SlideShare a Scribd company logo
1 of 28
Download to read offline
The 2013 eCommerce Cyber Crime Report:
Safeguarding Brand And Revenue This Holiday Season
	
  

Sponsored by

RSA Security
Independently conducted by Ponemon Institute, LLC
Publication Date: October 2013
	
  
Ponemon Institute© Research Report
 

	
  
The 2013 eCommerce Cyber Crime Report:
Safeguarding Brand And Revenue This Holiday Season
A Study of US & UK IT Security Practitioners

Part 1. Introduction
During the holiday shopping season, a company’s inability to safeguard its ecommerce websites
and keep customers loyal comes with a high price tag. While shoppers on Cyber Monday can
significantly boost sales, just one hour of downtime as a result of an attack could mean an
average loss of almost $500,000. Or, about $8,000 for every minute a purchase is prevented or
the integrity of the website compromised.
It gets worse when you consider what the cost could be to customer loyalty if it becomes
impossible to make a purchase or there is perception that the website is not secure. According to
the companies in our study, an average of $3.4 million is what reputation and brand damage can
cost as a result of the loss of customers.
Conducted by Ponemon Institute and sponsored by RSA Security, the study surveyed more than
1
1,100 experienced IT practitioners in the United States and United Kingdom. To ensure a
knowledgeable respondent, all participants say they are familiar with their organization’s website
security and anti-fraud activities. The majority has either full responsibility or some responsibility
for the security of their organization’s websites and believes that prevention of internet fraud is a
high priority for their company during high traffic days such as Cyber Monday.
In this study, we asked companies to estimate the number of customer-facing websites they
have, ranging from 1 to more than 100. On average, companies represented in this study have 44
ecommerce websites. These companies estimate that just on Cyber Monday revenues from
these websites can increase an average of 55 percent or more than $600,000.
Top findings from this study include:


The financial stakes are high on Cyber Monday and during the holiday shopping season. The
estimated brand damage could average $3.4 million for one hour of downtime.



Beware of Botnet and DoS attacks. In this research, we asked respondents to identify the
types of attacks most likely to occur during the holiday shopping season. Botnet and DoS are
not only expected to be the most prevalent, they are considered very difficult to detect.

	
  


Cyber Monday precautions are often ignored. Sixty-four percent of respondents say their
organizations have seen an increase in Internet fraud and/or attempted website attacks on
high traffic days such as Cyber Monday. However, only one-third say they take special
precautions to ensure high availability and integrity of their websites.

	
  


Detection of fraud is difficult because of the lack of real time visibility. More than half of
respondents (51 percent) say their organization does not have real time visibility into its
website to detect the presence of a criminal.

	
  


Only 36 percent or respondents say their organizations use automated forensic tools that
detect business logic abuses.

	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
1

The average respondent has approximately 11 years experience in their field.

	
  
 

	
  

	
  

Part 2. Key Findings
The analysis of key findings is presented in this section. The complete audited findings are
presented in the appendix of this report. The findings are organized according to the following
topics:




Financial stakes are high during the holiday shopping season
Methods used to attack ecommerce websites
Why companies are vulnerable to attack

Financial stakes are high during the holiday shopping season
Companies invest heavily in website marketing only to realize significant losses if they are not
ready to deal with the potential threat of attacks on Cyber Monday. Understanding the cost of
downtime and more important the cost to reputation and brand, can help make the business case
for investing in the resources necessary to stop fraud and preserve the integrity of customer
facing websites.
The economics of ecommerce. On average, organizations have about 44 customer-facing
websites and on a typical day sales from internet and mobile channels average $800,000.
Figure 1 shows the percentage increase in revenues on Cyber Monday. As shown, 51 percent of
respondents (34 percent + 13 percent + 1 percent + 2 percent + 1 percent) estimate that
revenues just on Cyber Monday will increase more than 50 percent. Based on all responses, the
average increase is 55 percent or $665,115.
Figure 1. The Cyber Monday revenue boost
Extrapolated average increase is 55 percent

40%
34%

35%
30%
25%

22%

20%
15%
10%

13%

12%
8%

9%

5%

1%

2%

1%

0%
No
increase

< 10%

11% to
25%

26% to
50%

51% to
75%

76% to
100%

101% to
200%

201% to
500%

> 500%
 

	
  

	
  

Internet fraud is costly and affects brand. According to organizations in our study the amount
of revenue lost due to internet fraud can do measurable harm to the bottom line. As shown in
Figure 2, an average of almost 5 percent of total revenues (gross sales) were lost due to the
financial and brand impact of internet fraud during the past 12 months. They also report an
average of 19 separate internet fraud incidents during the same period.
Figure 2. The financial & brand impact of Internet fraud as a percentage of total revenues
30%

27%

27%

25%
20%
15%

15%
10%

11%

10%
5%

5%

6%

0%
None

1% to 2%

3% to 4%

5% to 6%

7% to 8%

9% to 10%

> 10%
 

	
  

	
  

The economics of downtime. According to Figure 3, on a typical day the average cost if a
primary customer-facing website went down for just one hour is estimated to be $336,729. As
discussed, respondents anticipate an average revenue boost of 55 percent on Cyber Monday and
downtime is expected to cost an average of almost $500,000.
Figure 3. The cost of losing one customer-facing website for one hour
Extrapolated average loss is $336,729

8%

> $1 million

12%
12%

$750,001 to $1 million

18%

12%

$500,000 to $750,000

22%
17%
17%

$100,001 to $500,000
$50,001 to $100,000

11%

$20,001 to $50,000

17%

10%

$10,001 to $20,000

16%

8%

$5,001 to $10,000

1%

3%

1%
1%

$1,000 to $5,000
< $1,000

14%

0%
0%

1%
5%

10%

15%

20%

25%

Cost in lost traffic or revenues when a customer-facing website is down for one hour
Cost in lost traffic or revenues when a customer-facing website is down for one hour on Cyber Monday
 

	
  

	
  

If customers become frustrated and disgruntled when they are prevented from making a purchase
and vow never to return, the estimated brand damage could be on average $3.4 million, as
shown in Figure 4.
Figure 4: The economic impact to reputation & brand
Extrapolated average of brand & reputation damage is $3,372,616

1%

> $100 million

2%

$50 million to $100 million

3%

$10 million to $50 million

6%

$1 million to $10 million

8%

$750,001 to $1 million

11%

$500,000 to $750,000

16%

$100,001 to $500,000

15%

$50,001 to $100,000
11%

$20,001 to $50,000

13%

$10,001 to $20,000

12%

$5,001 to $10,000
4%

$1,000 to $5,000
1%

< $1,000
0%

2%

4%

6%

8%

10%

12%

14%

16%

18%

Figure 5 reveals that 66 percent of respondents say there would be a substantial or at least some
loss of customers as a result of the website shutting down.
Figure 5. Will companies lose customers because of downtime?
42%

45%
40%
35%
30%
25%

25%

24%

20%
15%

10%

10%
5%
0%
Yes, substantial
increase in churn

Yes, some increase in
churn

No

Unsure
 

	
  

	
  

Methods used to attack ecommerce websites
The majority of respondents believe the nine types of attacks are more likely to occur during the
holiday shopping season than on other days. The findings reveal that not only can the attacks be
economically disastrous, the majority of respondents believe they are difficult to detect. The types
of attacks are presented in the order they are most likely to occur.
Attack 1: Botnet and DoS. This type of attack tops the list. We define this scenario as occurring
when a cyber criminal targets a botnet against a company and this results in a denial of Service
(DoS) attack that ultimately brings down its websites. Eighty-three percent say it is more likely to
occur on high traffic days and 72 percent say it would be very difficult or difficult to detect.
Figure 6. Botnet and DoS
90%

83%

80%

72%

70%
60%
50%
40%
30%
20%
10%
0%
Liklihood of happening on Cyber Monday

Difficult to detect

Attack 2: Mobile app store fraud. The likelihood of this type of fraud taking place on Cyber
Monday is also high. Companies that are vulnerable have an app store/market place that
provides access to products and instant rebates. Criminals masquerading as a merchant and a
buyer manipulate the open platform for financial gain, cashing in on rebates and earning points
from credit card incentive programs. Seventy-eight percent say it is more likely to occur on Cyber
Monday than other times and 71 percent say it would be difficult to detect.
Figure 7. Mobile app store fraud
90%
80%

78%
71%

70%
60%
50%
40%
30%
20%
10%
0%
Liklihood of happening on Cyber Monday

Difficult to detect
 

	
  

	
  

Attack 3. Mobility use case. A company expanded its consumer reach using a mobility platform
that allows customers to access its websites using smart phones and other mobile devices. Cyber
criminals infiltrate these devices with malware that captures customers’ account access
credentials. The criminals harvest this information to takeover accounts using a laptop or desktop
computer. Sixty-six percent say it is more likely to occur and a higher percentage (70 percent) say
it would be very difficult or difficult to detect.
Figure 8. Mobility use case
80%
66%

70%

70%

60%
50%
40%
30%
20%
10%
0%
Liklihood of happening on Cyber Monday

Difficult to detect

Attack 4: Click fraud. A company hires an agency to conduct an online advertising campaign.
The agency is paid on a “per click” basis. In reality, many of the paid “per clicks” are not authentic
(i.e. not involving an interested consumer). Sixty-six percent say it is more likely to occur and a
higher percentage (74 percent) say it would be very difficult or difficult to detect.
Figure 9. Click fraud
80%
70%

74%
66%

60%
50%
40%
30%
20%
10%
0%
Liklihood of happening on Cyber Monday

Difficult to detect
 

	
  

	
  

Attack 5: Testing stolen credit cards. A cyber criminal steals hundreds of credit card numbers
and uses a company’s credit or debit card payments function to validate active credit cards. Sixtyfour percent of respondents say this is more likely to happen and 66 percent say it would be very
difficult or difficult to detect.
Figure 10. Testing stolen credit cards
70%

64%

66%

60%
50%
40%
30%
20%
10%
0%
Liklihood of happening on Cyber Monday

Difficult to detect

Attack 6. eCoupons. Fraudsters do an end-run around a company’s pricing policy. They select a
heavily discounted item and place it in the “shopping cart.” They delay the checkout in order to
obtain and apply an eCoupon to the final purchase price, thus obtaining the item well below the
company’s cost. Again, 64 percent say this is more likely to happen and a significant percentage
(70) say this would be very difficult or difficult to detect.
Figure 11. eCoupons
80%
70%

70%
64%

60%
50%
40%
30%
20%
10%
0%
Liklihood of happening on Cyber Monday

Difficult to detect
 

	
  

	
  

The following three types of attack are considered less likely to occur but are still
considered very difficult or difficult to detect.
Attack 7: Account hijacking. A successful spear phishing scam resulted in cyber criminals
obtaining the user names and passwords of customers. The leakage of customer account
information occurred because employees were duped by what appeared to be a legitimate
internal company email communication. The crime originated when the criminal obtained key
employee email addresses directly from the website. Sixty-one percent say it is more likely to
occur and 72 percent say it would be very difficult or difficult to detect.
Figure 12. Account hijacking
80%
70%

