SlideShare a Scribd company logo
Security & Privacy Issues for
the Consumer & Site Owner
By: Alexandra MacLeod and Liane Van Diepen
10039412/12063364
20 March 2013
Introduction
 Security
 Types of Risks
 Privacy
 Data Protection Act 1998
 Privacy and Electronic Communications Regulations
 Cookies
 Email Marketing and SPAM
 Managerial Implications & Preventative Measures
Security - Consumer Concerns
 Stolen credit card details
 Phishing
 Downloading viruses
 Website has security
certificates
Source: Smart Insights (2012)
Security – Site Owner
 What is information security?
 Ensuring your website is available 24 hours a day for your
customers
 Ensuring only the correct people can administer the website’s
content
 Preventing unauthorised alteration or destruction of your data
 Avoiding your website being used to distribute other peoples’
software
 Ensuring that your employees cannot accidentally delete
valuable information
 Stopping your website being used to damage users’ computers
 Protecting your reputation
Source: Watson Hall Security, Smart Insights (2012)
Types of Security Risks
 Denial of Service Attack
 Hacking
 Destruction of Data - viruses
 Malware
 Phishing
 Secure Payments/Website Encryption
Source: Watson Hall Security (2013);
Symantec Internet Security Threat
Report (2012);
Denial of Service Attack
 Hackers overload website
with traffic
 Website can't handle
volume and shuts down
 Major disruption to service
Hacking
 Unauthorised website
access/publication
 Malicious intent /
monetary gain
 The Sun newspaper
hacked by infamous
LulzSec hacking group
 1 million online users
 Data Protection
obligations
Destruction of Data - Viruses
 Computer viruses can shut
down company websites
 I Love You Virus
 Attachment sent via email
 Overwrites photo/video
files
 Shutdown websites
including Ford and Chrysler
due to employees opening
infected email attachments
Malicious Software on Websites
 “When it comes to computer
viruses, you’re now more
likely to catch one visiting a
church website than surfing for
porn” – Symantec (2012)
 Malware – viruses, worms,
Trojans, bots
 Infects website the user’s
computers
 Downloadable files on websites
are a hotbed for viruses
 External content on websites
such as videos and photos are
virus-prone
Source : Symantec Internet Security
Threat Report (2012)
Secure Payments/Website
Encryption
 Secure payments
 Well known payment system such as
WorldPal or PayPal which uses encryption
 Use Transport Layer Security (TLS) and
Secure Socket Layers (SSL) certificates to
reassure customers:
 Padlock
 HTTPS
 Green Address Bar
 Legally incorporated name
Source: Global Sign, (2013)
Phishing
 Masquerades as an official
website communication
 Requests users' login
information
 Uses information to
fraudulently obtain funds
from their account
 Who is responsible for the
customer’s loss?
Managerial Implications
 Reputational damage
 Trust
 Disruption
 Inconvenience
 Loss of traffic
 Costs
Managerial Preventative Measures
 Secure website design from
the beginning –
difficult/expensive to add
later
 Antivirus software is always
up to date
 Firewalls
 Phishing notifications via
email
 Employee email filtering
 Securesign SSL/TLS
Certificates
 Split login screens
Privacy
 Data Protection Act 1998
 How data is collected and used
 Privacy and Electronic Communications Regulations
 Cookies
 Email Marketing and SPAM
Consumer Concerns
 Data leakage – how secure
is my data and what
happens if it is lost/leaked?
 Data use without consent
 Annoyance/Waste of time
 Not having opt in/opt out
notices
Source: Smart Insights (2012)
Data Protection Act 1998
 Eight Principles:
 1. Fairly and lawfully processed
 2. Processed for limited purposes
 3. Adequate, relevant and not excessive
 4. Accurate and up to date
 5. Not kept longer than necessary
 6. Processed in accordance with the individuals rights
 7. Secure
 8. Not transferred to a country outside the EEC unless it
has adequate protection
Most breached principle in
2012
Data Protection Act 1998
 Applies to customers as well
as employees
 Personal data
 Name, address, NI Number
 Sensitive data
 Political views, religion,
ethnicity
 Data subject access requests
 Enforced by the Information
Commissioner’s Office
Data Protection Non-compliance
 Monetary – up to £500,000
 Undertaking
 Prosecution
Privacy and Electronic
Communications Regulations
 Electronic Marketing
Activities
 Email marketing and
SPAM
 Cookies
 Enforced by the Information
Commissioners Office
Cookies
 What is a Cookie?
 A small text file that stores user
information on their computer
 What is it used for?
 Shopping cart
 Personalisation
 Cookie Ingredients
 Domain
 Name
 Value
 Expiry
 Path
 Secure
 HTTP only
Privacy Directive 26 May 2012
 Website notification that cookies are in use
 Gives option/instructions how to disable and find further
information
Email Marketing and SPAM
 What is SPAM?
 Emails sent without consent
 Sent in bulk and impersonalised
 Email Marketing Regulations
 Consent must be given to receive marketing communications - except where there is a
defined relationship
 Must contain an unsubscribe link in the email
