SlideShare a Scribd company logo
Fraudsters Hackers & Thieves!
How can we better protect our customers?
It’s official: consumers do not feel their
private data is being kept private
Looking around at the headlines, where high-
profile breach after high-profile breach is
documented, the lack of trust in data security is
no surprise.
Whether it be through a corporate breach, where
consumers’ confidential information is revealed as
part of thousands of records stolen or
inappropriately handled, or an attack that they
themselves initiate via inappropriate use of their
personal computer or mobile phone, or anything in
between, breaches have caused consumer distrust
to become rampant when it comes to whether or
not their personal information is being kept safe.
This is hammered home in a recent Global Survey
on Internet Security and Trust report from
CIGI-Ipsos, in which only 38 percent of consumers
surveyed trusted that their activities on the
internet are not being monitored.
64%
of consumers are more concerned
about their online privacy than a
year ago.
of consumers do not trust that
their internet activity is private.
62%
Source: CIGI-Ipsos Global Survey on Internet Security and Trust
Fraudsters Hackers & Thieves!
Stop for a moment and think
How much of our lives are now conducted online,
or are connected in some way?
When you wake up in the morning, you likely
check personal and perhaps work email from a
tablet or mobile device. You might update
Facebook, Instagram or Twitter. You may ask your
Amazon Echo what the weather and traffic is like
on your way to work. You might place a grocery
order online, or order a new supply of toilet paper.
On the ride into work, you might use a Bluetooth
headset to listen to voice mails or catch up on the
day’s headlines.
When a large majority of our everyday life is
conducted online, how did the industry get to a
point where the consumers who have bought
into this “connected vision” don’t feel safe being
online?
Fraudsters Hackers & Thieves!
Data breaches have consequences far
beyond the fines
Symantec conducted a survey on privacy within
the European Union, and found that 59 percent of
respondents have experienced a data protection
issue in the past.
Reported issues included being notified of a data
breach by a company that had access to some of
their personal information, having an email or
social media account hacked, having bank details
stolen, being a victim of online identify theft,
getting a computer virus, or responding to an
online scam or fake email.
Overall, 57 percent of respondents reported being
worried that their data is not safe.
of survey respondents
have experienced a data
protection issue.59%
TOP PRIVACY & SECURITY CONCERNS
Identity Theft
Banking Fraud
Data Collection
Personal Data Loss
45%
23%
22%
63%
Source: Symantec State of Privacy Report 2015
Fraudsters Hackers & Thieves!
The more connected online, the greater
the risk
The National Telecommunications & Information
Administration (NTIA) in May released a report
that correlates how connected we are online with
a higher risk of data breaches.
The report found that 9 percent of online house-
holds that used just one type of computing
device (such as a desktop, laptop, tablet,
Internet-connected mobile phone, wearable
device, or TV-connected device) reported a
security breach.
While 31 percent of those that used at least five
different types of devices reported a breach.
1 2 3 4 5+
9%
14%
25%
31%
Devices
Breaches
19%
Consumers using multiple
devices are at a higher risk
of data breach.
Source: U.S. Census Bureau NTIA Computer and Internet Use Supplement
Fraudsters Hackers & Thieves!
Fears and distrust about privacy, security
change how consumers use the Internet
Furthermore, there is a potential economic impact
to consumers’ distrust. The report also found that
consumers are so concerned with privacy and
security on the Internet that their household
opted out of participation in certain online
activities.
Forty-five percent of online households reported
that these concerns stopped them from