72%
61%

60%
50%
40%
30%
20%
10%
0%
Liklihood of happening on Cyber Monday

Difficult to detect

Attack 8. Electronic wallet. A company has expanded customer payment options to include
Internet payment methods such as PayPal, Google Wallet, Amazon Checkout and others. A
criminal looking for sites that have recently added internet payment processes identifies its site
and exploits the lack of fully implemented security controls. Sixty percent say this is more likely to
happen and a much higher percentage (81 percent) say it would be very difficult or difficult to
detect.
Figure 13. Electronic wallet
90%

81%

80%
70%
60%

60%

50%
40%
30%
20%
10%
0%
Liklihood of happening on Cyber Monday

Difficult to detect
 

	
  

	
  

Attack 9. Mass registration. A cyber criminal creates a fake website that imitates your
company’s website. Loyal and prospective customers are lured to this bogus website, which asks
them to provide personal information in order to register for a promotion or offer. This results in
the theft of sensitive information. In this case, 50 percent say it is more likely to occur but a much
higher percentage (71 percent) says it would be very difficult or difficult to detect.
Figure 14. Mass registration
80%

71%

70%
60%
50%

50%

40%
30%
20%
10%
0%
Liklihood of happening on Cyber Monday

Difficult to detect

Why companies are vulnerable
The severity and frequency of internet fraud is on the rise but budgets and resources are
not. As shown in Figure 15, 69 percent of respondents believe Internet fraud is becoming
frequent and severe. Only 23 percent of respondents say most internet fraud that occurs on their
company’s websites are quickly detected and remediated.
Figure 15. Attributions regarding Internet fraud
Strongly agree and agree response combined

The frequency of Internet fraud is on the rise

69%

The severity of Internet fraud is on the rise

69%

Most Internet frauds that occurare quickly
detected and remediated

23%

0%

10% 20% 30% 40% 50% 60% 70% 80%
 

	
  

	
  

Despite understanding the importance of data center availability on high traffic days and the
business risk of internet fraud, it seems as if the resources necessary to deal with potential
threats are not available. Only 34 percent say the budget is sufficient, as shown in Figure 16.
Thirty-six percent say their organizations have the personnel and enabling technologies to reduce
Internet fraud and denial of service attacks.
Figure 16. Attributions regarding internet fraud
40%

36%

34%

35%
30%
25%
20%
15%
10%
5%
0%

The security budget is sufficient for minimizing
There is sufficient personnel and enabling
Internet fraud and denial of service attacks technologies for minimizing Internet fraud and
denial of service attacks

Holiday shopping season precautions are not taken by most organizations. As revealed in
Figure 17, 64 percent of respondents say their organizations have seen an increase in internet
fraud and/or attempted website attacks during high traffic days such as Cyber Monday. However,
only one-third say they are taking special precautions to ensure high availability and integrity of
customer-facing websites during high traffic days such as Cyber Monday. That is why most rate
their companies as not being sufficiently prepared for the increased traffic and likelihood of an
attack.
Figure 17. Internet fraud during high traffic days
70%

64%
55%

60%
50%
40%

33%

30%

29%

20%

12%

7%

10%
0%
Yes

No

Unsure

Increased Internet fraud and/or attempted website attacks during high traffic days
Steps are taken to ensure availability/integrity of customer-facing websites during high traffic days
 

	
  

	
  

Detection of fraud is difficult because of the lack of real time visibility. Figure 18 indicates
that more than half (51 percent) say their organization does not have real time visibility into its
website traffic to make it possible to immediately detect the presence of a criminal or fraudster
and 12 percent are unsure. This lack of visibility leads to the problem 46 percent of respondents
have in understanding the root cause of an attack.
Figure 18. Real time visibility into website traffic
60%

51%

50%
40%

37%

30%
20%

12%

10%
0%
Yes

No

Unsure

Steps taken to detect fraud may not be the most effective. According to respondents,
organizations are using identity and authentication systems such as IAM, anti-virus/anti-DDoS,
manual inspection and assessment of vulnerabilities, manual inspection and assessment of web
pages in production and security intelligence systems. Only 36 percent of respondents say their
organizations use automated forensic tools that detect business logic abuses.
Figure 19. Steps taken to prevent/detect internet fraud
Very important and important response combined

Identity and authentication systems

63%

Anti-virus/anti-DDoS

62%

Manual vulnerability inspection and assessment

53%

Manual inspection of web pages in production

51%

Security intelligence systems

41%

Content aware firewalls

39%

Automated forensic tools that detect business
logic abuses

36%

Intrusion prevention systems

34%

Use of WAF

34%

Testing of the website’s functionality prior to
production

32%

Intrusion detection systems

30%

Network security and VPN

29%

Other

2%
0%

10%

20%

30%

40%

50%

60%

70%
 

	
  

Part 3. Conclusion & recommendations
It is important that companies do not think narrowly about this issue. When making the business
case for investing in website security, emphasize the economics of reputation damage.
The following are technology, governance and assessment recommendations to make a website
ready for Cyber Monday:
Technologies. Invest in technology that improves the ability to prevent downtime or outages and
detect fraud occurring in real time. Do not wait until the holiday shopping season to take the
necessary precautions.
Governance.	
  Centralize resources under one function to improve accountability for preventing
and detecting internet fraud and cyber attacks. Too many organizations say no one function is
accountable for stopping internet fraud and threats. Have a business continuity and disaster
recovery plan in place to minimize downtime and data center availability in the event of an attack.

	
  
Assessment. Based on your business model, assess what threats are most likely to target your
websites. Prevent future fraud by understanding the root cause of the attack.

	
  
 

	
  

	
  

Part 4. Methods
A random sampling frame of 34,614 IT and IT security practitioners located in the United States
and United Kingdom were selected as participants to this survey. As shown in Table 1, 1,338
respondents completed the survey. Screening removed 177 surveys. The final sample was 1,161
surveys (or a 3.4 percent response rate).
Table 1. Sample response
Total sampling frame
Total returns
Screened or rejected surveys
Final sample

Freq.
34,614
1,338
177
1,161

Pct%
100.0%
3.9%
0.5%
3.4%

As noted in Table 2, the respondents’ average (mean) experience in IT, IT security or related
fields is 10.8 years.
Table 2. Other characteristics of respondents

Mean

Total years of IT or IT security experience

10.8

Total years in your current position

5.9

Pie Chart 1 reports the industry segments of respondents’ organizations. This chart identifies
financial services (18 percent) as the largest segment, followed by e-commerce (12 percent) and
retail (12 percent).
Pie Chart 1. Industry distribution of respondents’ organizations

3%

2%
2% 2%
2%

18%

3%
4%
5%
12%
6%

5%
12%
6%
10%

7%

Financial services
E-commerce
Retail
Health & pharmaceuticals
Technology & software
Services
Transportation
Hospitality
Public sector
Consumer products
Energy & utilities
Gaming
Communications
Entertainment & media
Industrial
Other
 

	
  

	
  

Pie Chart 2 reports the respondent’s organizational level within participating organizations. By
design, 54 percent of respondents are at or above the supervisory levels.
Pie Chart 2. What organizational level best describes your current position?
7%

3%1% 2% 1%
16%
Senior Executive
Vice President
Director
Manager
Supervisor

36%

20%

Technician
Staff
Contractor
Other

15%

	
  

	
  
	
  
According to Pie Chart 3, 59 percent of respondents report directly to the Chief Information
Officer and 18 percent report to the Chief Information Security Officer.
Pie Chart 3. The primary person you or the IT security leader reports to within the
organization
4%

3% 1%

8%
Chief Financial Officer

2%
3%

General Counsel
Chief Information Officer
Chief Information Security Officer

18%

Compliance Officer
Chief Security Officer
59%

Data Center Management
Chief Risk Officer
 

	
  

	
  

More than half of the respondents (55 percent) are from organizations with a global headcount of
over 1,000 employees, as shown in Pie Chart 4.
Pie Chart 4. Global headcount
4%
8%

10%
< 100
19%

100 to 500
501 to 1,000

17%

1,001 to 5,000
5,001 to 25,000
25,001 to 75,000
> 75,000
21%

21%

Part 5. Caveats
There are inherent limitations to survey research that need to be carefully considered before
drawing inferences from findings. The following items are specific limitations that are germane to
most web-based surveys.
Non-response bias: The current findings are based on a sample of survey returns. We sent
surveys to a representative sample of individuals, resulting in a large number of usable returned
responses. Despite non-response tests, it is always possible that individuals who did not
participate are substantially different in terms of underlying beliefs from those who completed the
instrument.
Sampling-frame bias: The accuracy is based on contact information and the degree to which the
list is representative of individuals who are IT or IT security leaders. We also acknowledge that
the results may be biased by external events such as media coverage. We also acknowledge
bias caused by compensating subjects to complete this research within a holdout period.
Self-reported results: The quality of survey research is based on the integrity of confidential
responses received from subjects. While certain checks and balances can be incorporated into
the survey process, there is always the possibility that a subject did not provide a truthful
response.
 

	
  

	
  

Appendix: Detailed Survey Results
The following tables provide the frequency or percentage frequency of responses to all survey
questions contained in this study. All survey responses were captured in August 2013.
Sample response
Total sampling frame
Total returned surveys
Screened or rejected surveys
Final sample
Response rate
Sample weights
Part 1. Screening questions
S1. How familiar are you with organization’s website security and anti-internet fraud
activities?
Very familiar
Familiar
Somewhat familiar
No knowledge (Stop)
Total
S2. Approximately, how much of your organization’s revenues (gross sales) are from
internet channels?
None (Stop)
1 to 10%
11 to 20%
21 to 30%
31 to 40%
41 to 50%
51 to 60%
61 to 70%
71 to 80%
81 to 90%
91 to 100% (virtually all)
Total
Extrapolated values
S3. Approximately, how much of your organization’s revenues (gross sales) are from
mobile channels?
None (Stop)
1 to 10%
11 to 20%
21 to 30%
31 to 40%
41 to 50%
51 to 60%
61 to 70%
71 to 80%
81 to 90%
91 to 100% (virtually all)
Total
Extrapolated values

Combined
34,614
1,338
177
1,161
3.4%
100%

Combined
25%
41%
34%
0%
100%
Combined
0%
12%
26%
23%
14%
11%
7%
2%
2%
2%
1%
100%
29%
Combined
0%
39%
27%
20%
9%
3%
1%
0%
1%
1%
0%
100%
17%
 

	
  

	
  

	
  
S4. Do you have any responsibility for the security of your organization’s websites?
Yes, full responsibility
Yes, some responsibility
Yes, minimum responsibility
No responsibility (Stop)
Total

Combined

Part 2. Attributions. Strongly agree and agree combined.
Q1a. Internet fraud represents a significant business risk for my company.
Q1b. Data center availability is my company’s highest priority above all other IT
priorities.
Q1c. The prevention of internet fraud is a priority for my company during high traffic
days such as Cyber Monday.
Q1d. Most internet frauds that occur on my company’s websites are quickly detected
and remediated.
Q1e. My company is vigilant in monitoring websites for internet fraud and other abuses.
Q1f. My company is vigilant in monitoring threats that seek to shutdown our websites
(such as denial of service attacks).
Q1g. My company’s security budget is sufficient for minimizing Internet fraud and denial
of service attacks.
Q1h. My company has sufficient personnel and enabling technologies for minimizing
Internet fraud and denial of service attacks.
Q1i. The frequency of Internet fraud experienced by my company is on the rise.
Q1j. The severity of Internet fraud experienced by my company is on the rise.