 ICO can investigate complaints relating to SPAM sent from the UK
Email Marketing and SPAM
 Consent
 User must “opt in” rather than
“opt out” – i.e. the check box
should be unticked
 Must be made clear that they are
consenting to receive
communications
 What is a defined
relationship/soft opt-in?
 Obtained customer details during
course of previous sale
transaction
 Marketing is of similar products
 Option to opt-out is given in
every future message
PECR Non-compliance
 Written request for
compliance
 Monetary – up to £500,000
 Undertaking
 Prosecution
Managerial Implications
 Large fines
 Reputational damage
 Trust
 Angry customers
Managerial/Consumer
Preventative Measures
 Appoint a Data Controller for your
organisation who will be
responsible for DPA and PECR
obligations – legal obligation under
DPA
 Ensure fully compliant with all
legislation and regulations
 Security and privacy notices on
the website in plain English to
reassure customers
 Be careful who your email address
is given to
 Don’t click on spam and
attachments
 Unsubscribe/ Opt out
Conclusion
 Security
 Priority
 Reassurance for customers
 Privacy
 Comply with laws and regulations
to avoid punishment
 Reassurance for customers
 For more information:
 Symantec Internet Security
Threat Report 2011 (published
April 2012)
 ICO website
References
 Chaffey, D., 2013. Website Security Requirements. [online]. Available at:
http://www.smartinsights.com/ecommerce/payment-security/website-security-
requirements/ [accessed 28 February 2013]
 Chaffey, D., 2012. Research on consumer attitudes to online privacy. [online]. Available
at: http://www.smartinsights.com/marketplace-analysis/customer-analysis/research-on-
consumer-attitudes-to-online-privacy/ [accessed 28 February 2013]
 Chaffey, D., Mayer, R., Johnston, K. and Ellis-Chadwick, F., 2000. Internet Marketing.
Essex: Pearson.
 Financial Ombudsman Service, 2013. Disputed technical transaction. [online]. Available at:
http://www.financial-ombudsman.org.uk/publications/technical_notes/disputed-
transactions.htm [accessed 10 March 2013]
 Global Sign, 2013. Security Certificates. [Online]. Available at:
https://www.globalsign.co.uk/ssl/domain-ssl/ [accessed 18 March 2013]
 Halliday, J., 2012. The Guardian reaches nearly 9 million readers across print and online.
[online]. Available at: http://www.guardian.co.uk/media/2012/sep/12/guardian-9-
million-readers-nrs [accessed 10 March 2013]
 Information Commissioner’s Office, 2013. Data Protection Act Claiming Compensation.
[online] available at:
http://www.ico.gov.uk/upload/documents/library/data_protection/practical_application/c
laiming_compensation.pdf [accessed 12 March 2013]
 Information Commissioner’s Office, 2013. Electronic Mail (Regulations 22 and 23). [online]
available at:
http://www.ico.gov.uk/for_organisations/privacy_and_electronic_communications/the_gui
de/electronic_mail.aspx [accessed 10 March 2013]
 Information Commissioner’s Office, 2013. Privacy and Electronic Communications
Regulations. [online] available
at:http://www.ico.gov.uk/for_organisations/privacy_and_electronic_communications.aspx
[accessed 3 March 2013]
 Information Commissioner’s Office, 2013. Sensitive details of NHS staff
published by Trust in Devon. [online] available at:
http://www.ico.gov.uk/news/latest_news/2012/sensitive-details-of-nhs-staff-
published-by-devon-trust-06082012.aspx
 Information Commissioner’s Office, 2013. Viral Marketing. [online] available at:
http://www.ico.gov.uk/for_organisations/privacy_and_electronic_communications/the_gui
de/viral_marketing.aspx [accessed 3 March 2013]
 Oremus, W., 2013. Unprotected Sects. [online] Available at:
http://www.slate.com/articles/technology/technology/2012/05/malware_and_computer_vi
ruses_they_ve_left_porn_sites_for_religious_sites_.html [accessed 12 March 2013]
 Norton, 2013. Phishing [online]. Available at:
http://uk.norton.com/security_response/phishing.jsp [accessed 10 March 2013]
 Paypal, 2013. Security. [online]. Available at:
https://www.paypal.com/uk/webapps/mpp/paypal-safety-and-security [accessed 10 March
2013]
 Perlroth, N, 2012. Six big banks targeted in online attacks. [online. Available at:
http://www.bostonglobe.com/business/2012/09/30/banks-hits-wave-computer-attacks-
group-claiming-middle-east-ties/gsE6W3V57nBAYrko1ag8rN/story.html [accessed 10 March
2013]
 Seltzer, L, 2010. ‘I Love You’ virus turns ten: what have we learned? [online]. Available
at: http://www.pcmag.com/article2/0,2817,2363172,00.asp [accessed 28 February 2013]
 Symantec, (2012). Internet Security Threat Report 2011{online]. Available at:
http://www.symantec.com/content/en/us/enterprise/other_resources/b-
istr_main_report_2011_21239364.en-us.pdf [ accessed 12 March 2013]
 Teixera, R, 2007. Top five small business internet security threats. [online]. Available at:
http://smallbiztrends.com/2007/06/top-five-small-business-internet-security-threats.html
[accessed 3 March 2013].
 Watson Hall, 2013. Top 10 Website Security Issues. [online]. Available at:
https://www.watsonhall.com/resources/downloads/top10-website-security-issues.pdf
[accessed 28 February 2013]

