud cost Americans $18 billio...
What Can You Do?Consumers› Be cautious about revealing personal information on  social media sites.› Take advantage of pri...
What Can You Do?Employers› Offer identity fraud protection as an employee benefit.› Educate employees about security best ...
Protection as a ServiceIdentity theft protection services are a valuablebenefit for all types of businesses.› Proactive al...
What to Look for in IdentityTheft Protection Services:› Does the service cover identity theft and/or identity fraud?› Is t...
A Virtual Necessityfor Your BusinessBy offering identity theft protection, you can:› Build stronger relationships with emp...
Upcoming SlideShare
Loading in …5
×

LifeLock Javelin Presentation

935 views

Published on

Discover the hard facts and real risks of identity theft from Javelin Strategy & Research. Here we share the 2012 Identity Fraud Report findings that reveal the new fraud frontier of social media and mobile—and why even the most sophisticated technology users are vulnerable. See how individuals and businesses can protect personal information from identity theft while interacting online, and learn more at http://www.LifeLockBusinessSolutions.com.

Published in: Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
935
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
17
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

LifeLock Javelin Presentation

  1. 1. Combating Identity FraudI N A V I R T U A L W O R L D
  2. 2. MoreConnectedand MobileThan EverMobile devices are rapidlyovertaking PCs, and companiesare embracing “BYOD.”Sources:CTIA. "Semi-annual survey." October 2011. Retrieved from http://www.ctia.org/media/press/body.cfm/prid/2133Pew Research Center. "Americans and Their Cell Phones." August 2011. Retrievedfrom http://www.pewinternet.org/~/media//Files/Reports/2011/Cell%20Phones%202011.pdfFigure of 142 million rounded down to the nearest whole number. Calculation based on CTIA Wireless Association figure of 322.9 million mobile devices inuse in the United States (2011), multiplied by .44, or 44%—the percentage of mobile device owners accessing the Internet according to a Pew ResearchCenter study.
  3. 3. ConsumersBy 2015, more people will access the Internet from mobiledevices than from desktop computers.Source: Morgan Stanley Research (2010), Internet Trendshttp://www.morganstanley.com/institutional/techresearch/pdfs/Internet_Trends_041210.pdf
  4. 4. Enterprise67% of surveyed companies expect either to purchase tablets orprovide support for employee-owned tablets.Source: Morgan Stanley Research (2011), Tablet Demand and Disruption: Mobile Users Come of Agehttp://www.morganstanley.com/views/perspectives/tablets_demand.pdf
  5. 5. Good News for BusinessMobile devices enable knowledge workers to take care ofbusiness from virtually anywhere, at any time.
  6. 6. What’s the Catch?Mobile, social media-savvy employees and customers maybe more likely to become identity fraud victims.
  7. 7. What Puts Users at Risk?Even sophisticated ecommerce and social media usersare at higher risk.Source: Javelin Strategy &Research, 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier.* The higher incidence of fraud among these users can be a factor of demographic composition or social network behavior.
  8. 8. What Puts Users at Risk?“People are adopting newmethods of interacting [online]faster than we can educate themon safe behavior.”- James Van Dyke, President and Founder of Javelin Strategy & Research
  9. 9. What Puts Users at Risk?“The more information youshare, and the more youtransact, the more you’re at risk.One is simply a function of theother.”- James Van Dyke, President and Founder of Javelin Strategy & Research
  10. 10. Security BreachesBecoming More CommonSony PlayStation Network LinkedIn› 70 million user accounts › Approx. 6,500,000 compromised. encrypted passwords stolen and posted online.› Thieves accessed birth dates, emailaddresses, home addresses and login credentials. Sources: Hoffman, Stephanie (2011), Sony Warns Of Identity Theft Following PlayStation Hack http://www.crn.com/news/security/229402376/sony-warns-of-identity-theft-following-playstation-hack.htm LinkedIn press release http://press.linkedin.com/node/1212
  11. 11. What are the Costs?In 2011…› 11.6 million adults were victims of identity fraud.› Identity fraud cost Americans $18 billion.› Victims lost an average of $1,513 to identity fraud.› Victims spent an average of $354 to resolve their cases. Source: Javelin Strategy &Research, 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier
  12. 12. What Can You Do?Consumers› Be cautious about revealing personal information on social media sites.› Take advantage of privacy settings.› Shop on secure sites with URLs preceded by “https.”› Don’t share personal information while using public Wi-Fi.
  13. 13. What Can You Do?Employers› Offer identity fraud protection as an employee benefit.› Educate employees about security best practices.› Offer support for user-supplied mobile devices.
  14. 14. Protection as a ServiceIdentity theft protection services are a valuablebenefit for all types of businesses.› Proactive alerts: Notifies clients when personal information is being used to apply for utilities, credit cards and loans.› Remediation: Helps victims recover if identity fraud occurs.
  15. 15. What to Look for in IdentityTheft Protection Services:› Does the service cover identity theft and/or identity fraud?› Is there an online portal or other simple way to track activity?› If identity theft or fraud occurs, does the company offer remediation or do they just notify me—and then I have to take care of the issue?› What are the hours of operation, and if they aren’t 24/7, what happens if something occurs after hours?› How easy is it for my employees or members to enroll?
  16. 16. A Virtual Necessityfor Your BusinessBy offering identity theft protection, you can:› Build stronger relationships with employees, customers and members.› Ensure secure productivity for your workforce.› Develop new business and revenue opportunities.Visit LifeLockBusiness.com or call 1-800-LifeLock to learn how.

×