Combined

Part 3. Background
Q2. Approximately, how many customer-facing websites does your company have in
production today?
Between 1 and 5
Between 6 and 10
Between 10 and 20
Between 21 and 30
Between 31 and 40
Between 41 and 50
Between 51 and 100
More than 100
Total
Extrapolated values
Q3. On a typical day, how much revenue does you earn from internet and mobile
channels?
Less than $100,000
$100,001 to $200,000
$200,001 to $300,000
$300,001 to $400,000
$400,001 to $500,000
$500,001 to $1,000,000
$1,000,001 to $2,000,000
$2,000,001 to 5,000,000
More than $5,000,000
Total
Extrapolated values

30%
61%
10%
0%
100%

66%
52%
67%
23%
41%
39%
34%
36%
69%
69%

Combined
7%
12%
19%
16%
6%
9%
11%
20%
100%
44.4
Combined
13%
16%
16%
15%
12%
9%
7%
5%
7%
100%
$823,079
 

	
  

	
  

	
  
Q4. In percentage terms, how much of a revenue boost or increase do you anticipate
this coming Cyber Monday?
No increase
Less than 10%
11% to 25%
26% to 50%
51% to 75%
76% to 100%
101% to 200% (1 to 2X)
201% to 500% (2 to 5X)
More than 500% (> 5X)
Total
Extrapolated value
Net increase (Cyber Monday revenue boost)
Q5. In a 12-month period, what percent of your company’s total revenues (gross sales)
were lost due to the financial and brand impact of internet fraud?
None
1% to 2%
3% to 4%
5% to 6%
7% to 8%
9% to 10%
More than 10%
Total
Extrapolated value
Q6. In the past 12 months, how many separate internet fraud incidents did your
company experience?
None
1 to 5
6 to 10
10 to 20
21 to 30
31 to 40
41 to 50
51 to 100
More than 100
Total
Extrapolated value
Q7a. Have you experienced any unplanned data center outages in the past 12 months
most likely caused by internet fraud, denial of services or other cyber attacks?
Yes
No
Unsure
Total

Combined
8%
9%
12%
22%
34%
13%
1%
2%
1%
100%
55%
$665,115
Combined
10%
27%
27%
15%
5%
6%
11%
100%
4.7%
Combined
18%
25%
20%
12%
7%
2%
6%
6%
5%
100%
19.2
Combined
55%
35%
10%
100%
 

	
  

	
  

	
  
Q7b. If yes, what was the frequency of unplanned data center outages in the past 12
months most likely caused by internet fraud, denial of services or other cyber attacks?
1 and 2
3 and 5
6 and 10
11 and 15
16 and 20
More than 20
Total
Extrapolated value
Q7c. If yes, what was the average duration of unplanned data center outages most likely
caused by internet fraud, denial of services or other cyber attacks in the past 12
months?
Less than 1 minute
1 to 5 minutes
5 to 20 minutes
20 minutes to 2 hours
2 hours to one day
More than one day
Total
Extrapolated value
Q8. How confident are you in knowing the root causes of most Internet frauds or cyber
attacks that seek to shutdown your company’s data centers?
Very confident
Confident
Not confident
Total
Q9. On a typical day, how much would it cost your company in lost traffic or revenues
when a primary customer-facing website is down for just one hour?
None
Less than $1,000
$1,000 to $5,000
$5,001 to $10,000
$10,001 to $20,000
$20,001 to $50,000
$50,001 to $100,000
$100,001 to $500,000
$500,000 to $750,000
$750,001 to $1 million
More than $1 million
Total
Extrapolated value

Combined
31%
43%
11%
5%
7%
3%
100%
5.7

Combined
12%
36%
35%
8%
4%
5%
100%
51.5
Combined
17%
37%
46%
100%
Combined
0%
1%
1%
3%
16%
17%
14%
17%
12%
12%
8%
100%
$336,729
 

	
  

	
  

	
  
Q10. On high traffic days such as Cyber Monday, how much would it cost your company
in lost traffic or revenues when a primary customer-facing website is down for just one
hour?
None
Less than $1,000
$1,000 to $5,000
$5,001 to $10,000
$10,001 to $20,000
$20,001 to $50,000
$50,001 to $100,000
$100,001 to $500,000
$500,000 to $750,000
$750,001 to $1 million
More than $1 million
Total
Extrapolated value
Q11. What is the total economic impact to reputation or brand damage in the event your
company suffered just one hour unplanned shutdown during a high traffic day such as
Cyber Monday?
None
Less than $1,000
$1,000 to $5,000
$5,001 to $10,000
$10,001 to $20,000
$20,001 to $50,000
$50,001 to $100,000
$100,001 to $500,000
$500,000 to $750,000
$750,001 to $1 million
$1 million to $10 million
$10 million to $50 million
$50 million to $100 million
More than $100 million
Total
Extrapolated value
Q12. Do you believe your company’s customer churn (turnover) rate would increase in
the event its primary customer-facing website was shutdown just one hour during a high
traffic day such as Cyber Monday?
Yes, substantial increase in churn
Yes, some increase in churn
No
Unsure
Total
Q13a. In the past few years have you seen an increase in internet fraud and/or
attempted website attacks during high traffic days such as Cyber Monday?
Yes
No
Unsure
Total

Combined
0%
0%
1%
1%
8%
10%
11%
17%
22%
18%
12%
100%
$494,882

Combined
0%
1%
4%
12%
13%
11%
15%
16%
11%
8%
6%
3%
2%
1%
100%
$3,372,616

Combined
24%
42%
25%
10%
100%
Combined
64%
29%
7%
100%
 

	
  

	
  

	
  
Q13b. If yes, in percentage terms, what is the relative increase in internet fraud and/or
attempted websites attacks during high traffic days such as Cyber Monday?
Less than 5%
5% to 10%
11% to 25%
26% to 50%
51% to 75%
76% to 100%
More than 100%
Total
Extrapolated value
Q14. Does your company take special steps or precautions to ensure high availability
and integrity of customer-facing websites during high traffic days such as Cyber
Monday?
Yes
No
Unsure
Total
Q15. Is your company ready to deal with internet frauds and other cyber attacks that
seek to shutdown its primary customer-facing websites during high traffic days such as
Cyber Monday? Please use the following 10-point scale to rate your opinion from 1 =
not ready to 10 = fully prepared.
1 to 2
3 to 4
5 to 6
7 to 8
9 to 10
Total

Q16. What steps does your organization take to prevent or detect internet fraud and
other attacks that seek to shutdown websites? Please rate each one of the following
steps in terms of its importance using the following scale: Very important and Important
combined.
Manual inspection and assessment of vulnerabilities
Manual inspection and assessment of web pages in production
Thorough testing of the website’s functionality prior to production
Identity and authentication systems such as IAM
Automated forensic tools that detect business logic abuses
Content aware firewalls (including next generation firewalls)
Security intelligence systems such as SIEM
Intrusion detection systems
Intrusion prevention systems
Anti-virus/anti-DDoS
Network security and VPN
Use of WAF
Other (please specify)
Average
Q17. Does your organization have real time visibility into its website traffic? In other
words, can you detect the presence of a criminal or fraudster in real time (immediately)?
Yes
No
Unsure
Total

Combined
14%
14%
23%
21%
17%
5%
5%
100%
34%

Combined
33%
55%
12%
100%

Combined
20%
33%
16%
12%
18%
100%
5.0

Combined
53%
51%
32%
63%
36%
39%
41%
30%
34%
62%
29%
34%
2%
39%
Combined
37%
51%
12%
100%
 

	
  
Q18. Who is most responsible for curtailing internet fraud and threats that seek to
shutdown your organization’s websites?
Chief information officer (CIO)
Chief technology officer (CTO)
Chief information security officer (CISO)
Chief security officer (CSO)
Chief risk officer (CRO)
Head, data center management
Business unit management
Website development leader/manager
Fraud prevention leader/manager
Corporate compliance or legal department
Web hosting service provider
No one person or function has overall responsibility
Other (please specify)
Total
Part 4. Cyber Monday scenarios
Testing stolen credit cards. A cyber criminal steals hundreds of credit card numbers
and uses your credit or debit card payments function to validate active credit cards.
Q19a. How likely could this happen to your company? Already happened or very likely
to happen.
Q19b. How difficult would it be to detect this situation? Very difficult or difficult.
Q19c. Do you believe this scenario is more likely to occur on high traffic days such as
Cyber Monday?
Yes
No
Unsure
Total
Click fraud. Your company hires an agency to conduct an online advertising campaign.
The agency is paid on a “per click” basis. In reality many of the paid “per clicks” are not
authentic (i.e., not involving an interested consumer).
Q20a. How likely could this happen to your company? Already happened or very likely
to happen.
Q20b. How difficult would it be to detect this situation? Very difficult or difficult.
Q20c. Do you believe this scenario is more likely to occur on high traffic days such as
Cyber Monday?
Yes
No
Unsure
Total
Account hijacking. A successful spear phishing scam resulted in cyber criminals
obtaining the user names and passwords of customers. The leakage of customer
account information occurred because employees were duped by what appeared to be a
legitimate internal company email communication. The crime originated when the
criminal obtained key employee email addresses directly from the website.
Q21a. How likely could this happen to your company? Already happened or very likely
to happen.
Q21b. How difficult would it be to detect this situation? Very difficult or difficult.