More Related Content

What's hot

Digital Marketing Channels and Importance
Digital Marketing Channels and ImportanceDigital Marketing Channels and Importance
Digital Marketing Channels and Importance
Dusyant Kumar
 
E - Marketing
E - Marketing E - Marketing
E - Marketing
Jeril Peter
 
E marketing
E marketingE marketing
E marketing
Raj Malhotra
 
Digital Marketing
Digital MarketingDigital Marketing
Digital Marketing
Priyanka Gautam
 
e commerce ppt
e commerce ppte commerce ppt
e commerce ppt
sushantnair
 
E-commerce Security and Payment
E-commerce Security and PaymentE-commerce Security and Payment
E-commerce Security and Payment
Laguna State Polytechnic University
 
Information technology in marketing
Information technology in marketingInformation technology in marketing
Information technology in marketing
shrinivas kulkarni
 
Online advertising
Online advertisingOnline advertising
Online advertising
Snehlata Maurya
 
Online Advertising
Online AdvertisingOnline Advertising
Online Advertising
amalrains
 
e commerce business models
e commerce business modelse commerce business models
e commerce business models
Maya Ram Rana
 
Marketing Communication
Marketing CommunicationMarketing Communication
Marketing CommunicationShahzad Khan
 
Online Marketing PPT
Online Marketing PPTOnline Marketing PPT
Online Marketing PPT
Priyanka Shinde
 
Introduction to Digital Marketing
Introduction to Digital MarketingIntroduction to Digital Marketing
Introduction to Digital Marketing
Amit Walawalkar
 
07 E-commerce Advertising
07 E-commerce Advertising07 E-commerce Advertising
07 E-commerce Advertising
monchai sopitka
 
Innovation in marketing.ppt
Innovation in marketing.pptInnovation in marketing.ppt
Innovation in marketing.pptJanisha Gandhi
 
Display Advertising 101 [PowerPoint]
Display Advertising 101 [PowerPoint]Display Advertising 101 [PowerPoint]
Display Advertising 101 [PowerPoint]
Kwanzoo Inc
 
Online Advertising
Online AdvertisingOnline Advertising
Online Advertising
Sunisha Salekar
 
Managing Brand Equity
Managing Brand EquityManaging Brand Equity
Managing Brand Equity
Yodhia Antariksa
 
Traditional Marketing vs Digital Marketing
Traditional Marketing vs Digital MarketingTraditional Marketing vs Digital Marketing
Traditional Marketing vs Digital Marketing
Mouttou C Viramouttou
 

What's hot (20)

Digital Marketing Channels and Importance
Digital Marketing Channels and ImportanceDigital Marketing Channels and Importance
Digital Marketing Channels and Importance
 
E - Marketing
E - Marketing E - Marketing
E - Marketing
 
E marketing
E marketingE marketing
E marketing
 
Digital Marketing
Digital MarketingDigital Marketing
Digital Marketing
 
e commerce ppt
e commerce ppte commerce ppt
e commerce ppt
 
E-commerce Security and Payment
E-commerce Security and PaymentE-commerce Security and Payment
E-commerce Security and Payment
 
Information technology in marketing
Information technology in marketingInformation technology in marketing
Information technology in marketing
 
Online advertising
Online advertisingOnline advertising
Online advertising
 
Online Advertising
Online AdvertisingOnline Advertising
Online Advertising
 
Emarketing ppt
Emarketing pptEmarketing ppt
Emarketing ppt
 
e commerce business models
e commerce business modelse commerce business models
e commerce business models
 
Marketing Communication
Marketing CommunicationMarketing Communication
Marketing Communication
 
