SlideShare a Scribd company logo
1 of 22
Holiday gift buying goes mobile in 2011
Purchases via mobile devices will more than double while the majority of users leave their
                       data and devices exposed to security risks
Webroot Holiday Research: Key Findings


New research from               reveals a drastic
 increase in people using mobile devices to buy
 gifts and make travel plans this holiday season.
 But that convenience may come at a cost for
 those who skip certain measures to secure their
 devices and personal data.




2 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Webroot Holiday Research: Key Findings



          Over 2 times more
            shoppers plan to
           purchase gifts and
        50% more plan to
      book travel using their
     mobile devices
                              this year.


3 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Mobile devices present a new set of risks




“
People using mobile devices are exposed to a new set of
 online risks: cybercriminals seed mobile markets with
 malicious apps that can steal your personal data or send
 texts and SMS messages to premium numbers. And
 because of their size, smartphones and tablets are
 easier to lose or have stolen than laptops and
 notebooks, which puts the vast amounts of personal
 data stored on them at risk. Mobile security services are




                                                                                                        ”
 now a must -- lost device protection, secure web
 browsing, and antimalware provide essential protection.

                                                               Chad Bacher, Vice President of Mobile Solutions

4 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Regional Differences
The US favors mobile devices for holiday shopping
 while the UK is more likely to plan holiday travel




5 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Regional Differences

 UK residents use their mobile devices more
    intensively than those in the US while
      planning trips this holiday season.
 80% of UK travelers use mobile devices to compare hotel
  or ticket prices versus 72% in the US.
 56% of UK respondents download
  boarding passes versus 44% in the US.
 Almost half (46%) of UK mobile device
  users purchase tickets versus 32% in
  the US.


6 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Regional Differences

  US residents rely on their mobile devices more
   than those in the UK while holiday gift-buying.

55% scan barcodes vs. 44% of UK users
45% scan QR codes vs. 36% in the UK

ALTHOUGH

68% of US respondents indicated they also
plan to shop at brick-and-mortar retail
stores, which is 20% higher than UK
shoppers(48%).
 7 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Device Differences
   Android device users are more concerned about
   securing their holiday shopping and travel details.




8 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Device Differences

Android and iOS device users protect
 themselves with a mobile security app at
 roughly the same rate.

   44% of Android users
                                and
       38% of iOS users



9 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Device Differences

Security of information on mobile devices is
 more of a concern for Android users

                                                                52%
                                                                of iOS users are
                                                                concerned

                                                    compared to



                                                64%
                                                of Android
                                                 users are
                                                concerned

10 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Gender Differences
                Men are savvier than women at securing
                  themselves on their mobile devices.




11 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Gender Differences

        Security practices on mobile devices are
        more prevalent among men than women.

 51% of men lock their devices
  versus 43% of women.
 57% of men limit the sites they
  visit when connecting from an
  unfamiliar network versus 48% of women.
 44% of men versus 37% of women have security
  services on their devices.
12 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Age Differences
Younger users do more on their devices during the
        holidays, but older users are more
                 security-minded.




13 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Age Differences

    Younger mobile shoppers are more likely than
       all others to use their mobile devices to:

                                                                       30+                     yrs   18-29   yrs

Compare prices                                                                    83%                  91%

Download coupons                                                                  67%                  81%

Search for Black Friday                                                           50%
or Cyber Monday deals                                                                                  69%

 14 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Age Differences

 People 50 and above are more likely to have
       security on their mobile devices
                                                              HOWEVER
  Younger mobile shoppers lock their devices
      at a greater rate than older users.
                                               44% of users 50 and above have mobile security on
                                               their device, vs. 38% under 50

                                               56% of 18-29 year olds lock their phones vs. 44% of
                                               those 30 or older




15 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
STAY SECURE
                              Tips for securing mobile devices




16 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Stay Secure

Know your apps:
    Download apps only from a trusted source, like
    the Google Market, Apple App Store or Amazon
    App Store. Closely scrutinize the permissions the
    app requests, and don't install it if it wants to
    access certain functions that it doesn't need,
    such as the ability to send SMS messages. User
    reviews are also helpful.




17 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Stay Secure

Lock your device:
    Most smartphones and tablets give you a choice
    of locking the device with a password, numeric
    code or pattern. Take advantage
    of this – if nothing else, you'll
    prevent practical jokesters from
    emailing your boss if you leave
     your device unattended.




18 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Stay Secure


Explore mobile security services:
    Mobile security apps provide lost device
    protection, secure web browsing, and
    antimalware services.




19 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
Stay Secure

    For mobile security for your Android powered device
    scan the QR code to the right, visit the below link or
    search for “Webroot” in the Android or Amazon
    marketplace.

    http://www.webroot.com/En_US/consumer-products-
    mobile-security-android-phone.html


    For mobile security for your iPhone or iPad scan the QR
    code to the right, visit the below link or search for
    “Webroot” in the Android or Amazon marketplace.

    http://www.webroot.com/En_US/consumer-products-
    mobile-security-secureweb.html




20 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
About the Research
  Webroot conducted a blind online survey November 4-7,
  2011 in the United States and United Kingdom, using
  Research Now panel members. Respondents qualified
  for the survey if they were at least 18 years old, own a
  smartphone or tablet, and plan to purchase holiday gifts
  and/or make holiday travel arrangements using a
  smartphone or tablet. The margin of error in the United
  States is ±3.6 (835 respondents), and ±4.4 in the
  United Kingdom (490 respondents).


21 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
About Webroot
 Webroot is committed to taking the misery out of Internet
  security for consumers and businesses. Founded in
  1997, privately held Webroot is headquartered in
  Colorado and has operations across North America,
  Europe and the Asia Pacific region.