	
  
Combined
22%
1%
16%
2%
1%
3%
16%
8%
9%
1%
1%
19%
1%
100%

Combined
50%
66%
Combined
64%
31%
6%
100%

Combined
65%
74%
Combined
66%
28%
7%
100%

Combined
62%
72%
 

	
  

	
  

	
  
Q21c. Do you believe this scenario is more likely to occur on high traffic days such as
Cyber Monday?
Yes
No
Unsure
Total
Botnet and DDoS. A cyber criminal targets a botnet against your company and this
results in a denial of service (DoS) attack that ultimately brings down your websites.
Q22a. How likely could this happen to your company? Already happened or very likely
to happen.
Q22b. How difficult would it be to detect this situation? Very difficult or difficult.
Q22c. Do you believe this scenario is more likely to occur on high traffic days such as
Cyber Monday?
Yes
No
Unsure
Total
Mass registration. A cyber criminal creates a fake website that imitates your
company’s website. Loyal and prospective customers are lured to this bogus website,
which asks them to provide personal information in order to register for a promotion or
offer. This results in the theft of sensitive information.
Q23a. How likely could this happen to your company? Already happened or very likely
to happen.
Q23b. How difficult would it be to detect this situation? Very difficult or difficult.
Q23c. Do you believe this scenario is more likely to occur on high traffic days such as
Cyber Monday?
Yes
No
Unsure
Total
App store fraud. Your company has an app store/market place, providing access to
products and instant rebates. Criminals masquerading as a merchant and a buyer
manipulate the open platform for financial gain, cashing in on rebates and earning points
from credit card incentive programs.
Q24a. How likely could this happen to your company? Already happened or very likely
to happen.
Q24b. How difficult would it be to detect this situation? Very difficult or difficult.
Q24c. Do you believe this scenario is more likely to occur on high traffic days such as
Cyber Monday?
Yes
No
Unsure
Total
Mobility use case. Your company has expanded its consumer reach using a mobility
platform that allows customers to access its websites using smart phones and other
mobile devices. Cyber criminals infiltrate these devices with malware that captures
customers’ account access credentials. The criminals harvest this information to
takeover accounts using a laptop or desktop computer.
Q25a. How likely could this happen to your company? Already happened or very likely
to happen.
Q25b. How difficult would it be to detect this situation? Very difficult or difficult.

Combined
61%
35%
5%
100%
Combined
54%
72%
Combined
83%
15%
2%
100%

Combined
43%
71%
Combined
50%
47%
3%
100%

Combined
45%
71%
Combined
78%
13%
10%
100%

Combined
60%
70%
 

	
  
Q25c. Do you believe this scenario is more likely to occur on high traffic days such as
Cyber Monday?
Yes
No
Unsure
Total
eCoupons. Fraudsters do an end-run around your company’s pricing policy. They
select a heavily discounted item and place it the “shopping cart.” They delay the check
out in order to obtain and apply an eCoupon to the final purchase price, thus obtaining
the item well below your company’s cost.
Q26a. How likely could this happen to your company? Already happened or very likely
to happen.
Q26b. How difficult would it be to detect this situation? Very difficult or difficult.
Q26c. Do you believe this scenario is more likely to occur on high traffic days such as
Cyber Monday?
Yes
No
Unsure
Total
Electronic wallet. Your company has expanded customer payment options to include
Internet payment methods such as PayPal, Google Wallet, Amazon Checkout and
others. A criminal looking for sites that have recently added Internet payment processes
identifies your site and is able to exploit the lack of fully implemented security controls.
Q27a. How likely could this happen to your company? Already happened or very likely
to happen.
Q27b. How difficult would it be to detect this situation? Very difficult or difficult.
Q27c. Do you believe this scenario is more likely to occur on high traffic days such as
Cyber Monday?
Yes
No
Unsure
Total

	
  

Combined
66%
24%
10%
100%

Combined
51%
70%
Combined
64%
31%
5%
100%

Combined
54%
81%
Combined
60%
30%
10%
100%

Part 5. Your role and organization

D1. What organizational level best describes your current position?
Senior Executive
Vice President
Director
Manager
Supervisor
Technician
Staff
Contractor
Other
Total

Combined
2%
1%
16%
20%
15%
36%
7%
3%
1%
100%
 

	
  

	
  

	
  
D2. Check the Primary Person you or your IT security leader reports to within
the organization.
CEO/Executive Committee
Chief Financial Officer
General Counsel
Chief Information Officer
Chief Information Security Officer
Compliance Officer
Human Resources VP
Chief Security Officer
Data Center Management
Chief Risk Officer
Other
Total

Combined
0%
3%
1%
59%
18%
3%
0%
2%
8%
4%
0%
100%

D3. Total years of relevant experience
Total years of IT or security experience (mean value)
Total years in current position years (mean value)

Combined

D4. What industry best describes your organization’s industry focus?
Agriculture & food services
Communications
Consumer products
E-commerce
Education
Energy & utilities
Entertainment & media
Financial services
Gaming
Health & pharmaceuticals
Hospitality
Industrial
Public sector (including non-profits)
Retail
Services
Technology & software
Transportation
Other
Total

Combined

D5. Where are your employees located? (Check all that apply):
United States
Canada
Europe
Middle East & Africa
Asia-Pacific
Latin America (including Mexico)

Combined

10.8
5.9

1%
2%
4%
12%
0%
3%
2%
18%
3%
7%
6%
2%
5%
12%
6%
10%
5%
1%
100%

86%
65%
81%
50%
58%
52%
 

	
  

	
  

	
  
D6. What is the worldwide headcount of your organization?
< 100
100 to 500
501 to 1,000
1,001 to 5,000
5,001 to 25,000
25,001 to 75,000
> 75,000
Total
Extrapolated value

Combined
10%
19%
21%
21%
17%
8%
4%
100%
10,995

Ponemon Institute
Advancing Responsible Information Management
Ponemon Institute is dedicated to independent research and education that advances responsible
information and privacy management practices within business and government. Our mission is
to conduct high quality, empirical studies on critical issues affecting the management and security
of sensitive information about people and organizations.
As a member of the Council of American Survey Research Organizations (CASRO), we
uphold strict data confidentiality, privacy and ethical research standards. We do not collect any
personally identifiable information from individuals (or company identifiable information in our
business research). Furthermore, we have strict quality standards to ensure that subjects are not
asked extraneous, irrelevant or improper questions.

More Related Content

What's hot

10 Things to Do First in Digital Marketing
10 Things to Do First in Digital Marketing10 Things to Do First in Digital Marketing
10 Things to Do First in Digital MarketingJonathan Richman
 
Transformation in Digital Advertising
Transformation in Digital AdvertisingTransformation in Digital Advertising
Transformation in Digital AdvertisingOgilvyOne Worldwide
 
120 marketing-stats-charts-and-graphs
120 marketing-stats-charts-and-graphs120 marketing-stats-charts-and-graphs
120 marketing-stats-charts-and-graphsGianluigi Spagnoli
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryDistil Networks
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise The Economist Media Businesses
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The Economist Media Businesses
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraudBusters
 
La adopción del marketing social media por parte de las PYMEs
La adopción del marketing social media por parte de las PYMEsLa adopción del marketing social media por parte de las PYMEs
La adopción del marketing social media por parte de las PYMEselehoucq
 
Enterprise Fraud Risk Management
Enterprise Fraud Risk ManagementEnterprise Fraud Risk Management
Enterprise Fraud Risk ManagementTommy Seah
 
Click Fraud and the Downfall of Google
Click Fraud and the Downfall of GoogleClick Fraud and the Downfall of Google
Click Fraud and the Downfall of GoogleTwinVasion
 
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014yStats.com
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyFirst Atlantic Commerce
 

What's hot (18)

Good Publishers Will Save Digital Marketing v2019
Good Publishers Will Save Digital Marketing v2019Good Publishers Will Save Digital Marketing v2019
Good Publishers Will Save Digital Marketing v2019
 
Your current digital just plain sucks, why?
Your current digital just plain sucks, why?Your current digital just plain sucks, why?
Your current digital just plain sucks, why?
 
10 Things to Do First in Digital Marketing
10 Things to Do First in Digital Marketing10 Things to Do First in Digital Marketing
10 Things to Do First in Digital Marketing
 
Transformation in Digital Advertising
Transformation in Digital AdvertisingTransformation in Digital Advertising
Transformation in Digital Advertising
 
120 marketing-stats-charts-and-graphs
120 marketing-stats-charts-and-graphs120 marketing-stats-charts-and-graphs
120 marketing-stats-charts-and-graphs
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad Inventory
 
Definative State of Ad Frauds on January 18 2019 at 1027a
Definative State of Ad Frauds on January 18 2019 at 1027aDefinative State of Ad Frauds on January 18 2019 at 1027a
Definative State of Ad Frauds on January 18 2019 at 1027a
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
Digital ad fraud impact on class action notice industry
Digital ad fraud impact on class action notice industryDigital ad fraud impact on class action notice industry
Digital ad fraud impact on class action notice industry
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
La adopción del marketing social media por parte de las PYMEs
La adopción del marketing social media por parte de las PYMEsLa adopción del marketing social media por parte de las PYMEs
La adopción del marketing social media por parte de las PYMEs
 
Enterprise Fraud Risk Management
Enterprise Fraud Risk ManagementEnterprise Fraud Risk Management
Enterprise Fraud Risk Management
 
Click Fraud and the Downfall of Google
Click Fraud and the Downfall of GoogleClick Fraud and the Downfall of Google
Click Fraud and the Downfall of Google
 
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
 
Digital Media Trust Collaborative
Digital Media Trust CollaborativeDigital Media Trust Collaborative
Digital Media Trust Collaborative
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 

Viewers also liked

“TO STUDY THE GROWTH OF E-COMMERCE INDUSTRY IN INDIA”
 “TO STUDY THE GROWTH OF E-COMMERCE INDUSTRY IN INDIA” “TO STUDY THE GROWTH OF E-COMMERCE INDUSTRY IN INDIA”
“TO STUDY THE GROWTH OF E-COMMERCE INDUSTRY IN INDIA”PRABHAT PANDEY
 
E-Commerce in India: Evolution, Growth and Challenges
E-Commerce in India: Evolution, Growth and ChallengesE-Commerce in India: Evolution, Growth and Challenges
E-Commerce in India: Evolution, Growth and ChallengesAshraf Engineer
 
Federmanager Bologna - Personal Branding 8 marzo - Presidente Andrea Molza
Federmanager Bologna - Personal Branding 8 marzo - Presidente Andrea MolzaFedermanager Bologna - Personal Branding 8 marzo - Presidente Andrea Molza
Federmanager Bologna - Personal Branding 8 marzo - Presidente Andrea MolzaMarco Frullanti
 
Analyst Report: Clearing the Clouds
Analyst Report: Clearing the Clouds  Analyst Report: Clearing the Clouds
Analyst Report: Clearing the Clouds EMC
 
01 monopolistic comp
01 monopolistic comp01 monopolistic comp
01 monopolistic compTravis Klein
 
Zipcar For Business Meet Your New Company Car
Zipcar For Business   Meet Your New Company CarZipcar For Business   Meet Your New Company Car
Zipcar For Business Meet Your New Company CarCharlotte Gatehouse
 
Bespaar 1000€ door bewust te leven en te kopen
Bespaar 1000€ door bewust te leven en te kopenBespaar 1000€ door bewust te leven en te kopen
Bespaar 1000€ door bewust te leven en te kopenNetwerk Bewust Verbruiken
 
Tues ind rev problems pollution
Tues ind rev problems pollutionTues ind rev problems pollution
Tues ind rev problems pollutionTravis Klein
 
Opportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataOpportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataEMC
 
A Long Day Second Draft Script by Sophie McAvoy
A Long Day Second Draft Script by Sophie McAvoyA Long Day Second Draft Script by Sophie McAvoy
A Long Day Second Draft Script by Sophie McAvoysophiemcavoy1
 
Get hydrated
Get hydratedGet hydrated
Get hydratedsloeb
 
Remembering God- Your Future Depends on It
Remembering God- Your Future Depends on ItRemembering God- Your Future Depends on It
Remembering God- Your Future Depends on Itlcvtrainer
 