Online Marketing PPT
Online Marketing PPTOnline Marketing PPT
Online Marketing PPT
 
Introduction to Digital Marketing
Introduction to Digital MarketingIntroduction to Digital Marketing
Introduction to Digital Marketing
 
07 E-commerce Advertising
07 E-commerce Advertising07 E-commerce Advertising
07 E-commerce Advertising
 
Innovation in marketing.ppt
Innovation in marketing.pptInnovation in marketing.ppt
Innovation in marketing.ppt
 
Display Advertising 101 [PowerPoint]
Display Advertising 101 [PowerPoint]Display Advertising 101 [PowerPoint]
Display Advertising 101 [PowerPoint]
 
Online Advertising
Online AdvertisingOnline Advertising
Online Advertising
 
Managing Brand Equity
Managing Brand EquityManaging Brand Equity
Managing Brand Equity
 
Traditional Marketing vs Digital Marketing
Traditional Marketing vs Digital MarketingTraditional Marketing vs Digital Marketing
Traditional Marketing vs Digital Marketing
 

Similar to Digital marketing presentation - security risks for websites

IRJET - Data Privacy,Trust Issues and Solutions in Electronic Commerce
IRJET -  	  Data Privacy,Trust Issues and Solutions in Electronic CommerceIRJET -  	  Data Privacy,Trust Issues and Solutions in Electronic Commerce
IRJET - Data Privacy,Trust Issues and Solutions in Electronic Commerce
IRJET Journal
 
Security environment
Security environmentSecurity environment
Security environmentJay Choudhary
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
Host It Smart
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
musicalworld14
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
Lucy Zeniffer
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
EamonnORagh
 
Analysis the attack and E-commerce security
Analysis the attack and E-commerce securityAnalysis the attack and E-commerce security
Analysis the attack and E-commerce security
Army Institute Of Business Administration,Savar
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
politegcuf
 
Legal, Ethical, Environmental, Economic and Social Implications
Legal, Ethical, Environmental, Economic and Social ImplicationsLegal, Ethical, Environmental, Economic and Social Implications
Legal, Ethical, Environmental, Economic and Social Implications
SabahtHussein
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_
Tahmid Munaz
 
Best Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data EffectivelyBest Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data Effectively
Tentacle Cloud
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
sorabhsingh17
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
Bankingdotcom
 
A case study of amazon
A case study of amazonA case study of amazon
A case study of amazonrobinbarney
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
wegdam
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
ZitaAdlTrk
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdf
JihithaJP
 

Similar to Digital marketing presentation - security risks for websites (20)

IRJET - Data Privacy,Trust Issues and Solutions in Electronic Commerce
IRJET -  	  Data Privacy,Trust Issues and Solutions in Electronic CommerceIRJET -  	  Data Privacy,Trust Issues and Solutions in Electronic Commerce
IRJET - Data Privacy,Trust Issues and Solutions in Electronic Commerce
 
Security environment
Security environmentSecurity environment
Security environment
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Analysis the attack and E-commerce security
Analysis the attack and E-commerce securityAnalysis the attack and E-commerce security
Analysis the attack and E-commerce security
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Legal, Ethical, Environmental, Economic and Social Implications
Legal, Ethical, Environmental, Economic and Social ImplicationsLegal, Ethical, Environmental, Economic and Social Implications
Legal, Ethical, Environmental, Economic and Social Implications
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_
 
Best Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data EffectivelyBest Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data Effectively
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
A case study of amazon
A case study of amazonA case study of amazon
A case study of amazon
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdf
 

Recently uploaded

My Personal Brand Exploration by Mariano
My Personal Brand Exploration by MarianoMy Personal Brand Exploration by Mariano
My Personal Brand Exploration by Mariano
marianooscos
 
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel LeminTurn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Smart Tools, Smarter Business -15 AI Tools to Optimize Your Workflows from Id...
Smart Tools, Smarter Business -15 AI Tools to Optimize Your Workflows from Id...Smart Tools, Smarter Business -15 AI Tools to Optimize Your Workflows from Id...
Smart Tools, Smarter Business -15 AI Tools to Optimize Your Workflows from Id...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdfOffissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
offisadizayn
 
[Google March 2024 Update] How To Thrive: Content, Link Building & SEO
[Google March 2024 Update] How To Thrive: Content, Link Building & SEO[Google March 2024 Update] How To Thrive: Content, Link Building & SEO
[Google March 2024 Update] How To Thrive: Content, Link Building & SEO
Search Engine Journal
 
Etsy Marketing Guide - Tips For Selling Digital Products
Etsy Marketing Guide - Tips For Selling Digital ProductsEtsy Marketing Guide - Tips For Selling Digital Products
Etsy Marketing Guide - Tips For Selling Digital Products
kcblog21
 