conducting financial transactions, buying goods or
services, posting on social networks, or
expressing opinions on controversial or political
issues via the Internet, and 30 percent refrained
from at least two of these activities. In households
that experienced a breach, these percentages are
even higher.
This fear and distrust is not without good reason.
In Symantec’s April 2016 Internet Security Threat
Report (ISTR), the security firm estimated that if
all breaches that occurred in 2015 reported the
number of consumers worldwide impacted, it
would total an estimated half-billion people.
40%
ONLINE ACTIVITIES STOPPED DUE TO PRIVACY & SECURITY CONCERNS
Conducting Financial Transactions
Buying Goods | Services
Posting on Social
35%
35%
Source: U.S. Census Bureau NTIA Computer and Internet Use Supplement
Fraudsters Hackers & Thieves!
Credit card numbers? Actually, there’s
a new kid in town
Financial information such as credit card
numbers are still coveted information, although
their per-card value is going down and their shelf
life is short since credit card companies and credit
card owners are using technology to shut down
fraudulent transactions quickly.
Instead, the new sought-after information
being targeted is information from insurance,
government and healthcare organizations.
The more details someone has about an
individual, the easier it is to commit identity fraud,
and targeting these groups provides more
complete profiles of individuals to criminals.
Real names are still the most common
(78 percent) type of information exposed,
according to the ISTR, followed by home
addresses, birth dates, Government IDs (such as
Social Security numbers), medical records, and
financial information.
The more details someone has about
a person, the easier it is to commit
identity fraud.
TOP INFORMATION EXPOSED
Real Names
HomeAddresses
Birth Dates
Gov. ID Numbers
Medical Records
78%
44%
41%
38%
36%
Source: Symantec Internet Security Threat Report Vol. 21
Fraudsters Hackers & Thieves!
The key to success, tailor the experience
to meet the individual user
Businesses can and should be doing much more
to secure customers’ private and oftentimes
sensitive information, reducing the risk for
everyone.
History has shown that when encryption
solutions—including email encryption—are
deployed properly, they work well.
But communications with customers requires a
different set of criteria than internal
communications or communications with partners.
User experience is key, according to a recent
research note from Gartner, consumers are likely
to resist the installation of third-party software or
apps on their devices to access secured content.
FOCUS ON USER EXPERIENCE
Through 2020, 95% of cloud
security failures will be the
customer’s fault. *Gartner
Source: Gartner Guide to Email Encryption
Fraudsters Hackers & Thieves!
So, how can you better protect your
customers?
In summary, consumers today have become much
more discerning about their online activities, and
know controlling their online activity plays a role
in helping protect their privacy.
The organizations they do business with need to
take the security of customers’ private data just as
seriously, and invest the time, effort and budget
into ensuring its safety.
About Echoworx
Since 2000, Echoworx has been bringing simplicity and
flexibility to encryption. Echoworx’s flagship solution,
OneWorld Enterprise Encryption, provides an adaptive, fully
flexible approach to encryption that ensures the privacy
of sensitive messages. Enterprises investing in Echoworx’s
OneWorld platform, are gaining an adaptive, fully flexible
approach to encryption, creating seamless customer
experiences and in turn earning their loyalty and trust.
Recommended Reading
How Effective B2C Encryption Protection Works
Top Banks Demand Performance & Volume
OneWorld Enterprise Encryption
Why OneWorld Encryption with Office 365?
Fraudsters Hackers & Thieves!
Email encryption doesn’t have to be cryptic
www.echoworx.com
info@echoworx.com
NorthAmerica 1 800.346.4193 | UK 44 0.800.368.5334
@Echoworx