Lessico civico. Teorie e pratiche della cittadinanza
Lessico civico. Teorie e pratiche della cittadinanzaLessico civico. Teorie e pratiche della cittadinanza
Lessico civico. Teorie e pratiche della cittadinanzaCristina Belloni
 
Connected tv conference rene summer
Connected tv conference rene summerConnected tv conference rene summer
Connected tv conference rene summerRene Summer
 
Day 4 legal matters
Day 4 legal mattersDay 4 legal matters
Day 4 legal mattersTravis Klein
 

Viewers also liked (20)

“TO STUDY THE GROWTH OF E-COMMERCE INDUSTRY IN INDIA”
 “TO STUDY THE GROWTH OF E-COMMERCE INDUSTRY IN INDIA” “TO STUDY THE GROWTH OF E-COMMERCE INDUSTRY IN INDIA”
“TO STUDY THE GROWTH OF E-COMMERCE INDUSTRY IN INDIA”
 
E-Commerce in India: Evolution, Growth and Challenges
E-Commerce in India: Evolution, Growth and ChallengesE-Commerce in India: Evolution, Growth and Challenges
E-Commerce in India: Evolution, Growth and Challenges
 
Titanium
TitaniumTitanium
Titanium
 
Federmanager Bologna - Personal Branding 8 marzo - Presidente Andrea Molza
Federmanager Bologna - Personal Branding 8 marzo - Presidente Andrea MolzaFedermanager Bologna - Personal Branding 8 marzo - Presidente Andrea Molza
Federmanager Bologna - Personal Branding 8 marzo - Presidente Andrea Molza
 
Analyst Report: Clearing the Clouds
Analyst Report: Clearing the Clouds  Analyst Report: Clearing the Clouds
Analyst Report: Clearing the Clouds
 
01 monopolistic comp
01 monopolistic comp01 monopolistic comp
01 monopolistic comp
 
What's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & DevicesWhat's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & Devices
 
jQuery
jQueryjQuery
jQuery
 
Zipcar For Business Meet Your New Company Car
Zipcar For Business   Meet Your New Company CarZipcar For Business   Meet Your New Company Car
Zipcar For Business Meet Your New Company Car
 
Bespaar 1000€ door bewust te leven en te kopen
Bespaar 1000€ door bewust te leven en te kopenBespaar 1000€ door bewust te leven en te kopen
Bespaar 1000€ door bewust te leven en te kopen
 
Tues ind rev problems pollution
Tues ind rev problems pollutionTues ind rev problems pollution
Tues ind rev problems pollution
 
Opportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataOpportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big Data
 
A Long Day Second Draft Script by Sophie McAvoy
A Long Day Second Draft Script by Sophie McAvoyA Long Day Second Draft Script by Sophie McAvoy
A Long Day Second Draft Script by Sophie McAvoy
 
Palestra Barrett Brown - sustentabilidade
Palestra Barrett Brown - sustentabilidadePalestra Barrett Brown - sustentabilidade
Palestra Barrett Brown - sustentabilidade
 
Get hydrated
Get hydratedGet hydrated
Get hydrated
 
Remembering God- Your Future Depends on It
Remembering God- Your Future Depends on ItRemembering God- Your Future Depends on It
Remembering God- Your Future Depends on It
 
Lessico civico. Teorie e pratiche della cittadinanza
Lessico civico. Teorie e pratiche della cittadinanzaLessico civico. Teorie e pratiche della cittadinanza
Lessico civico. Teorie e pratiche della cittadinanza
 
Connected tv conference rene summer
Connected tv conference rene summerConnected tv conference rene summer
Connected tv conference rene summer
 
Mayrikis voski dzerqer
Mayrikis voski dzerqerMayrikis voski dzerqer
Mayrikis voski dzerqer
 
Day 4 legal matters
Day 4 legal mattersDay 4 legal matters
Day 4 legal matters
 

Similar to Ponemon Institute: The 2013 eCommerce Cyber Crime Report - Safeguarding Brand And Revenue This Holiday Season

15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysisxband
 
Calls + Clicks: Why Offline Calls are Critical for Online Marketers
Calls + Clicks: Why Offline Calls are Critical for Online MarketersCalls + Clicks: Why Offline Calls are Critical for Online Marketers
Calls + Clicks: Why Offline Calls are Critical for Online MarketersInvoca
 
Bribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowBribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowFraudBusters
 
Affiliate Fraud Triggers You're Ignoring But Shouldn't
Affiliate Fraud Triggers You're Ignoring But Shouldn'tAffiliate Fraud Triggers You're Ignoring But Shouldn't
Affiliate Fraud Triggers You're Ignoring But Shouldn'tAffiliate Summit
 
EMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureEMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureRYAN ORTON
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudEvan Francen
 
STUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability AssessmentSTUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability AssessmentSymantec
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers BDO_Consulting
 
Masterclassing: Contextual Marketing for Financial Services
Masterclassing: Contextual Marketing for Financial ServicesMasterclassing: Contextual Marketing for Financial Services
Masterclassing: Contextual Marketing for Financial ServicesMovable Ink
 
Pay Per Click Advertising - Click Fraud Proposal
Pay Per Click Advertising - Click Fraud ProposalPay Per Click Advertising - Click Fraud Proposal
Pay Per Click Advertising - Click Fraud ProposalBrainfartsy
 
Fraud and corporate governance changing paradigm in India 2012
Fraud and corporate governance changing paradigm in India 2012Fraud and corporate governance changing paradigm in India 2012
Fraud and corporate governance changing paradigm in India 2012EY
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudFraudBusters
 
Leveraging Analytics to Combat Digital Fraud in Financial Organizations
Leveraging Analytics to Combat Digital Fraud in Financial OrganizationsLeveraging Analytics to Combat Digital Fraud in Financial Organizations
Leveraging Analytics to Combat Digital Fraud in Financial OrganizationsRicardo Ponce
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionEMC
 
45The Security Survey An OverviewA security survey is a.docx
45The Security Survey An OverviewA security survey is a.docx45The Security Survey An OverviewA security survey is a.docx
45The Security Survey An OverviewA security survey is a.docxalinainglis
 
Cyber Security Breaches Survey 2018
Cyber Security Breaches Survey 2018Cyber Security Breaches Survey 2018
Cyber Security Breaches Survey 2018Gary Chambers
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 

Similar to Ponemon Institute: The 2013 eCommerce Cyber Crime Report - Safeguarding Brand And Revenue This Holiday Season (20)

15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
2015 cost of data breach study
2015 cost of data breach study2015 cost of data breach study
2015 cost of data breach study
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysis
 
Calls + Clicks: Why Offline Calls are Critical for Online Marketers
Calls + Clicks: Why Offline Calls are Critical for Online MarketersCalls + Clicks: Why Offline Calls are Critical for Online Marketers
Calls + Clicks: Why Offline Calls are Critical for Online Marketers
 
Bribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowBribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to Know
 
Affiliate Fraud Triggers You're Ignoring But Shouldn't
Affiliate Fraud Triggers You're Ignoring But Shouldn'tAffiliate Fraud Triggers You're Ignoring But Shouldn't
Affiliate Fraud Triggers You're Ignoring But Shouldn't
 
EMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureEMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_Brochure
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment Fraud
 
STUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability AssessmentSTUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability Assessment
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
 
Masterclassing: Contextual Marketing for Financial Services
Masterclassing: Contextual Marketing for Financial ServicesMasterclassing: Contextual Marketing for Financial Services
Masterclassing: Contextual Marketing for Financial Services
 
Pay Per Click Advertising - Click Fraud Proposal
Pay Per Click Advertising - Click Fraud ProposalPay Per Click Advertising - Click Fraud Proposal
Pay Per Click Advertising - Click Fraud Proposal
 
Fraud and corporate governance changing paradigm in India 2012
Fraud and corporate governance changing paradigm in India 2012Fraud and corporate governance changing paradigm in India 2012
Fraud and corporate governance changing paradigm in India 2012
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH Fraud
 
Leveraging Analytics to Combat Digital Fraud in Financial Organizations
Leveraging Analytics to Combat Digital Fraud in Financial OrganizationsLeveraging Analytics to Combat Digital Fraud in Financial Organizations
Leveraging Analytics to Combat Digital Fraud in Financial Organizations
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
45The Security Survey An OverviewA security survey is a.docx
45The Security Survey An OverviewA security survey is a.docx45The Security Survey An OverviewA security survey is a.docx
45The Security Survey An OverviewA security survey is a.docx
 
Cyber Security Breaches Survey 2018
Cyber Security Breaches Survey 2018Cyber Security Breaches Survey 2018
Cyber Security Breaches Survey 2018
 
Transform the way you market at social scale
Transform the way you market at social scaleTransform the way you market at social scale
Transform the way you market at social scale
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 

More from EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS BreachEMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Ponemon Institute: The 2013 eCommerce Cyber Crime Report - Safeguarding Brand And Revenue This Holiday Season