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
Demandbase
 
How to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
How to use Short Form Video To Grow Your Brand and Business - Keenya KellyHow to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
How to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
10 Videos Any Business Can Make Right Now! - Shelly Nathan
10 Videos Any Business Can Make Right Now! - Shelly Nathan10 Videos Any Business Can Make Right Now! - Shelly Nathan
10 Videos Any Business Can Make Right Now! - Shelly Nathan
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Winning local SEO in the Age of AI - Dennis Yu
Winning local SEO in the Age of AI - Dennis YuWinning local SEO in the Age of AI - Dennis Yu
Playlist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music UPlaylist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music U
SemajahParker
 
The Old Oak - Press Kit - Cannes Film Festival 2023
The Old Oak - Press Kit - Cannes Film Festival 2023The Old Oak - Press Kit - Cannes Film Festival 2023
The Old Oak - Press Kit - Cannes Film Festival 2023
Pascal Fintoni
 
Email Marketing Master Class - Chris Ferris
Email Marketing Master Class - Chris FerrisEmail Marketing Master Class - Chris Ferris
Traditional Store Audits are Outdated: A New Approach to Protecting Your Bran...
Traditional Store Audits are Outdated: A New Approach to Protecting Your Bran...Traditional Store Audits are Outdated: A New Approach to Protecting Your Bran...
Traditional Store Audits are Outdated: A New Approach to Protecting Your Bran...
Auxis Consulting & Outsourcing
 
Your Path to Profits - The Game-Changing Power of a Marketing - Daniel Bussius
Your Path to Profits - The Game-Changing Power of a Marketing - Daniel BussiusYour Path to Profits - The Game-Changing Power of a Marketing - Daniel Bussius
Your Path to Profits - The Game-Changing Power of a Marketing - Daniel Bussius
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
The New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
The New Era Of SEO - How AI Has Changed SEO Forever - Danny LeibrandtThe New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
The New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Digital Marketing Trends - Experts Insights on How
Digital Marketing Trends - Experts Insights on HowDigital Marketing Trends - Experts Insights on How
May 2024 - VBOUT Partners Meeting Group Session
May 2024 - VBOUT Partners Meeting Group SessionMay 2024 - VBOUT Partners Meeting Group Session
May 2024 - VBOUT Partners Meeting Group Session
Vbout.com
 
Google Ads Vs Social Media Ads-A comparative analysis
Google Ads Vs Social Media Ads-A comparative analysisGoogle Ads Vs Social Media Ads-A comparative analysis
Google Ads Vs Social Media Ads-A comparative analysis
akashrawdot
 

Recently uploaded (20)

My Personal Brand Exploration by Mariano
My Personal Brand Exploration by MarianoMy Personal Brand Exploration by Mariano
My Personal Brand Exploration by Mariano
 
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel LeminTurn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
 
Smart Tools, Smarter Business -15 AI Tools to Optimize Your Workflows from Id...
Smart Tools, Smarter Business -15 AI Tools to Optimize Your Workflows from Id...Smart Tools, Smarter Business -15 AI Tools to Optimize Your Workflows from Id...
Smart Tools, Smarter Business -15 AI Tools to Optimize Your Workflows from Id...
 
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdfOffissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
 
[Google March 2024 Update] How To Thrive: Content, Link Building & SEO
[Google March 2024 Update] How To Thrive: Content, Link Building & SEO[Google March 2024 Update] How To Thrive: Content, Link Building & SEO
[Google March 2024 Update] How To Thrive: Content, Link Building & SEO
 
Etsy Marketing Guide - Tips For Selling Digital Products
Etsy Marketing Guide - Tips For Selling Digital ProductsEtsy Marketing Guide - Tips For Selling Digital Products
Etsy Marketing Guide - Tips For Selling Digital Products
 
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
 
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
 
How to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
How to use Short Form Video To Grow Your Brand and Business - Keenya KellyHow to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
How to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
 
10 Videos Any Business Can Make Right Now! - Shelly Nathan
10 Videos Any Business Can Make Right Now! - Shelly Nathan10 Videos Any Business Can Make Right Now! - Shelly Nathan
10 Videos Any Business Can Make Right Now! - Shelly Nathan
 
Winning local SEO in the Age of AI - Dennis Yu
Winning local SEO in the Age of AI - Dennis YuWinning local SEO in the Age of AI - Dennis Yu
Winning local SEO in the Age of AI - Dennis Yu
 
Playlist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music UPlaylist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music U
 
The Old Oak - Press Kit - Cannes Film Festival 2023
The Old Oak - Press Kit - Cannes Film Festival 2023The Old Oak - Press Kit - Cannes Film Festival 2023
The Old Oak - Press Kit - Cannes Film Festival 2023
 
Email Marketing Master Class - Chris Ferris
Email Marketing Master Class - Chris FerrisEmail Marketing Master Class - Chris Ferris
Email Marketing Master Class - Chris Ferris
 
Traditional Store Audits are Outdated: A New Approach to Protecting Your Bran...
Traditional Store Audits are Outdated: A New Approach to Protecting Your Bran...Traditional Store Audits are Outdated: A New Approach to Protecting Your Bran...
Traditional Store Audits are Outdated: A New Approach to Protecting Your Bran...
 