More Related Content

What's hot

Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Money 2Conf
 
Keep your office secure
Keep your office secureKeep your office secure
Keep your office secure
Konica Minolta
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
Priyanka Aash
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
Symantec
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
- Mark - Fullbright
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
Dominic A Ienco
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
Mert Akın
 
TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINAL
Peggy Lawless
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
Suresh Kesavan
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
marukanda
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemalto
Jonas Mercier
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequencies
Δρ. Γιώργος K. Κασάπης
 
Security Concerns Around the World | Infographic
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | Infographic
Ping Identity
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
Javier Gonzalez
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
EMC
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Jef Lacson
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
Ashish Chauhan
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Stanford GSB Corporate Governance Research Initiative
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
Insights success media and technology pvt ltd
 

What's hot (20)

Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Keep your office secure
Keep your office secureKeep your office secure
Keep your office secure
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINAL
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemalto
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequencies
 
Security Concerns Around the World | Infographic
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | Infographic
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 

Viewers also liked

La formación continua como herramienta potenciadora de la administración pública
La formación continua como herramienta potenciadora de la administración públicaLa formación continua como herramienta potenciadora de la administración pública
La formación continua como herramienta potenciadora de la administración pública
Jesús Rodolfo Andrade León
 
Two and a half men yeizel segarra 4ºd
Two and a half men yeizel segarra 4ºdTwo and a half men yeizel segarra 4ºd
Two and a half men yeizel segarra 4ºdyeizel segarra
 
Vol.2, issue 2, no.3 (1)
Vol.2, issue 2, no.3 (1)Vol.2, issue 2, no.3 (1)
Vol.2, issue 2, no.3 (1)
Satya Mamidi
 
The Academy (Marketing Management)
The Academy (Marketing Management)The Academy (Marketing Management)
The Academy (Marketing Management)
Saad Munami
 
Yeizel greenpeace
Yeizel greenpeaceYeizel greenpeace
Yeizel greenpeace
yeizel segarra
 
School’s materials
School’s materialsSchool’s materials
School’s materials
Liliam Fiorentino de Melo
 
Natural disaster yeizel segarra 4ºd
Natural disaster yeizel segarra 4ºd Natural disaster yeizel segarra 4ºd
Natural disaster yeizel segarra 4ºd
yeizel segarra
 
Noma´s restaurant
Noma´s restaurantNoma´s restaurant
Noma´s restaurant
yeizel segarra
 
Manual de Normas y Procedimientos en materia de Denuncias
Manual de Normas y Procedimientos en materia de DenunciasManual de Normas y Procedimientos en materia de Denuncias
Manual de Normas y Procedimientos en materia de Denuncias
Jesús Rodolfo Andrade León
 
mua pendientes y pulseras
mua pendientes y pulserasmua pendientes y pulseras
mua pendientes y pulseras
muaunbeso
 
impacto-del-control-interno-en-la-administracion-publica-municipal
impacto-del-control-interno-en-la-administracion-publica-municipalimpacto-del-control-interno-en-la-administracion-publica-municipal
impacto-del-control-interno-en-la-administracion-publica-municipal
Jesús Rodolfo Andrade León
 
Manual Descriptivo por Clase de Cargo de la Contraloría del municipio Eulalia...
Manual Descriptivo por Clase de Cargo de la Contraloría del municipio Eulalia...Manual Descriptivo por Clase de Cargo de la Contraloría del municipio Eulalia...
Manual Descriptivo por Clase de Cargo de la Contraloría del municipio Eulalia...
Jesús Rodolfo Andrade León
 
Manual de Normas y Procedimientos de Contrataciones Pública
Manual de Normas y Procedimientos de Contrataciones PúblicaManual de Normas y Procedimientos de Contrataciones Pública
Manual de Normas y Procedimientos de Contrataciones Pública
Jesús Rodolfo Andrade León
 
Manual de Organizacion de la Oficina de Atención al Ciudadano
Manual de Organizacion de la Oficina de Atención al CiudadanoManual de Organizacion de la Oficina de Atención al Ciudadano
Manual de Organizacion de la Oficina de Atención al Ciudadano
Jesús Rodolfo Andrade León
 
205 wikarta-kuliah i mektek ti
205 wikarta-kuliah i mektek ti205 wikarta-kuliah i mektek ti
205 wikarta-kuliah i mektek ti
Ari Indrajaya
 
MRP, MRP2 and ERP system in supply chain
MRP, MRP2 and ERP system in supply chainMRP, MRP2 and ERP system in supply chain
MRP, MRP2 and ERP system in supply chain
Saad Munami
 
Manual de normas y procedimiento para el trámite y otorgamiento de viáticos
Manual de normas y procedimiento para el trámite y otorgamiento de viáticosManual de normas y procedimiento para el trámite y otorgamiento de viáticos
Manual de normas y procedimiento para el trámite y otorgamiento de viáticos
Jesús Rodolfo Andrade León
 
Manual de normas y procedimientos para solicitud y aprobacion de permisos
Manual de normas y procedimientos para solicitud y aprobacion de permisosManual de normas y procedimientos para solicitud y aprobacion de permisos
Manual de normas y procedimientos para solicitud y aprobacion de permisos
Jesús Rodolfo Andrade León
 

Viewers also liked (18)

La formación continua como herramienta potenciadora de la administración pública
La formación continua como herramienta potenciadora de la administración públicaLa formación continua como herramienta potenciadora de la administración pública
La formación continua como herramienta potenciadora de la administración pública
 