      For more information, visit http://www.webroot.com or
      call 800.772.9383.

      Read the Webroot Threat blog: http://blog.webroot.com
      Like Webroot on Facebook: http://facebook.com/webroot
      Follow Webroot on Twitter: http://twitter.com/webroot

22 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information

More Related Content

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Holiday shopping via mobile devices in 2012

  • 1. Holiday gift buying goes mobile in 2011 Purchases via mobile devices will more than double while the majority of users leave their data and devices exposed to security risks
  • 2. Webroot Holiday Research: Key Findings New research from reveals a drastic increase in people using mobile devices to buy gifts and make travel plans this holiday season. But that convenience may come at a cost for those who skip certain measures to secure their devices and personal data. 2 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 3. Webroot Holiday Research: Key Findings Over 2 times more shoppers plan to purchase gifts and 50% more plan to book travel using their mobile devices this year. 3 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 4. Mobile devices present a new set of risks “ People using mobile devices are exposed to a new set of online risks: cybercriminals seed mobile markets with malicious apps that can steal your personal data or send texts and SMS messages to premium numbers. And because of their size, smartphones and tablets are easier to lose or have stolen than laptops and notebooks, which puts the vast amounts of personal data stored on them at risk. Mobile security services are ” now a must -- lost device protection, secure web browsing, and antimalware provide essential protection. Chad Bacher, Vice President of Mobile Solutions 4 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 5. Regional Differences The US favors mobile devices for holiday shopping while the UK is more likely to plan holiday travel 5 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 6. Regional Differences UK residents use their mobile devices more intensively than those in the US while planning trips this holiday season.  80% of UK travelers use mobile devices to compare hotel or ticket prices versus 72% in the US.  56% of UK respondents download boarding passes versus 44% in the US.  Almost half (46%) of UK mobile device users purchase tickets versus 32% in the US. 6 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 7. Regional Differences US residents rely on their mobile devices more than those in the UK while holiday gift-buying. 55% scan barcodes vs. 44% of UK users 45% scan QR codes vs. 36% in the UK ALTHOUGH 68% of US respondents indicated they also plan to shop at brick-and-mortar retail stores, which is 20% higher than UK shoppers(48%). 7 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 8. Device Differences Android device users are more concerned about securing their holiday shopping and travel details. 8 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 9. Device Differences Android and iOS device users protect themselves with a mobile security app at roughly the same rate. 44% of Android users and 38% of iOS users 9 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 10. Device Differences Security of information on mobile devices is more of a concern for Android users 52% of iOS users are concerned compared to 64% of Android users are concerned 10 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 11. Gender Differences Men are savvier than women at securing themselves on their mobile devices. 11 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 12. Gender Differences Security practices on mobile devices are more prevalent among men than women.  51% of men lock their devices versus 43% of women.  57% of men limit the sites they visit when connecting from an unfamiliar network versus 48% of women.  44% of men versus 37% of women have security services on their devices. 12 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 13. Age Differences Younger users do more on their devices during the holidays, but older users are more security-minded. 13 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 14. Age Differences Younger mobile shoppers are more likely than all others to use their mobile devices to: 30+ yrs 18-29 yrs Compare prices 83% 91% Download coupons 67% 81% Search for Black Friday 50% or Cyber Monday deals 69% 14 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 15. Age Differences People 50 and above are more likely to have security on their mobile devices HOWEVER Younger mobile shoppers lock their devices at a greater rate than older users. 44% of users 50 and above have mobile security on their device, vs. 38% under 50 56% of 18-29 year olds lock their phones vs. 44% of those 30 or older 15 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 16. STAY SECURE Tips for securing mobile devices 16 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 17. Stay Secure Know your apps: Download apps only from a trusted source, like the Google Market, Apple App Store or Amazon App Store. Closely scrutinize the permissions the app requests, and don't install it if it wants to access certain functions that it doesn't need, such as the ability to send SMS messages. User reviews are also helpful. 17 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 18. Stay Secure Lock your device: Most smartphones and tablets give you a choice of locking the device with a password, numeric code or pattern. Take advantage of this – if nothing else, you'll prevent practical jokesters from emailing your boss if you leave your device unattended. 18 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 19. Stay Secure Explore mobile security services: Mobile security apps provide lost device protection, secure web browsing, and antimalware services. 19 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 20. Stay Secure For mobile security for your Android powered device scan the QR code to the right, visit the below link or search for “Webroot” in the Android or Amazon marketplace. http://www.webroot.com/En_US/consumer-products- mobile-security-android-phone.html For mobile security for your iPhone or iPad scan the QR code to the right, visit the below link or search for “Webroot” in the Android or Amazon marketplace. http://www.webroot.com/En_US/consumer-products- mobile-security-secureweb.html 20 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 21. About the Research Webroot conducted a blind online survey November 4-7, 2011 in the United States and United Kingdom, using Research Now panel members. Respondents qualified for the survey if they were at least 18 years old, own a smartphone or tablet, and plan to purchase holiday gifts and/or make holiday travel arrangements using a smartphone or tablet. The margin of error in the United States is ±3.6 (835 respondents), and ±4.4 in the United Kingdom (490 respondents). 21 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information
  • 22. About Webroot Webroot is committed to taking the misery out of Internet security for consumers and businesses. Founded in 1997, privately held Webroot is headquartered in Colorado and has operations across North America, Europe and the Asia Pacific region. For more information, visit http://www.webroot.com or call 800.772.9383. Read the Webroot Threat blog: http://blog.webroot.com Like Webroot on Facebook: http://facebook.com/webroot Follow Webroot on Twitter: http://twitter.com/webroot 22 | Wednesday, November 30, 2011 | Webroot Inc. | Proprietary and Confidential Information