Your Path to Profits - The Game-Changing Power of a Marketing - Daniel Bussius
Your Path to Profits - The Game-Changing Power of a Marketing - Daniel BussiusYour Path to Profits - The Game-Changing Power of a Marketing - Daniel Bussius
Your Path to Profits - The Game-Changing Power of a Marketing - Daniel Bussius
 
The New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
The New Era Of SEO - How AI Has Changed SEO Forever - Danny LeibrandtThe New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
The New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
 
Digital Marketing Trends - Experts Insights on How
Digital Marketing Trends - Experts Insights on HowDigital Marketing Trends - Experts Insights on How
Digital Marketing Trends - Experts Insights on How
 
May 2024 - VBOUT Partners Meeting Group Session
May 2024 - VBOUT Partners Meeting Group SessionMay 2024 - VBOUT Partners Meeting Group Session
May 2024 - VBOUT Partners Meeting Group Session
 
Google Ads Vs Social Media Ads-A comparative analysis
Google Ads Vs Social Media Ads-A comparative analysisGoogle Ads Vs Social Media Ads-A comparative analysis
Google Ads Vs Social Media Ads-A comparative analysis
 

Digital marketing presentation - security risks for websites

  • 1. Security & Privacy Issues for the Consumer & Site Owner By: Alexandra MacLeod and Liane Van Diepen 10039412/12063364 20 March 2013
  • 2. Introduction  Security  Types of Risks  Privacy  Data Protection Act 1998  Privacy and Electronic Communications Regulations  Cookies  Email Marketing and SPAM  Managerial Implications & Preventative Measures
  • 3. Security - Consumer Concerns  Stolen credit card details  Phishing  Downloading viruses  Website has security certificates Source: Smart Insights (2012)
  • 4. Security – Site Owner  What is information security?  Ensuring your website is available 24 hours a day for your customers  Ensuring only the correct people can administer the website’s content  Preventing unauthorised alteration or destruction of your data  Avoiding your website being used to distribute other peoples’ software  Ensuring that your employees cannot accidentally delete valuable information  Stopping your website being used to damage users’ computers  Protecting your reputation Source: Watson Hall Security, Smart Insights (2012)
  • 5. Types of Security Risks  Denial of Service Attack  Hacking  Destruction of Data - viruses  Malware  Phishing  Secure Payments/Website Encryption Source: Watson Hall Security (2013); Symantec Internet Security Threat Report (2012);
  • 6. Denial of Service Attack  Hackers overload website with traffic  Website can't handle volume and shuts down  Major disruption to service
  • 7. Hacking  Unauthorised website access/publication  Malicious intent / monetary gain  The Sun newspaper hacked by infamous LulzSec hacking group  1 million online users  Data Protection obligations
  • 8. Destruction of Data - Viruses  Computer viruses can shut down company websites  I Love You Virus  Attachment sent via email  Overwrites photo/video files  Shutdown websites including Ford and Chrysler due to employees opening infected email attachments
  • 9. Malicious Software on Websites  “When it comes to computer viruses, you’re now more likely to catch one visiting a church website than surfing for porn” – Symantec (2012)  Malware – viruses, worms, Trojans, bots  Infects website the user’s computers  Downloadable files on websites are a hotbed for viruses  External content on websites such as videos and photos are virus-prone Source : Symantec Internet Security Threat Report (2012)
  • 10. Secure Payments/Website Encryption  Secure payments  Well known payment system such as WorldPal or PayPal which uses encryption  Use Transport Layer Security (TLS) and Secure Socket Layers (SSL) certificates to reassure customers:  Padlock  HTTPS  Green Address Bar  Legally incorporated name Source: Global Sign, (2013)
  • 11. Phishing  Masquerades as an official website communication  Requests users' login information  Uses information to fraudulently obtain funds from their account  Who is responsible for the customer’s loss?
  • 12. Managerial Implications  Reputational damage  Trust  Disruption  Inconvenience  Loss of traffic  Costs
  • 13. Managerial Preventative Measures  Secure website design from the beginning – difficult/expensive to add later  Antivirus software is always up to date  Firewalls  Phishing notifications via email  Employee email filtering  Securesign SSL/TLS Certificates  Split login screens
  • 14. Privacy  Data Protection Act 1998  How data is collected and used  Privacy and Electronic Communications Regulations  Cookies  Email Marketing and SPAM
  • 15. Consumer Concerns  Data leakage – how secure is my data and what happens if it is lost/leaked?  Data use without consent  Annoyance/Waste of time  Not having opt in/opt out notices Source: Smart Insights (2012)
  • 16. Data Protection Act 1998  Eight Principles:  1. Fairly and lawfully processed  2. Processed for limited purposes  3. Adequate, relevant and not excessive  4. Accurate and up to date  5. Not kept longer than necessary  6. Processed in accordance with the individuals rights  7. Secure  8. Not transferred to a country outside the EEC unless it has adequate protection Most breached principle in 2012
  • 17. Data Protection Act 1998  Applies to customers as well as employees  Personal data  Name, address, NI Number  Sensitive data  Political views, religion, ethnicity  Data subject access requests  Enforced by the Information Commissioner’s Office
  • 18. Data Protection Non-compliance  Monetary – up to £500,000  Undertaking  Prosecution
  • 19. Privacy and Electronic Communications Regulations  Electronic Marketing Activities  Email marketing and SPAM  Cookies  Enforced by the Information Commissioners Office