Two and a half men yeizel segarra 4ºd
Two and a half men yeizel segarra 4ºdTwo and a half men yeizel segarra 4ºd
Two and a half men yeizel segarra 4ºd
 
Vol.2, issue 2, no.3 (1)
Vol.2, issue 2, no.3 (1)Vol.2, issue 2, no.3 (1)
Vol.2, issue 2, no.3 (1)
 
The Academy (Marketing Management)
The Academy (Marketing Management)The Academy (Marketing Management)
The Academy (Marketing Management)
 
Yeizel greenpeace
Yeizel greenpeaceYeizel greenpeace
Yeizel greenpeace
 
School’s materials
School’s materialsSchool’s materials
School’s materials
 
Natural disaster yeizel segarra 4ºd
Natural disaster yeizel segarra 4ºd Natural disaster yeizel segarra 4ºd
Natural disaster yeizel segarra 4ºd
 
Noma´s restaurant
Noma´s restaurantNoma´s restaurant
Noma´s restaurant
 
Manual de Normas y Procedimientos en materia de Denuncias
Manual de Normas y Procedimientos en materia de DenunciasManual de Normas y Procedimientos en materia de Denuncias
Manual de Normas y Procedimientos en materia de Denuncias
 
mua pendientes y pulseras
mua pendientes y pulserasmua pendientes y pulseras
mua pendientes y pulseras
 
impacto-del-control-interno-en-la-administracion-publica-municipal
impacto-del-control-interno-en-la-administracion-publica-municipalimpacto-del-control-interno-en-la-administracion-publica-municipal
impacto-del-control-interno-en-la-administracion-publica-municipal
 
Manual Descriptivo por Clase de Cargo de la Contraloría del municipio Eulalia...
Manual Descriptivo por Clase de Cargo de la Contraloría del municipio Eulalia...Manual Descriptivo por Clase de Cargo de la Contraloría del municipio Eulalia...
Manual Descriptivo por Clase de Cargo de la Contraloría del municipio Eulalia...
 
Manual de Normas y Procedimientos de Contrataciones Pública
Manual de Normas y Procedimientos de Contrataciones PúblicaManual de Normas y Procedimientos de Contrataciones Pública
Manual de Normas y Procedimientos de Contrataciones Pública
 
Manual de Organizacion de la Oficina de Atención al Ciudadano
Manual de Organizacion de la Oficina de Atención al CiudadanoManual de Organizacion de la Oficina de Atención al Ciudadano
Manual de Organizacion de la Oficina de Atención al Ciudadano
 
205 wikarta-kuliah i mektek ti
205 wikarta-kuliah i mektek ti205 wikarta-kuliah i mektek ti
205 wikarta-kuliah i mektek ti
 
MRP, MRP2 and ERP system in supply chain
MRP, MRP2 and ERP system in supply chainMRP, MRP2 and ERP system in supply chain
MRP, MRP2 and ERP system in supply chain
 
Manual de normas y procedimiento para el trámite y otorgamiento de viáticos
Manual de normas y procedimiento para el trámite y otorgamiento de viáticosManual de normas y procedimiento para el trámite y otorgamiento de viáticos
Manual de normas y procedimiento para el trámite y otorgamiento de viáticos
 
Manual de normas y procedimientos para solicitud y aprobacion de permisos
Manual de normas y procedimientos para solicitud y aprobacion de permisosManual de normas y procedimientos para solicitud y aprobacion de permisos
Manual de normas y procedimientos para solicitud y aprobacion de permisos
 

Similar to Fraudsters Hackers & Thieves

Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Brunswick Group
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
Cognizant
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
Silicon Valley Bank
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
CheapSSLsecurity
 
The economics of digital identity
The economics of digital identityThe economics of digital identity
The economics of digital identity
The Economist Media Businesses
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trust
OptimediaSpain
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINAL
Peggy Lawless
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
Juniper Networks
 
Citrix Security Survey Guide
Citrix Security Survey GuideCitrix Security Survey Guide
Citrix Security Survey Guide
Citrix
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
Camilo do Carmo Pinto
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
FinTech Belgium
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
TanayMalhotra
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
Ulf Mattsson
 
The State of Privacy Report
The State of Privacy ReportThe State of Privacy Report
The State of Privacy Report
FigLeaf
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
LifeLockBusinessSolutions
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
PwC France
 
CBIZ Cyber Security - What Every Business Needs to Know
CBIZ Cyber Security - What Every Business Needs to KnowCBIZ Cyber Security - What Every Business Needs to Know
CBIZ Cyber Security - What Every Business Needs to Know
CBIZ, Inc.
 