  • 1. The 2013 eCommerce Cyber Crime Report: Safeguarding Brand And Revenue This Holiday Season   Sponsored by RSA Security Independently conducted by Ponemon Institute, LLC Publication Date: October 2013   Ponemon Institute© Research Report
  • 2.     The 2013 eCommerce Cyber Crime Report: Safeguarding Brand And Revenue This Holiday Season A Study of US & UK IT Security Practitioners Part 1. Introduction During the holiday shopping season, a company’s inability to safeguard its ecommerce websites and keep customers loyal comes with a high price tag. While shoppers on Cyber Monday can significantly boost sales, just one hour of downtime as a result of an attack could mean an average loss of almost $500,000. Or, about $8,000 for every minute a purchase is prevented or the integrity of the website compromised. It gets worse when you consider what the cost could be to customer loyalty if it becomes impossible to make a purchase or there is perception that the website is not secure. According to the companies in our study, an average of $3.4 million is what reputation and brand damage can cost as a result of the loss of customers. Conducted by Ponemon Institute and sponsored by RSA Security, the study surveyed more than 1 1,100 experienced IT practitioners in the United States and United Kingdom. To ensure a knowledgeable respondent, all participants say they are familiar with their organization’s website security and anti-fraud activities. The majority has either full responsibility or some responsibility for the security of their organization’s websites and believes that prevention of internet fraud is a high priority for their company during high traffic days such as Cyber Monday. In this study, we asked companies to estimate the number of customer-facing websites they have, ranging from 1 to more than 100. On average, companies represented in this study have 44 ecommerce websites. These companies estimate that just on Cyber Monday revenues from these websites can increase an average of 55 percent or more than $600,000. Top findings from this study include:  The financial stakes are high on Cyber Monday and during the holiday shopping season. The estimated brand damage could average $3.4 million for one hour of downtime.  Beware of Botnet and DoS attacks. In this research, we asked respondents to identify the types of attacks most likely to occur during the holiday shopping season. Botnet and DoS are not only expected to be the most prevalent, they are considered very difficult to detect.    Cyber Monday precautions are often ignored. Sixty-four percent of respondents say their organizations have seen an increase in Internet fraud and/or attempted website attacks on high traffic days such as Cyber Monday. However, only one-third say they take special precautions to ensure high availability and integrity of their websites.    Detection of fraud is difficult because of the lack of real time visibility. More than half of respondents (51 percent) say their organization does not have real time visibility into its website to detect the presence of a criminal.    Only 36 percent or respondents say their organizations use automated forensic tools that detect business logic abuses.                                                                                                                 1 The average respondent has approximately 11 years experience in their field.  
  • 3.       Part 2. Key Findings The analysis of key findings is presented in this section. The complete audited findings are presented in the appendix of this report. The findings are organized according to the following topics:    Financial stakes are high during the holiday shopping season Methods used to attack ecommerce websites Why companies are vulnerable to attack Financial stakes are high during the holiday shopping season Companies invest heavily in website marketing only to realize significant losses if they are not ready to deal with the potential threat of attacks on Cyber Monday. Understanding the cost of downtime and more important the cost to reputation and brand, can help make the business case for investing in the resources necessary to stop fraud and preserve the integrity of customer facing websites. The economics of ecommerce. On average, organizations have about 44 customer-facing websites and on a typical day sales from internet and mobile channels average $800,000. Figure 1 shows the percentage increase in revenues on Cyber Monday. As shown, 51 percent of respondents (34 percent + 13 percent + 1 percent + 2 percent + 1 percent) estimate that revenues just on Cyber Monday will increase more than 50 percent. Based on all responses, the average increase is 55 percent or $665,115. Figure 1. The Cyber Monday revenue boost Extrapolated average increase is 55 percent 40% 34% 35% 30% 25% 22% 20% 15% 10% 13% 12% 8% 9% 5% 1% 2% 1% 0% No increase < 10% 11% to 25% 26% to 50% 51% to 75% 76% to 100% 101% to 200% 201% to 500% > 500%
  • 4.       Internet fraud is costly and affects brand. According to organizations in our study the amount of revenue lost due to internet fraud can do measurable harm to the bottom line. As shown in Figure 2, an average of almost 5 percent of total revenues (gross sales) were lost due to the financial and brand impact of internet fraud during the past 12 months. They also report an average of 19 separate internet fraud incidents during the same period. Figure 2. The financial & brand impact of Internet fraud as a percentage of total revenues 30% 27% 27% 25% 20% 15% 15% 10% 11% 10% 5% 5% 6% 0% None 1% to 2% 3% to 4% 5% to 6% 7% to 8% 9% to 10% > 10%
  • 5.       The economics of downtime. According to Figure 3, on a typical day the average cost if a primary customer-facing website went down for just one hour is estimated to be $336,729. As discussed, respondents anticipate an average revenue boost of 55 percent on Cyber Monday and downtime is expected to cost an average of almost $500,000. Figure 3. The cost of losing one customer-facing website for one hour Extrapolated average loss is $336,729 8% > $1 million 12% 12% $750,001 to $1 million 18% 12% $500,000 to $750,000 22% 17% 17% $100,001 to $500,000 $50,001 to $100,000 11% $20,001 to $50,000 17% 10% $10,001 to $20,000 16% 8% $5,001 to $10,000 1% 3% 1% 1% $1,000 to $5,000 < $1,000 14% 0% 0% 1% 5% 10% 15% 20% 25% Cost in lost traffic or revenues when a customer-facing website is down for one hour Cost in lost traffic or revenues when a customer-facing website is down for one hour on Cyber Monday
  • 6.       If customers become frustrated and disgruntled when they are prevented from making a purchase and vow never to return, the estimated brand damage could be on average $3.4 million, as shown in Figure 4. Figure 4: The economic impact to reputation & brand Extrapolated average of brand & reputation damage is $3,372,616 1% > $100 million 2% $50 million to $100 million 3% $10 million to $50 million 6% $1 million to $10 million 8% $750,001 to $1 million 11% $500,000 to $750,000 16% $100,001 to $500,000 15% $50,001 to $100,000 11% $20,001 to $50,000 13% $10,001 to $20,000 12% $5,001 to $10,000 4% $1,000 to $5,000 1% < $1,000 0% 2% 4% 6% 8% 10% 12% 14% 16% 18% Figure 5 reveals that 66 percent of respondents say there would be a substantial or at least some loss of customers as a result of the website shutting down. Figure 5. Will companies lose customers because of downtime? 42% 45% 40% 35% 30% 25% 25% 24% 20% 15% 10% 10% 5% 0% Yes, substantial increase in churn Yes, some increase in churn No Unsure
  • 7.       Methods used to attack ecommerce websites The majority of respondents believe the nine types of attacks are more likely to occur during the holiday shopping season than on other days. The findings reveal that not only can the attacks be economically disastrous, the majority of respondents believe they are difficult to detect. The types of attacks are presented in the order they are most likely to occur. Attack 1: Botnet and DoS. This type of attack tops the list. We define this scenario as occurring when a cyber criminal targets a botnet against a company and this results in a denial of Service (DoS) attack that ultimately brings down its websites. Eighty-three percent say it is more likely to occur on high traffic days and 72 percent say it would be very difficult or difficult to detect. Figure 6. Botnet and DoS 90% 83% 80% 72% 70% 60% 50% 40% 30% 20% 10% 0% Liklihood of happening on Cyber Monday Difficult to detect Attack 2: Mobile app store fraud. The likelihood of this type of fraud taking place on Cyber Monday is also high. Companies that are vulnerable have an app store/market place that provides access to products and instant rebates. Criminals masquerading as a merchant and a buyer manipulate the open platform for financial gain, cashing in on rebates and earning points from credit card incentive programs. Seventy-eight percent say it is more likely to occur on Cyber Monday than other times and 71 percent say it would be difficult to detect. Figure 7. Mobile app store fraud 90% 80% 78% 71% 70% 60% 50% 40% 30% 20% 10% 0% Liklihood of happening on Cyber Monday Difficult to detect
  • 8.       Attack 3. Mobility use case. A company expanded its consumer reach using a mobility platform that allows customers to access its websites using smart phones and other mobile devices. Cyber criminals infiltrate these devices with malware that captures customers’ account access credentials. The criminals harvest this information to takeover accounts using a laptop or desktop computer. Sixty-six percent say it is more likely to occur and a higher percentage (70 percent) say it would be very difficult or difficult to detect. Figure 8. Mobility use case 80% 66% 70% 70% 60% 50% 40% 30% 20% 10% 0% Liklihood of happening on Cyber Monday Difficult to detect Attack 4: Click fraud. A company hires an agency to conduct an online advertising campaign. The agency is paid on a “per click” basis. In reality, many of the paid “per clicks” are not authentic (i.e. not involving an interested consumer). Sixty-six percent say it is more likely to occur and a higher percentage (74 percent) say it would be very difficult or difficult to detect. Figure 9. Click fraud 80% 70% 74% 66% 60% 50% 40% 30% 20% 10% 0% Liklihood of happening on Cyber Monday Difficult to detect
  • 9.       Attack 5: Testing stolen credit cards. A cyber criminal steals hundreds of credit card numbers and uses a company’s credit or debit card payments function to validate active credit cards. Sixtyfour percent of respondents say this is more likely to happen and 66 percent say it would be very difficult or difficult to detect. Figure 10. Testing stolen credit cards 70% 64% 66% 60% 50% 40% 30% 20% 10% 0% Liklihood of happening on Cyber Monday Difficult to detect Attack 6. eCoupons. Fraudsters do an end-run around a company’s pricing policy. They select a heavily discounted item and place it in the “shopping cart.” They delay the checkout in order to obtain and apply an eCoupon to the final purchase price, thus obtaining the item well below the company’s cost. Again, 64 percent say this is more likely to happen and a significant percentage (70) say this would be very difficult or difficult to detect. Figure 11. eCoupons 80% 70% 70% 64% 60% 50% 40% 30% 20% 10% 0% Liklihood of happening on Cyber Monday Difficult to detect
  • 10.       The following three types of attack are considered less likely to occur but are still considered very difficult or difficult to detect. Attack 7: Account hijacking. A successful spear phishing scam resulted in cyber criminals obtaining the user names and passwords of customers. The leakage of customer account information occurred because employees were duped by what appeared to be a legitimate internal company email communication. The crime originated when the criminal obtained key employee email addresses directly from the website. Sixty-one percent say it is more likely to occur and 72 percent say it would be very difficult or difficult to detect. Figure 12. Account hijacking 80% 70% 72% 61% 60% 50% 40% 30% 20% 10% 0% Liklihood of happening on Cyber Monday Difficult to detect Attack 8. Electronic wallet. A company has expanded customer payment options to include Internet payment methods such as PayPal, Google Wallet, Amazon Checkout and others. A criminal looking for sites that have recently added internet payment processes identifies its site and exploits the lack of fully implemented security controls. Sixty percent say this is more likely to happen and a much higher percentage (81 percent) say it would be very difficult or difficult to detect. Figure 13. Electronic wallet 90% 81% 80% 70% 60% 60% 50% 40% 30% 20% 10% 0% Liklihood of happening on Cyber Monday Difficult to detect