  • 20. Cookies  What is a Cookie?  A small text file that stores user information on their computer  What is it used for?  Shopping cart  Personalisation  Cookie Ingredients  Domain  Name  Value  Expiry  Path  Secure  HTTP only
  • 21. Privacy Directive 26 May 2012  Website notification that cookies are in use  Gives option/instructions how to disable and find further information
  • 22. Email Marketing and SPAM  What is SPAM?  Emails sent without consent  Sent in bulk and impersonalised  Email Marketing Regulations  Consent must be given to receive marketing communications - except where there is a defined relationship  Must contain an unsubscribe link in the email  ICO can investigate complaints relating to SPAM sent from the UK
  • 23. Email Marketing and SPAM  Consent  User must “opt in” rather than “opt out” – i.e. the check box should be unticked  Must be made clear that they are consenting to receive communications  What is a defined relationship/soft opt-in?  Obtained customer details during course of previous sale transaction  Marketing is of similar products  Option to opt-out is given in every future message
  • 24. PECR Non-compliance  Written request for compliance  Monetary – up to £500,000  Undertaking  Prosecution
  • 25. Managerial Implications  Large fines  Reputational damage  Trust  Angry customers
  • 26. Managerial/Consumer Preventative Measures  Appoint a Data Controller for your organisation who will be responsible for DPA and PECR obligations – legal obligation under DPA  Ensure fully compliant with all legislation and regulations  Security and privacy notices on the website in plain English to reassure customers  Be careful who your email address is given to  Don’t click on spam and attachments  Unsubscribe/ Opt out
  • 27. Conclusion  Security  Priority  Reassurance for customers  Privacy  Comply with laws and regulations to avoid punishment  Reassurance for customers  For more information:  Symantec Internet Security Threat Report 2011 (published April 2012)  ICO website
  • 28. References  Chaffey, D., 2013. Website Security Requirements. [online]. Available at: http://www.smartinsights.com/ecommerce/payment-security/website-security- requirements/ [accessed 28 February 2013]  Chaffey, D., 2012. Research on consumer attitudes to online privacy. [online]. Available at: http://www.smartinsights.com/marketplace-analysis/customer-analysis/research-on- consumer-attitudes-to-online-privacy/ [accessed 28 February 2013]  Chaffey, D., Mayer, R., Johnston, K. and Ellis-Chadwick, F., 2000. Internet Marketing. Essex: Pearson.  Financial Ombudsman Service, 2013. Disputed technical transaction. [online]. Available at: http://www.financial-ombudsman.org.uk/publications/technical_notes/disputed- transactions.htm [accessed 10 March 2013]  Global Sign, 2013. Security Certificates. [Online]. Available at: https://www.globalsign.co.uk/ssl/domain-ssl/ [accessed 18 March 2013]  Halliday, J., 2012. The Guardian reaches nearly 9 million readers across print and online. [online]. Available at: http://www.guardian.co.uk/media/2012/sep/12/guardian-9- million-readers-nrs [accessed 10 March 2013]  Information Commissioner’s Office, 2013. Data Protection Act Claiming Compensation. [online] available at: http://www.ico.gov.uk/upload/documents/library/data_protection/practical_application/c laiming_compensation.pdf [accessed 12 March 2013]  Information Commissioner’s Office, 2013. Electronic Mail (Regulations 22 and 23). [online] available at: http://www.ico.gov.uk/for_organisations/privacy_and_electronic_communications/the_gui de/electronic_mail.aspx [accessed 10 March 2013]  Information Commissioner’s Office, 2013. Privacy and Electronic Communications Regulations. [online] available at:http://www.ico.gov.uk/for_organisations/privacy_and_electronic_communications.aspx [accessed 3 March 2013]  Information Commissioner’s Office, 2013. Sensitive details of NHS staff published by Trust in Devon. [online] available at: http://www.ico.gov.uk/news/latest_news/2012/sensitive-details-of-nhs-staff- published-by-devon-trust-06082012.aspx  Information Commissioner’s Office, 2013. Viral Marketing. [online] available at: http://www.ico.gov.uk/for_organisations/privacy_and_electronic_communications/the_gui de/viral_marketing.aspx [accessed 3 March 2013]  Oremus, W., 2013. Unprotected Sects. [online] Available at: http://www.slate.com/articles/technology/technology/2012/05/malware_and_computer_vi ruses_they_ve_left_porn_sites_for_religious_sites_.html [accessed 12 March 2013]  Norton, 2013. Phishing [online]. Available at: http://uk.norton.com/security_response/phishing.jsp [accessed 10 March 2013]  Paypal, 2013. Security. [online]. Available at: https://www.paypal.com/uk/webapps/mpp/paypal-safety-and-security [accessed 10 March 2013]  Perlroth, N, 2012. Six big banks targeted in online attacks. [online. Available at: http://www.bostonglobe.com/business/2012/09/30/banks-hits-wave-computer-attacks- group-claiming-middle-east-ties/gsE6W3V57nBAYrko1ag8rN/story.html [accessed 10 March 2013]  Seltzer, L, 2010. ‘I Love You’ virus turns ten: what have we learned? [online]. Available at: http://www.pcmag.com/article2/0,2817,2363172,00.asp [accessed 28 February 2013]  Symantec, (2012). Internet Security Threat Report 2011{online]. Available at: http://www.symantec.com/content/en/us/enterprise/other_resources/b- istr_main_report_2011_21239364.en-us.pdf [ accessed 12 March 2013]  Teixera, R, 2007. Top five small business internet security threats. [online]. Available at: http://smallbiztrends.com/2007/06/top-five-small-business-internet-security-threats.html [accessed 3 March 2013].  Watson Hall, 2013. Top 10 Website Security Issues. [online]. Available at: https://www.watsonhall.com/resources/downloads/top10-website-security-issues.pdf [accessed 28 February 2013]