White Paper: The Age of Data
White Paper: The Age of DataWhite Paper: The Age of Data
White Paper: The Age of Data
Kim Cook
 

Similar to Fraudsters Hackers & Thieves (20)

Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
The economics of digital identity
The economics of digital identityThe economics of digital identity
The economics of digital identity
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trust
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINAL
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
Citrix Security Survey Guide
Citrix Security Survey GuideCitrix Security Survey Guide
Citrix Security Survey Guide
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
 
The State of Privacy Report
The State of Privacy ReportThe State of Privacy Report
The State of Privacy Report
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
CBIZ Cyber Security - What Every Business Needs to Know
CBIZ Cyber Security - What Every Business Needs to KnowCBIZ Cyber Security - What Every Business Needs to Know
CBIZ Cyber Security - What Every Business Needs to Know
 
White Paper: The Age of Data
White Paper: The Age of DataWhite Paper: The Age of Data
White Paper: The Age of Data
 

Recently uploaded

Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
ssuser567e2d
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
MJ Global
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
SEOSMMEARTH
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
CLIVE MINCHIN
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
Alexandra Fulford
 

Recently uploaded (20)

Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
 

Fraudsters Hackers & Thieves

  • 1. Fraudsters Hackers & Thieves! How can we better protect our customers?
  • 2.
  • 3. It’s official: consumers do not feel their private data is being kept private Looking around at the headlines, where high- profile breach after high-profile breach is documented, the lack of trust in data security is no surprise. Whether it be through a corporate breach, where consumers’ confidential information is revealed as part of thousands of records stolen or inappropriately handled, or an attack that they themselves initiate via inappropriate use of their personal computer or mobile phone, or anything in between, breaches have caused consumer distrust to become rampant when it comes to whether or not their personal information is being kept safe. This is hammered home in a recent Global Survey on Internet Security and Trust report from CIGI-Ipsos, in which only 38 percent of consumers surveyed trusted that their activities on the internet are not being monitored. 64% of consumers are more concerned about their online privacy than a year ago. of consumers do not trust that their internet activity is private. 62% Source: CIGI-Ipsos Global Survey on Internet Security and Trust Fraudsters Hackers & Thieves!
  • 4. Stop for a moment and think How much of our lives are now conducted online, or are connected in some way? When you wake up in the morning, you likely check personal and perhaps work email from a tablet or mobile device. You might update Facebook, Instagram or Twitter. You may ask your Amazon Echo what the weather and traffic is like on your way to work. You might place a grocery order online, or order a new supply of toilet paper. On the ride into work, you might use a Bluetooth headset to listen to voice mails or catch up on the day’s headlines. When a large majority of our everyday life is conducted online, how did the industry get to a point where the consumers who have bought into this “connected vision” don’t feel safe being online? Fraudsters Hackers & Thieves!
  • 5. Data breaches have consequences far beyond the fines Symantec conducted a survey on privacy within the European Union, and found that 59 percent of respondents have experienced a data protection issue in the past. Reported issues included being notified of a data breach by a company that had access to some of their personal information, having an email or social media account hacked, having bank details stolen, being a victim of online identify theft, getting a computer virus, or responding to an online scam or fake email. Overall, 57 percent of respondents reported being worried that their data is not safe. of survey respondents have experienced a data protection issue.59% TOP PRIVACY & SECURITY CONCERNS Identity Theft Banking Fraud Data Collection Personal Data Loss 45% 23% 22% 63% Source: Symantec State of Privacy Report 2015 Fraudsters Hackers & Thieves!