  • 11.       Attack 9. Mass registration. A cyber criminal creates a fake website that imitates your company’s website. Loyal and prospective customers are lured to this bogus website, which asks them to provide personal information in order to register for a promotion or offer. This results in the theft of sensitive information. In this case, 50 percent say it is more likely to occur but a much higher percentage (71 percent) says it would be very difficult or difficult to detect. Figure 14. Mass registration 80% 71% 70% 60% 50% 50% 40% 30% 20% 10% 0% Liklihood of happening on Cyber Monday Difficult to detect Why companies are vulnerable The severity and frequency of internet fraud is on the rise but budgets and resources are not. As shown in Figure 15, 69 percent of respondents believe Internet fraud is becoming frequent and severe. Only 23 percent of respondents say most internet fraud that occurs on their company’s websites are quickly detected and remediated. Figure 15. Attributions regarding Internet fraud Strongly agree and agree response combined The frequency of Internet fraud is on the rise 69% The severity of Internet fraud is on the rise 69% Most Internet frauds that occurare quickly detected and remediated 23% 0% 10% 20% 30% 40% 50% 60% 70% 80%
  • 12.       Despite understanding the importance of data center availability on high traffic days and the business risk of internet fraud, it seems as if the resources necessary to deal with potential threats are not available. Only 34 percent say the budget is sufficient, as shown in Figure 16. Thirty-six percent say their organizations have the personnel and enabling technologies to reduce Internet fraud and denial of service attacks. Figure 16. Attributions regarding internet fraud 40% 36% 34% 35% 30% 25% 20% 15% 10% 5% 0% The security budget is sufficient for minimizing There is sufficient personnel and enabling Internet fraud and denial of service attacks technologies for minimizing Internet fraud and denial of service attacks Holiday shopping season precautions are not taken by most organizations. As revealed in Figure 17, 64 percent of respondents say their organizations have seen an increase in internet fraud and/or attempted website attacks during high traffic days such as Cyber Monday. However, only one-third say they are taking special precautions to ensure high availability and integrity of customer-facing websites during high traffic days such as Cyber Monday. That is why most rate their companies as not being sufficiently prepared for the increased traffic and likelihood of an attack. Figure 17. Internet fraud during high traffic days 70% 64% 55% 60% 50% 40% 33% 30% 29% 20% 12% 7% 10% 0% Yes No Unsure Increased Internet fraud and/or attempted website attacks during high traffic days Steps are taken to ensure availability/integrity of customer-facing websites during high traffic days
  • 13.       Detection of fraud is difficult because of the lack of real time visibility. Figure 18 indicates that more than half (51 percent) say their organization does not have real time visibility into its website traffic to make it possible to immediately detect the presence of a criminal or fraudster and 12 percent are unsure. This lack of visibility leads to the problem 46 percent of respondents have in understanding the root cause of an attack. Figure 18. Real time visibility into website traffic 60% 51% 50% 40% 37% 30% 20% 12% 10% 0% Yes No Unsure Steps taken to detect fraud may not be the most effective. According to respondents, organizations are using identity and authentication systems such as IAM, anti-virus/anti-DDoS, manual inspection and assessment of vulnerabilities, manual inspection and assessment of web pages in production and security intelligence systems. Only 36 percent of respondents say their organizations use automated forensic tools that detect business logic abuses. Figure 19. Steps taken to prevent/detect internet fraud Very important and important response combined Identity and authentication systems 63% Anti-virus/anti-DDoS 62% Manual vulnerability inspection and assessment 53% Manual inspection of web pages in production 51% Security intelligence systems 41% Content aware firewalls 39% Automated forensic tools that detect business logic abuses 36% Intrusion prevention systems 34% Use of WAF 34% Testing of the website’s functionality prior to production 32% Intrusion detection systems 30% Network security and VPN 29% Other 2% 0% 10% 20% 30% 40% 50% 60% 70%
  • 14.     Part 3. Conclusion & recommendations It is important that companies do not think narrowly about this issue. When making the business case for investing in website security, emphasize the economics of reputation damage. The following are technology, governance and assessment recommendations to make a website ready for Cyber Monday: Technologies. Invest in technology that improves the ability to prevent downtime or outages and detect fraud occurring in real time. Do not wait until the holiday shopping season to take the necessary precautions. Governance.  Centralize resources under one function to improve accountability for preventing and detecting internet fraud and cyber attacks. Too many organizations say no one function is accountable for stopping internet fraud and threats. Have a business continuity and disaster recovery plan in place to minimize downtime and data center availability in the event of an attack.   Assessment. Based on your business model, assess what threats are most likely to target your websites. Prevent future fraud by understanding the root cause of the attack.  
  • 15.       Part 4. Methods A random sampling frame of 34,614 IT and IT security practitioners located in the United States and United Kingdom were selected as participants to this survey. As shown in Table 1, 1,338 respondents completed the survey. Screening removed 177 surveys. The final sample was 1,161 surveys (or a 3.4 percent response rate). Table 1. Sample response Total sampling frame Total returns Screened or rejected surveys Final sample Freq. 34,614 1,338 177 1,161 Pct% 100.0% 3.9% 0.5% 3.4% As noted in Table 2, the respondents’ average (mean) experience in IT, IT security or related fields is 10.8 years. Table 2. Other characteristics of respondents Mean Total years of IT or IT security experience 10.8 Total years in your current position 5.9 Pie Chart 1 reports the industry segments of respondents’ organizations. This chart identifies financial services (18 percent) as the largest segment, followed by e-commerce (12 percent) and retail (12 percent). Pie Chart 1. Industry distribution of respondents’ organizations 3% 2% 2% 2% 2% 18% 3% 4% 5% 12% 6% 5% 12% 6% 10% 7% Financial services E-commerce Retail Health & pharmaceuticals Technology & software Services Transportation Hospitality Public sector Consumer products Energy & utilities Gaming Communications Entertainment & media Industrial Other
  • 16.       Pie Chart 2 reports the respondent’s organizational level within participating organizations. By design, 54 percent of respondents are at or above the supervisory levels. Pie Chart 2. What organizational level best describes your current position? 7% 3%1% 2% 1% 16% Senior Executive Vice President Director Manager Supervisor 36% 20% Technician Staff Contractor Other 15%       According to Pie Chart 3, 59 percent of respondents report directly to the Chief Information Officer and 18 percent report to the Chief Information Security Officer. Pie Chart 3. The primary person you or the IT security leader reports to within the organization 4% 3% 1% 8% Chief Financial Officer 2% 3% General Counsel Chief Information Officer Chief Information Security Officer 18% Compliance Officer Chief Security Officer 59% Data Center Management Chief Risk Officer
  • 17.       More than half of the respondents (55 percent) are from organizations with a global headcount of over 1,000 employees, as shown in Pie Chart 4. Pie Chart 4. Global headcount 4% 8% 10% < 100 19% 100 to 500 501 to 1,000 17% 1,001 to 5,000 5,001 to 25,000 25,001 to 75,000 > 75,000 21% 21% Part 5. Caveats There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most web-based surveys. Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of individuals, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that individuals who did not participate are substantially different in terms of underlying beliefs from those who completed the instrument. Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are IT or IT security leaders. We also acknowledge that the results may be biased by external events such as media coverage. We also acknowledge bias caused by compensating subjects to complete this research within a holdout period. Self-reported results: The quality of survey research is based on the integrity of confidential responses received from subjects. While certain checks and balances can be incorporated into the survey process, there is always the possibility that a subject did not provide a truthful response.
  • 18.       Appendix: Detailed Survey Results The following tables provide the frequency or percentage frequency of responses to all survey questions contained in this study. All survey responses were captured in August 2013. Sample response Total sampling frame Total returned surveys Screened or rejected surveys Final sample Response rate Sample weights Part 1. Screening questions S1. How familiar are you with organization’s website security and anti-internet fraud activities? Very familiar Familiar Somewhat familiar No knowledge (Stop) Total S2. Approximately, how much of your organization’s revenues (gross sales) are from internet channels? None (Stop) 1 to 10% 11 to 20% 21 to 30% 31 to 40% 41 to 50% 51 to 60% 61 to 70% 71 to 80% 81 to 90% 91 to 100% (virtually all) Total Extrapolated values S3. Approximately, how much of your organization’s revenues (gross sales) are from mobile channels? None (Stop) 1 to 10% 11 to 20% 21 to 30% 31 to 40% 41 to 50% 51 to 60% 61 to 70% 71 to 80% 81 to 90% 91 to 100% (virtually all) Total Extrapolated values Combined 34,614 1,338 177 1,161 3.4% 100% Combined 25% 41% 34% 0% 100% Combined 0% 12% 26% 23% 14% 11% 7% 2% 2% 2% 1% 100% 29% Combined 0% 39% 27% 20% 9% 3% 1% 0% 1% 1% 0% 100% 17%
  • 19.         S4. Do you have any responsibility for the security of your organization’s websites? Yes, full responsibility Yes, some responsibility Yes, minimum responsibility No responsibility (Stop) Total Combined Part 2. Attributions. Strongly agree and agree combined. Q1a. Internet fraud represents a significant business risk for my company. Q1b. Data center availability is my company’s highest priority above all other IT priorities. Q1c. The prevention of internet fraud is a priority for my company during high traffic days such as Cyber Monday. Q1d. Most internet frauds that occur on my company’s websites are quickly detected and remediated. Q1e. My company is vigilant in monitoring websites for internet fraud and other abuses. Q1f. My company is vigilant in monitoring threats that seek to shutdown our websites (such as denial of service attacks). Q1g. My company’s security budget is sufficient for minimizing Internet fraud and denial of service attacks. Q1h. My company has sufficient personnel and enabling technologies for minimizing Internet fraud and denial of service attacks. Q1i. The frequency of Internet fraud experienced by my company is on the rise. Q1j. The severity of Internet fraud experienced by my company is on the rise. Combined Part 3. Background Q2. Approximately, how many customer-facing websites does your company have in production today? Between 1 and 5 Between 6 and 10 Between 10 and 20 Between 21 and 30 Between 31 and 40 Between 41 and 50 Between 51 and 100 More than 100 Total Extrapolated values Q3. On a typical day, how much revenue does you earn from internet and mobile channels? Less than $100,000 $100,001 to $200,000 $200,001 to $300,000 $300,001 to $400,000 $400,001 to $500,000 $500,001 to $1,000,000 $1,000,001 to $2,000,000 $2,000,001 to 5,000,000 More than $5,000,000 Total Extrapolated values 30% 61% 10% 0% 100% 66% 52% 67% 23% 41% 39% 34% 36% 69% 69% Combined 7% 12% 19% 16% 6% 9% 11% 20% 100% 44.4 Combined 13% 16% 16% 15% 12% 9% 7% 5% 7% 100% $823,079
  • 20.         Q4. In percentage terms, how much of a revenue boost or increase do you anticipate this coming Cyber Monday? No increase Less than 10% 11% to 25% 26% to 50% 51% to 75% 76% to 100% 101% to 200% (1 to 2X) 201% to 500% (2 to 5X) More than 500% (> 5X) Total Extrapolated value Net increase (Cyber Monday revenue boost) Q5. In a 12-month period, what percent of your company’s total revenues (gross sales) were lost due to the financial and brand impact of internet fraud? None 1% to 2% 3% to 4% 5% to 6% 7% to 8% 9% to 10% More than 10% Total Extrapolated value Q6. In the past 12 months, how many separate internet fraud incidents did your company experience? None 1 to 5 6 to 10 10 to 20 21 to 30 31 to 40 41 to 50 51 to 100 More than 100 Total Extrapolated value Q7a. Have you experienced any unplanned data center outages in the past 12 months most likely caused by internet fraud, denial of services or other cyber attacks? Yes No Unsure Total Combined 8% 9% 12% 22% 34% 13% 1% 2% 1% 100% 55% $665,115 Combined 10% 27% 27% 15% 5% 6% 11% 100% 4.7% Combined 18% 25% 20% 12% 7% 2% 6% 6% 5% 100% 19.2 Combined 55% 35% 10% 100%