Editor's Notes

  1. Lianne
  2. Lianne – introduction – what we will cover during the presentation
  3. Lianne – these are the top four concerns for security that consumers have according to a Smart Insights survey in 2012 and these concerns will be covered in this presentation
  4. Lianne – Leading internet security firm Watson Hall describes information security as the following: [reads from list].
  5. Lex – types of security risk which are contained within the previous definition
  6. Lex – describe what a denial of service attack is, use examples of the American banks. Implication: reputation-trust
  7. Lex – describe what a hacking is, talk about the Sun. Implication: Reputation
  8. Lex – describe what viruses can do to website, talk about I LOVE YOU. Implication: Reputation / costs
  9. Lex – describe what malware is and how it can be contained within website. Implication: Reputation / costs
  10. Lex – importance of using secure payment system with encryption, using TLS and SSL certificate to reassure customers. Explain the above image.
  11. Lex – Explain phishing – QUESTION TIME: Ask class who they think the responsibility for this kind of fraud lies with. Explain it.
  12. Lianne – as above
  13. Lianne – as above
  14. Lianne – introduction to privacy section
  15. Lianne – according to a Smart Insights survey the following are consumers biggest concerns regarding privacy and communications
  16. Lex – discuss each principle
  17. Lex – as above
  18. Lex – types of penalty with examples
  19. Lianne – The PECR covers electronic marketing activities such as email marketing, SPAM and cookies. As with Data Protection Act it is enforced by the ICO
  20. Lianne – can you add some info here? I don’t know much about this. Thanks!
  21. Lianne – as above and further info you think of
  22. Lianne – as above plus whatever else you think necessary – the defined relationship is discussed in the next slide so maybe say “...except where there is a defined relationship....which will be discussed in the next slide....must contain unsubscribe..”??
  23. Lianne – As above plus whatever further information you think is necessary
  24. Lianne/Lex (I don’t mind doing it if you prefer but up to you). As with the DPA, the ICO can impose the same types of penalties - after a written notice for compliance has been issued. The ICO has written to companies who were deemed uncompliant with the cookie regulations including the above companies. No penalties as yet and the ICO is working with them to achieve compliance.
  25. Lex – as above
  26. Lex – as above
  27. Lex – as above