  • 6. The more connected online, the greater the risk The National Telecommunications & Information Administration (NTIA) in May released a report that correlates how connected we are online with a higher risk of data breaches. The report found that 9 percent of online house- holds that used just one type of computing device (such as a desktop, laptop, tablet, Internet-connected mobile phone, wearable device, or TV-connected device) reported a security breach. While 31 percent of those that used at least five different types of devices reported a breach. 1 2 3 4 5+ 9% 14% 25% 31% Devices Breaches 19% Consumers using multiple devices are at a higher risk of data breach. Source: U.S. Census Bureau NTIA Computer and Internet Use Supplement Fraudsters Hackers & Thieves!
  • 7. Fears and distrust about privacy, security change how consumers use the Internet Furthermore, there is a potential economic impact to consumers’ distrust. The report also found that consumers are so concerned with privacy and security on the Internet that their household opted out of participation in certain online activities. Forty-five percent of online households reported that these concerns stopped them from conducting financial transactions, buying goods or services, posting on social networks, or expressing opinions on controversial or political issues via the Internet, and 30 percent refrained from at least two of these activities. In households that experienced a breach, these percentages are even higher. This fear and distrust is not without good reason. In Symantec’s April 2016 Internet Security Threat Report (ISTR), the security firm estimated that if all breaches that occurred in 2015 reported the number of consumers worldwide impacted, it would total an estimated half-billion people. 40% ONLINE ACTIVITIES STOPPED DUE TO PRIVACY & SECURITY CONCERNS Conducting Financial Transactions Buying Goods | Services Posting on Social 35% 35% Source: U.S. Census Bureau NTIA Computer and Internet Use Supplement Fraudsters Hackers & Thieves!
  • 8. Credit card numbers? Actually, there’s a new kid in town Financial information such as credit card numbers are still coveted information, although their per-card value is going down and their shelf life is short since credit card companies and credit card owners are using technology to shut down fraudulent transactions quickly. Instead, the new sought-after information being targeted is information from insurance, government and healthcare organizations. The more details someone has about an individual, the easier it is to commit identity fraud, and targeting these groups provides more complete profiles of individuals to criminals. Real names are still the most common (78 percent) type of information exposed, according to the ISTR, followed by home addresses, birth dates, Government IDs (such as Social Security numbers), medical records, and financial information. The more details someone has about a person, the easier it is to commit identity fraud. TOP INFORMATION EXPOSED Real Names HomeAddresses Birth Dates Gov. ID Numbers Medical Records 78% 44% 41% 38% 36% Source: Symantec Internet Security Threat Report Vol. 21 Fraudsters Hackers & Thieves!
  • 9. The key to success, tailor the experience to meet the individual user Businesses can and should be doing much more to secure customers’ private and oftentimes sensitive information, reducing the risk for everyone. History has shown that when encryption solutions—including email encryption—are deployed properly, they work well. But communications with customers requires a different set of criteria than internal communications or communications with partners. User experience is key, according to a recent research note from Gartner, consumers are likely to resist the installation of third-party software or apps on their devices to access secured content. FOCUS ON USER EXPERIENCE Through 2020, 95% of cloud security failures will be the customer’s fault. *Gartner Source: Gartner Guide to Email Encryption Fraudsters Hackers & Thieves!
  • 10. So, how can you better protect your customers? In summary, consumers today have become much more discerning about their online activities, and know controlling their online activity plays a role in helping protect their privacy. The organizations they do business with need to take the security of customers’ private data just as seriously, and invest the time, effort and budget into ensuring its safety. About Echoworx Since 2000, Echoworx has been bringing simplicity and flexibility to encryption. Echoworx’s flagship solution, OneWorld Enterprise Encryption, provides an adaptive, fully flexible approach to encryption that ensures the privacy of sensitive messages. Enterprises investing in Echoworx’s OneWorld platform, are gaining an adaptive, fully flexible approach to encryption, creating seamless customer experiences and in turn earning their loyalty and trust. Recommended Reading How Effective B2C Encryption Protection Works Top Banks Demand Performance & Volume OneWorld Enterprise Encryption Why OneWorld Encryption with Office 365? Fraudsters Hackers & Thieves! Email encryption doesn’t have to be cryptic
  • 11.