  • 21.         Q7b. If yes, what was the frequency of unplanned data center outages in the past 12 months most likely caused by internet fraud, denial of services or other cyber attacks? 1 and 2 3 and 5 6 and 10 11 and 15 16 and 20 More than 20 Total Extrapolated value Q7c. If yes, what was the average duration of unplanned data center outages most likely caused by internet fraud, denial of services or other cyber attacks in the past 12 months? Less than 1 minute 1 to 5 minutes 5 to 20 minutes 20 minutes to 2 hours 2 hours to one day More than one day Total Extrapolated value Q8. How confident are you in knowing the root causes of most Internet frauds or cyber attacks that seek to shutdown your company’s data centers? Very confident Confident Not confident Total Q9. On a typical day, how much would it cost your company in lost traffic or revenues when a primary customer-facing website is down for just one hour? None Less than $1,000 $1,000 to $5,000 $5,001 to $10,000 $10,001 to $20,000 $20,001 to $50,000 $50,001 to $100,000 $100,001 to $500,000 $500,000 to $750,000 $750,001 to $1 million More than $1 million Total Extrapolated value Combined 31% 43% 11% 5% 7% 3% 100% 5.7 Combined 12% 36% 35% 8% 4% 5% 100% 51.5 Combined 17% 37% 46% 100% Combined 0% 1% 1% 3% 16% 17% 14% 17% 12% 12% 8% 100% $336,729
  • 22.         Q10. On high traffic days such as Cyber Monday, how much would it cost your company in lost traffic or revenues when a primary customer-facing website is down for just one hour? None Less than $1,000 $1,000 to $5,000 $5,001 to $10,000 $10,001 to $20,000 $20,001 to $50,000 $50,001 to $100,000 $100,001 to $500,000 $500,000 to $750,000 $750,001 to $1 million More than $1 million Total Extrapolated value Q11. What is the total economic impact to reputation or brand damage in the event your company suffered just one hour unplanned shutdown during a high traffic day such as Cyber Monday? None Less than $1,000 $1,000 to $5,000 $5,001 to $10,000 $10,001 to $20,000 $20,001 to $50,000 $50,001 to $100,000 $100,001 to $500,000 $500,000 to $750,000 $750,001 to $1 million $1 million to $10 million $10 million to $50 million $50 million to $100 million More than $100 million Total Extrapolated value Q12. Do you believe your company’s customer churn (turnover) rate would increase in the event its primary customer-facing website was shutdown just one hour during a high traffic day such as Cyber Monday? Yes, substantial increase in churn Yes, some increase in churn No Unsure Total Q13a. In the past few years have you seen an increase in internet fraud and/or attempted website attacks during high traffic days such as Cyber Monday? Yes No Unsure Total Combined 0% 0% 1% 1% 8% 10% 11% 17% 22% 18% 12% 100% $494,882 Combined 0% 1% 4% 12% 13% 11% 15% 16% 11% 8% 6% 3% 2% 1% 100% $3,372,616 Combined 24% 42% 25% 10% 100% Combined 64% 29% 7% 100%
  • 23.         Q13b. If yes, in percentage terms, what is the relative increase in internet fraud and/or attempted websites attacks during high traffic days such as Cyber Monday? Less than 5% 5% to 10% 11% to 25% 26% to 50% 51% to 75% 76% to 100% More than 100% Total Extrapolated value Q14. Does your company take special steps or precautions to ensure high availability and integrity of customer-facing websites during high traffic days such as Cyber Monday? Yes No Unsure Total Q15. Is your company ready to deal with internet frauds and other cyber attacks that seek to shutdown its primary customer-facing websites during high traffic days such as Cyber Monday? Please use the following 10-point scale to rate your opinion from 1 = not ready to 10 = fully prepared. 1 to 2 3 to 4 5 to 6 7 to 8 9 to 10 Total Q16. What steps does your organization take to prevent or detect internet fraud and other attacks that seek to shutdown websites? Please rate each one of the following steps in terms of its importance using the following scale: Very important and Important combined. Manual inspection and assessment of vulnerabilities Manual inspection and assessment of web pages in production Thorough testing of the website’s functionality prior to production Identity and authentication systems such as IAM Automated forensic tools that detect business logic abuses Content aware firewalls (including next generation firewalls) Security intelligence systems such as SIEM Intrusion detection systems Intrusion prevention systems Anti-virus/anti-DDoS Network security and VPN Use of WAF Other (please specify) Average Q17. Does your organization have real time visibility into its website traffic? In other words, can you detect the presence of a criminal or fraudster in real time (immediately)? Yes No Unsure Total Combined 14% 14% 23% 21% 17% 5% 5% 100% 34% Combined 33% 55% 12% 100% Combined 20% 33% 16% 12% 18% 100% 5.0 Combined 53% 51% 32% 63% 36% 39% 41% 30% 34% 62% 29% 34% 2% 39% Combined 37% 51% 12% 100%
  • 24.     Q18. Who is most responsible for curtailing internet fraud and threats that seek to shutdown your organization’s websites? Chief information officer (CIO) Chief technology officer (CTO) Chief information security officer (CISO) Chief security officer (CSO) Chief risk officer (CRO) Head, data center management Business unit management Website development leader/manager Fraud prevention leader/manager Corporate compliance or legal department Web hosting service provider No one person or function has overall responsibility Other (please specify) Total Part 4. Cyber Monday scenarios Testing stolen credit cards. A cyber criminal steals hundreds of credit card numbers and uses your credit or debit card payments function to validate active credit cards. Q19a. How likely could this happen to your company? Already happened or very likely to happen. Q19b. How difficult would it be to detect this situation? Very difficult or difficult. Q19c. Do you believe this scenario is more likely to occur on high traffic days such as Cyber Monday? Yes No Unsure Total Click fraud. Your company hires an agency to conduct an online advertising campaign. The agency is paid on a “per click” basis. In reality many of the paid “per clicks” are not authentic (i.e., not involving an interested consumer). Q20a. How likely could this happen to your company? Already happened or very likely to happen. Q20b. How difficult would it be to detect this situation? Very difficult or difficult. Q20c. Do you believe this scenario is more likely to occur on high traffic days such as Cyber Monday? Yes No Unsure Total Account hijacking. A successful spear phishing scam resulted in cyber criminals obtaining the user names and passwords of customers. The leakage of customer account information occurred because employees were duped by what appeared to be a legitimate internal company email communication. The crime originated when the criminal obtained key employee email addresses directly from the website. Q21a. How likely could this happen to your company? Already happened or very likely to happen. Q21b. How difficult would it be to detect this situation? Very difficult or difficult.   Combined 22% 1% 16% 2% 1% 3% 16% 8% 9% 1% 1% 19% 1% 100% Combined 50% 66% Combined 64% 31% 6% 100% Combined 65% 74% Combined 66% 28% 7% 100% Combined 62% 72%
  • 25.         Q21c. Do you believe this scenario is more likely to occur on high traffic days such as Cyber Monday? Yes No Unsure Total Botnet and DDoS. A cyber criminal targets a botnet against your company and this results in a denial of service (DoS) attack that ultimately brings down your websites. Q22a. How likely could this happen to your company? Already happened or very likely to happen. Q22b. How difficult would it be to detect this situation? Very difficult or difficult. Q22c. Do you believe this scenario is more likely to occur on high traffic days such as Cyber Monday? Yes No Unsure Total Mass registration. A cyber criminal creates a fake website that imitates your company’s website. Loyal and prospective customers are lured to this bogus website, which asks them to provide personal information in order to register for a promotion or offer. This results in the theft of sensitive information. Q23a. How likely could this happen to your company? Already happened or very likely to happen. Q23b. How difficult would it be to detect this situation? Very difficult or difficult. Q23c. Do you believe this scenario is more likely to occur on high traffic days such as Cyber Monday? Yes No Unsure Total App store fraud. Your company has an app store/market place, providing access to products and instant rebates. Criminals masquerading as a merchant and a buyer manipulate the open platform for financial gain, cashing in on rebates and earning points from credit card incentive programs. Q24a. How likely could this happen to your company? Already happened or very likely to happen. Q24b. How difficult would it be to detect this situation? Very difficult or difficult. Q24c. Do you believe this scenario is more likely to occur on high traffic days such as Cyber Monday? Yes No Unsure Total Mobility use case. Your company has expanded its consumer reach using a mobility platform that allows customers to access its websites using smart phones and other mobile devices. Cyber criminals infiltrate these devices with malware that captures customers’ account access credentials. The criminals harvest this information to takeover accounts using a laptop or desktop computer. Q25a. How likely could this happen to your company? Already happened or very likely to happen. Q25b. How difficult would it be to detect this situation? Very difficult or difficult. Combined 61% 35% 5% 100% Combined 54% 72% Combined 83% 15% 2% 100% Combined 43% 71% Combined 50% 47% 3% 100% Combined 45% 71% Combined 78% 13% 10% 100% Combined 60% 70%
  • 26.     Q25c. Do you believe this scenario is more likely to occur on high traffic days such as Cyber Monday? Yes No Unsure Total eCoupons. Fraudsters do an end-run around your company’s pricing policy. They select a heavily discounted item and place it the “shopping cart.” They delay the check out in order to obtain and apply an eCoupon to the final purchase price, thus obtaining the item well below your company’s cost. Q26a. How likely could this happen to your company? Already happened or very likely to happen. Q26b. How difficult would it be to detect this situation? Very difficult or difficult. Q26c. Do you believe this scenario is more likely to occur on high traffic days such as Cyber Monday? Yes No Unsure Total Electronic wallet. Your company has expanded customer payment options to include Internet payment methods such as PayPal, Google Wallet, Amazon Checkout and others. A criminal looking for sites that have recently added Internet payment processes identifies your site and is able to exploit the lack of fully implemented security controls. Q27a. How likely could this happen to your company? Already happened or very likely to happen. Q27b. How difficult would it be to detect this situation? Very difficult or difficult. Q27c. Do you believe this scenario is more likely to occur on high traffic days such as Cyber Monday? Yes No Unsure Total   Combined 66% 24% 10% 100% Combined 51% 70% Combined 64% 31% 5% 100% Combined 54% 81% Combined 60% 30% 10% 100% Part 5. Your role and organization D1. What organizational level best describes your current position? Senior Executive Vice President Director Manager Supervisor Technician Staff Contractor Other Total Combined 2% 1% 16% 20% 15% 36% 7% 3% 1% 100%
  • 27.         D2. Check the Primary Person you or your IT security leader reports to within the organization. CEO/Executive Committee Chief Financial Officer General Counsel Chief Information Officer Chief Information Security Officer Compliance Officer Human Resources VP Chief Security Officer Data Center Management Chief Risk Officer Other Total Combined 0% 3% 1% 59% 18% 3% 0% 2% 8% 4% 0% 100% D3. Total years of relevant experience Total years of IT or security experience (mean value) Total years in current position years (mean value) Combined D4. What industry best describes your organization’s industry focus? Agriculture & food services Communications Consumer products E-commerce Education Energy & utilities Entertainment & media Financial services Gaming Health & pharmaceuticals Hospitality Industrial Public sector (including non-profits) Retail Services Technology & software Transportation Other Total Combined D5. Where are your employees located? (Check all that apply): United States Canada Europe Middle East & Africa Asia-Pacific Latin America (including Mexico) Combined 10.8 5.9 1% 2% 4% 12% 0% 3% 2% 18% 3% 7% 6% 2% 5% 12% 6% 10% 5% 1% 100% 86% 65% 81% 50% 58% 52%
  • 28.         D6. What is the worldwide headcount of your organization? < 100 100 to 500 501 to 1,000 1,001 to 5,000 5,001 to 25,000 25,001 to 75,000 > 75,000 Total Extrapolated value Combined 10% 19% 21% 21% 17% 8% 4% 100% 10,995 Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO), we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions.