SlideShare a Scribd company logo
1 of 28
2013 NORTON REPORT
2013 NORTON REPORT
24 COUNTRIES
AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK,
FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS,
NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA, SINGAPORE,
SOUTH AFRICA, SWEDEN, TURKEY, UNITED ARAB EMIRATES,
UNITED KINGDOM, UNITED STATES OF AMERICA
13,022 ONLINE ADULTS AGED 18-64
WHO IS AFFECTED MOST BY CYBERCRIME?
CYBERCRIME VICTIMS MORE
LIKELY TO BE:

HIGHEST NUMBER OF CYBERCRIME
VICTIMS FOUND IN:

MALE – 64%
(COMPARED TO 58% OF FEMALES)

MILLENNIAL – 66%
(COMPARED TO 54% OF BABY BOOMERS)
AND:
• MOBILE DEVICE OWNERS – 63%
• SOCIAL NETWORK USERS – 63%
• PUBLIC / UNSECURED WI-FI USERS – 68%
• EMERGING MARKET – 68%
• PARENT OF CHILDREN 8-17 – 65%

USA 63%; CANADA 68%; UK 58%; FRANCE 45%; GERMANY 53%; ITALY 56%; SWEDEN 56%; POLAND 60%; NETHERLANDS 50%; AUSTRALIA 60%; INDIA 65%;
JAPAN 19%; SINGAPORE 61%; NEW ZEALAND 69%; TURKEY 63%; DENMARK 50%; SAUDI ARABIA 62%; UAE 71%, COLOMBIA 64%

RUSSIA

85%
CHINA

77%
SOUTH AFRICA

73%
ALL STATS REFER TO LIFETIME VICTIMS
KEY THEMES
TABLET AND SMARTPHONE CONSUMERS LEAVE SECURITY BEHIND
ALMOST 1/2 DON’T USE BASIC PRECAUTIONS SUCH AS PASSWORDS, SECURITY SOFTWARE
OR BACK UP FILES FOR THEIR MOBILE DEVICE
MORE THAN ONE-THIRD HAVE EXPERIENCED MOBILE CYBERCRIME LAST YEAR

THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME
US$113 BILLION ANNUALLY, COST PER CYBERCRIME VICTIM UP 50 PERCENT

THE SCALE OF CONSUMER CYBERCRIME
1 MILLION+ VICTIMS DAILY

CREATING PERFECT STORM AS LINES BLUR BETWEEN WORK/PLAY
49% USE THEIR PERSONAL DEVICE FOR WORK AND PLAY
AROUND ONE-IN-FIVE SHARE WORK RELATED INFORMATION WITH FRIENDS AND FAMILY
SMARTPHONE/TABLET CONSUMERS LEAVING SECURITY BEHIND

1/2

NEARLY
SMARTPHONE/TABLET USERS SLEEP WITH THEIR
PHONES WITHIN ARMS’ REACH
NEARLY

1/2

DON’T USE BASIC PRECAUTIONS SUCH AS

PASSWORDS, SECURITY SOFTWARE OR BACK UP FILES FOR THEIR
MOBILE DEVICE *

ONLY

26%

OF SMARTPHONE USERS HAVE MOBILE

SECURITY SOFTWARE WITH ADVANCED PROTECTION

57%

AREN’T AWARE

THAT SECURITY SOLUTIONS FOR MOBILE DEVICES EXIST *
*AMONG MOBILE DEVICE USERS
CONSUMERS’ SECURITY IQ – HIGH ON PC, LOW ON MOBILE
DELETE SUSPICIOUS
EMAILS FROM PEOPLE
THEY DON’T KNOW

HAVE AT LEAST A BASIC
FREE ANTIVIRUS SOLUTION

AVOID STORING SENSITIVE
FILES ONLINE

90%

72%

78%

VS.

VS.

VS.

60%

42%

53%

VS.

VS.

VS.

56%

33%

48%

GOOD JOB!

NEEDS
WORK!

NEEDS
WORK!
MOBILE CYBERCRIME AND LOSS

38%

HAVE EXPERIENCED MOBILE CYBERCRIME

IN PAST 12 MONTHS *

27%

OF ADULTS

HAVE LOST THEIR MOBILE DEVICE OR HAD IT STOLEN

*AMONG SMARTPHONE USERS
THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME

$113

BN

ENOUGH TO HOST THE 2012 LONDON
OLYMPICS NEARLY 10 TIMES OVER

83% OF DIRECT FINANCIAL COSTS
ARE A RESULT OF
FRAUD, REPAIRS, THEFT AND
LOSS

OTHER 17%
FRAUD 38%

REPAIRS 24%

USD $298
AVERAGE COST PER VICTIM

THEFT OR LOSS
21%

REPRESENTS A 50 PERCENT INCREASE OVER 2012

ALL AMOUNTS IN USD
SEE EXTRAPOLATION CALCULATIONS *
THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME

1 BN

RUSSIA

13 BN

EUROPE

38 BN
3 BN
USA

37 BN
CHINA

4 BN

MEXICO

INDIA

8 BN

1 BN
JAPAN

BRAZIL

1 BN

AUSTRALIA

SOUTH AFRICA

0.3 BN

ALL AMOUNTS IN USD ROUNDED TO THE NEAREST BILLION
CANADA 3 BN; SINGAPORE 1 BN; NEW ZEALAND 0.1 BN; TURKEY 2 BN; SAUDI ARABIA 0.5 BN; UAE 0.3 BN; COLOMBIA 0.5 BN
THE SCALE OF CONSUMER CYBERCRIME

378 MILLION VICTIMS PER YEAR

NO

1

NEARLY 2.8 TIMES AS MANY BABIES BORN EACH YEAR

1 MILLION +
VICTIMS PER DAY

ENOUGH TO FILL WEMBLEY STADIUM (ENGLAND) MORE THAN 10 TIMES

12 VICTIMS PER SECOND
SEE EXTRAPOLATION CALCULATIONS *
THE SCALE OF CONSUMER CYBERCRIME

50% OF ONLINE ADULTS
HAVE BEEN VICTIMS OF CYBERCRIME AND / OR NEGATIVE
ONLINE SITUATIONS IN THE PAST YEAR
(e.g., RECEIVED NUDE IMAGES FROM STRANGERS OR WERE
BULLIED OR STALKED ONLINE)

41% OF ONLINE ADULTS
HAVE FALLEN VICTIM TO ATTACKS SUCH AS
MALWARE, VIRUSES, HACKING, SCAMS, FRAUD AND THEFT
BLURRING BETWEEN WORK AND PLAY

49%
36%
30%

USE THEIR PERSONAL DEVICE FOR WORK AND PLAY*

SAY THEIR COMPANY HAS NO POLICY ON USE OF
PERSONAL DEVICES FOR WORK*

OF PARENTS LET THEIR KIDS PLAY, DOWNLOAD AND SHOP ON
THEIR WORK DEVICE **

49%

34%

OF RESPONDENTS ACCESS
ACCESS THEIR SOCIAL
OR SEND PERSONAL EMAILS NETWORK THROUGH
THROUGH THEIR WORK
THEIR WORK DEVICE*
DEVICE*

27%
STORE PERSONAL
INFORMATION ON THEIR
WORK DEVICE*
*AMONG WORKING ADULTS

**AMONG PARENTS WHO USE DEVICES PROVIDED BY THEIR EMPLOYER
ONLINE FILE STORAGE OPENS DOOR TO OVERSHARING

24%

OF USERS SAVE BOTH WORK AND PERSONAL

DOCUMENTS TO THE SAME ONLINE FILE STORAGE ACCOUNT

ON SHARING WORK-RELATED INFORMATION THROUGH ONLINE FILE
STORAGE SITES:

18%

SHARE WITH FRIENDS

21%

SHARE WITH FAMILY

PUTTING BOTH WORK AND
PERSONAL DOCUMENTS AT
RISK
RISKY BEHAVIOR ON SOCIAL MEDIA
?
LOG OUT

****

?

?

39%

1/4

31%

OF SOCIAL MEDIA USERS
DON’T LOG OUT AFTER
EACH SESSION

OF SOCIAL MEDIA USERS
SHARE THEIR SOCIAL
MEDIA PASSWORDS WITH
OTHERS

OF SOCIAL MEDIA USERS
CONNECT WITH PEOPLE
THEY DO NOT KNOW

12% OF SOCIAL MEDIA USERS SAY SOMEONE HAS HACKED INTO
THEIR SOCIAL NETWORK ACCOUNT AND PRETENDED TO BE THEM
MOBILE AND SOCIAL STRESSORS

49%
OF MOBILE DEVICE USERS WOULD
FEEL UPSET/CONCERNED IF THEY
LEFT HOME WITHOUT THEIR
MOBILE DEVICE

6/10
OF MOBILE DEVICE USERS
GET ANNOYED BY OTHERS
CHECKING THEIR MOBILES
DURING A MEAL

1/4
OF MOBILE DEVICE USERS
CHECK THEIR MOBILES
WHILE SHARING A MEAL
WITH OTHERS

25%
OF SOCIAL NETWORK USERS CHECK
THEIR SOCIAL NETWORK WITHIN
15 MINUTES OF WAKING UP
CONSUMERS PICK CONVENIENCE OVER SAFETY

1/3

62%

ADMIT THE CONVENIENCE OF
CONSTANTLY CONNECTED
OUTWEIGHED ANY POTENTIAL
SECURITY RISKS

AGREE THERE IS NO SUCH
THING AS ‘ONLINE PRI ACY’ IN
TODAY’S WORLD

EVEN THOUGH…

46%

7/10

WISH THEY COULD
PERMANENTLY DELETE SOME
OF THEIR PERSONAL ONLINE
CONTENT COMPLETELY

DON’T PUT ANYTHING ON
SOCIAL NETWORKS THAT THEY
WOULDN’T WANT THEIR
PARENTS / KIDS TO SEE
CONCLUSION

50% OF ONLINE ADULTS HAVE
BEEN VICTIMS OF CYBERCRIME AND
/ OR NEGATIVE ONLINE SITUATIONS
IN THE PAST YEAR
1M+ ADULTS BECOME CYBERCRIME VICTIMS EVERY DAY THAT’S 12 VICTIMS PER SECOND

$113

BILLION

TOTAL DIRECT GLOBAL COSTS
IN JUST 12 MONTHS

CONSUMERS MOVE TO MOBILE DEVICES
BUT LEAVE PROTECTION BEHIND
CONSUMERS ARE INCREASINGLY USING MOBILE DEVICES AND
TABLET DEVICES BUT ARE NOT PROTECTING THEMSELVES.
WHILE DESKTOP PROTECTION IS HIGH AMONG
CONSUMERS, THE CYBERCRIMINAL IS MOVING TO MOBILE
AND TABLET DEVICES WHERE CONSUMERS ARE VULNERABLE.
MOBILE DEVICE ADOPTION CONTINUES TO
GROW, SUGGESTING A DEGREE OF MOBILE
DEPENDENCE, WHICH WILL INCREASE OPPORTUNITIES FOR
CYBERCRIMINALS TO STRIKE.

BLURRING BETWEEN WORK AND
PERSONAL MOBILE DEVICE USAGE
AS PERSONAL MOBILE DEVICES ARE BEING USED MORE AND
MORE FOR WORK-RELATED ACTIVITIES, CONSUMERS’
LIFESTYLES ARE PUTTING BUSINESS ENVIRONMENTS AT RISK.
AN ALARMING NUMBER OF BUSINESSES HAVE NO POLICIES IN
PLACE. FOR THOSE WHO DO, OUR RESEARCH SUGGESTS THE
POLICIES ARE OFTEN NOT RESPECTED BY THEIR EMPLOYEES.

CONSUMERS PICK CONVENIENCE OVER
SAFETY

MANY CONSUMERS ARE MAKING A CONSCIOUS DECISION TO
TRADE THEIR SAFETY FOR CONVENIENCE; MANY MORE ARE
UNAWARE THAT THEY’RE MAKING THE SAME TRADE.
BUT, “CONSTANTLY CONNECTED” DOESN’T HAVE TO EQUAL
“CONSTANTLY AT RISK”
ALL AMOUNTS IN USD
TOP TIPS
DEFEND YOUR DATA
A COMPREHENSIVE SECURITY SUITE PROVIDES A STRONG DEFENSE AGAINST ONLINE THREATS.
NORTON 360 MULTI-DEVICE OFFERS PROTECTION FOR PCS, SMARTPHONES AND TABLETS, IN A SINGLE
SOLUTION

THINK OF MOBILE DEVICES AS MINI-COMPUTERS
MOBILE IS THE FASTEST-GROWING TARGET FOR CYBERCRIMINALS. MAKE SURE YOUR MOBILE DEVICE
REQUIRES A PASSWORD, AND TAKE PRECAUTIONS TO ENSURE YOUR DEVICE IS PROTECTED AGAINST
THEFT, LOSS AND CYBERCRIME

BE CAUTIOUS IN THE CLOUD
WHILE CLOUD STORAGE SOLUTIONS MAKE IT EASY TO SAVE AND SHARE FILES, THEY ALSO OPEN
OTHER AVENUES FOR ATTACK. BE CAREFUL ABOUT WHO HAS ACCESS TO YOUR FILES, AND USE A
SOLUTION WITH BUILT-IN SECURITY IF POSSIBLE

SAVE SENSITIVE TRANSACTIONS FOR SECURE CONNECTIONS
FREE OR UNSECURED WI-FI NETWORKS CAN MAKE IT EASY FOR THIEVES TO EAVESDROP ON YOUR
ACTIVITY. AVOID DOING ANY SENSITIVE TRANSACTIONS LIKE BANKING OR SHOPPING WHILE
CONNECTED TO THESE NETWORKS, OR USE A PERSONAL VPN CLIENT

AFTER YOU CONNECT, DOUBLE CHECK
CHECK CREDIT CARD AND BANK STATEMENTS REGULARLY FOR FRAUDULENT TRANSACTIONS, AND
REPORT ANY SUSPICIOUS ACTIVITY TO YOUR PROVIDER AND/OR LAW ENFORCEMENT
go.symantec.com/norton-report-2013
THANK YOU
ADDITIONAL FINDINGS
POTENTIALLY RISKY BEHAVIOR ON UNSECURED WI-FI

56% ACCESS

54% ACCESS

THEIR SOCIAL
NETWORK ACCOUNT

PERSONAL E-MAIL

29% ACCESS

29% SHOP ONLINE

THEIR BANK ACCOUNT

3/10 DO NOT
NEEDS
WORK!

39% DO NOT TAKE

ALWAYS LOG OFF AFTER
HAVING USED A PUBLIC
WI-FI CONNECTION

ANY SPECIAL STEPS TO
PROTECT THEMSELVES
WHEN USING PUBLIC WI-FI
*AMONG FREE/UNSECURED WI-FI USERS
BLURRING LINES BETWEEN FRIENDS AND ENEMIES

1/10

HA E ACCESSED THEIR PARTNER/FRIEND’S ACCOUNTS WITHOUT
PERMISSION

41%

26%

18%

DID IT BECAUSE THEY
WERE CURIOUS*

WERE GOOFING AROUND
/ PLAYING A JOKE*

DIDN’T TRUST THEIR
PARTNER / FRIEND TO BE
HONEST ON THEIR OWN*

*AMONG THOSE WHO HAVE ACCESSED PARTNER/FRIEND'S EMAIL/ SOCIAL MEDIA
METHODOLOGY
THE METHODOLOGY DETAIL
EDELMAN BERLAND CONDUCTED AN
ONLINE SURVEY AMONG CONSUMERS:
13,022 ADULTS AGED 18-64 YEARS

The survey was conducted in 24 countries
(Australia, Brazil, Canada, China, Colombia, France, Denmark,
Germany, India, Italy, Japan, Mexico, Netherlands, New
Zealand, Poland, Russia, Saudi Arabia, Singapore, South
Africa, Sweden, Turkey, United Arab Emirates, United
Kingdom and United States).
The survey was conducted in the primary language of each
country, and questions asked were identical across all
countries.
Interviews were conducted between 4th July 2013
– 1st August 2013.
The margin of error for the total sample of adults (n=13,022)
is + 0.9% at the 95% level of confidence.

Important notes:
The Norton Cybercrime Report is an annual report
commissioned by Norton by Symantec aimed at
understanding how cybercrime affects consumers and how
the adoption and evolution of new technologies impacts
consumers’ security. The research was conducted by
Edelman Berland, an international research agency. Findings
are based on self-reported experiences of over 13,000 adults
across 24 countries.
1000 adult respondents were interviewed in each of USA and
India. The global data has been weighted to ensure all
countries have equal representation of n=500 adults.
Additional notes:
Developed Markets:
USA, Canada, UK, France, Germany, Italy, Sweden, Netherlan
ds, Australia, Japan, Singapore, New Zealand, Denmark
Emerging Markets:
Brazil, Mexico, Poland, India, China, Russia, Turkey, Saudi
Arabia, UAE, Colombia, South Africa
Millennials: aged 18-34
Boomers: aged 45-64
DEFINITION OF CYBERCRIME

Cybercrime is defined as any of the following activities:
• Computer viruses or malicious software appeared on my computer
• I responded to a forged, ‘spoofed’ or fake email or website which captured my personal details such as passwords, credit card
numbers, or bank account information thinking it was a legitimate request in order to access information or provide information to a
legitimate organization, such as my bank, etc.
• Someone has hacked into my email account and pretended to be me
• Someone has hacked into my social networking profile and pretended to be me
• I responded to an online scam
• I experienced online credit card fraud
• I experienced identity theft
• My phone was infected and a text message was sent from my mobile phone without my permission or knowledge that I later had to
pay for
• My screen was locked and an alert was shown, which told me to pay a fine to get it unlocked
• My smartphone was lost or stolen and someone found it and used it without my permission
• An app appeared on my smartphone that I didn’t download
• I’ve had someone purporting to be from a computer company call me to inform that I have an infected computer
• I experienced another type of cybercrime on my cell / mobile phone / tablet device
• I experienced another type of cybercrime on my desktop or laptop computer
DEFINITION OF CYBERCRIME

Cybercrime and /or negative online experience is defined as any
of the following activities:
• Computer viruses or malicious software appeared on my computer
• I responded to a forged, ‘spoofed’ or fake email or website which captured my personal details such as passwords, credit card
numbers, or bank account information thinking it was a legitimate request in order to access information or provide information to a
legitimate organization, such as my bank, etc.
• Someone has hacked into my email account and pretended to be me
• Someone has hacked into my social networking profile and pretended to be me
• I responded to an online scam
• I experienced online credit card fraud
• I experienced identity theft
• My phone was infected and a text message was sent from my mobile phone without my permission or knowledge that I later had to
pay for
• My screen was locked and an alert was shown, which told me to pay a fine to get it unlocked
• My smartphone was lost or stolen and someone found it and used it without my permission
• An app appeared on my smartphone that I didn’t download
• I’ve had someone purporting to be from a computer company call me to inform that I have an infected computer
• I experienced another type of cybercrime on my cell / mobile phone / tablet device
• I experienced another type of cybercrime on my desktop or laptop computer
• I experienced someone posting private/intimate photos or videos of me without my permission
• I was approached online by someone in an unwanted sexual way
• I have experienced online bullying, online stalking, online hate crime or other forms of online harassment
• I have received SMS text messages from people I do not know, requesting me to click on an embedded link or stating that I have
received a voicemail and need to dial a number which is not my voicemail to retrieve it
• I have received unwanted nude images of someone I don’t know
• I have received unwanted nude images of someone I do know
EXTRAPOLATIONS CALCULATIONS
1) Nearly 380 million victims in 24 countries over
past 12 months
Online adults per country x % cybercrime victims
past 12 months per country = 377,943,431 (sum of
24 countries).
2) 12 cybercrime victims every second / 719
cybercrime victims every minute / 43,144 per hour
/ more than 1 million per day impacting almost 378
million adults in the past year in 24 countries*
Victims over past 12 months (as above) 377,943,431
/ 365 days per year / 24 hours / 60 minutes / 60
seconds
3) Cybercrime is big business costing $113 billion in
the last year in 24 countries
Victims over past 12 months (per country) x average
financial cost of cybercrime (per country in US
currency). Figure shown in the sum of all countries
total cost.

More Related Content

What's hot

Habits and Behavior of Social Media Users in Brazil 2013
Habits and Behavior of Social Media Users in Brazil 2013Habits and Behavior of Social Media Users in Brazil 2013
Habits and Behavior of Social Media Users in Brazil 2013Elife Brasil
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyMarian Merritt
 
Vietnam Mobile Apps Report Q3 2015
Vietnam Mobile Apps Report Q3 2015Vietnam Mobile Apps Report Q3 2015
Vietnam Mobile Apps Report Q3 2015Appota Group
 
2017 Nigerian Mobile Trend Report
2017 Nigerian Mobile Trend Report2017 Nigerian Mobile Trend Report
2017 Nigerian Mobile Trend ReportTerragon Group
 
Ericsson ConsumerLab – Wearable technology and the internet of things
Ericsson ConsumerLab – Wearable technology and the internet of things Ericsson ConsumerLab – Wearable technology and the internet of things
Ericsson ConsumerLab – Wearable technology and the internet of things Ericsson
 
Vietnam internet user’s behaviour 2016
Vietnam internet user’s behaviour 2016Vietnam internet user’s behaviour 2016
Vietnam internet user’s behaviour 2016Xuân Lan Nguyễn
 
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...We Are Social Singapore
 
Digital Revolution
Digital RevolutionDigital Revolution
Digital RevolutionAnnaDeac1
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18Symantec
 

What's hot (10)

Habits and Behavior of Social Media Users in Brazil 2013
Habits and Behavior of Social Media Users in Brazil 2013Habits and Behavior of Social Media Users in Brazil 2013
Habits and Behavior of Social Media Users in Brazil 2013
 
10 Incredible BYOD Facts
10 Incredible BYOD Facts10 Incredible BYOD Facts
10 Incredible BYOD Facts
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, Messy
 
Vietnam Mobile Apps Report Q3 2015
Vietnam Mobile Apps Report Q3 2015Vietnam Mobile Apps Report Q3 2015
Vietnam Mobile Apps Report Q3 2015
 
2017 Nigerian Mobile Trend Report
2017 Nigerian Mobile Trend Report2017 Nigerian Mobile Trend Report
2017 Nigerian Mobile Trend Report
 
Ericsson ConsumerLab – Wearable technology and the internet of things
Ericsson ConsumerLab – Wearable technology and the internet of things Ericsson ConsumerLab – Wearable technology and the internet of things
Ericsson ConsumerLab – Wearable technology and the internet of things
 
Vietnam internet user’s behaviour 2016
Vietnam internet user’s behaviour 2016Vietnam internet user’s behaviour 2016
Vietnam internet user’s behaviour 2016
 
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...
 
Digital Revolution
Digital RevolutionDigital Revolution
Digital Revolution
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 

Similar to Norton Cyber Crime Report 2013

Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youthnirmal00776
 
2012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_0509122012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_050912TimelineCR
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017CheapSSLsecurity
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkBlue Coat
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarMerlien Institute
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Networks
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian_US
 
10 Hot Consumer Trends 2014 by Ericcson
10 Hot Consumer Trends 2014 by Ericcson10 Hot Consumer Trends 2014 by Ericcson
10 Hot Consumer Trends 2014 by Ericcsonelcontact.com
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALPeggy Lawless
 
Security Risks of Uneducated Employees
Security Risks of Uneducated EmployeesSecurity Risks of Uneducated Employees
Security Risks of Uneducated EmployeesOriginIT
 
Mobile infographic 2015_english
Mobile infographic 2015_englishMobile infographic 2015_english
Mobile infographic 2015_englisheasysolmaria
 
How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.robertpresz7
 
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers VulnerableMobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers VulnerableXura
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
Internet of Things: From Everyday Devices to Conduits of Commerce
Internet of Things: From Everyday Devices to Conduits of CommerceInternet of Things: From Everyday Devices to Conduits of Commerce
Internet of Things: From Everyday Devices to Conduits of CommerceEuromonitor International
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust ReportAVG Technologies
 
The Consumer and 5G - EU
The Consumer and 5G - EUThe Consumer and 5G - EU
The Consumer and 5G - EUaccenture
 

Similar to Norton Cyber Crime Report 2013 (20)

Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
 
2012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_0509122012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_050912
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & Kantar
 
Liberation from Location: El Salvador
Liberation from Location: El SalvadorLiberation from Location: El Salvador
Liberation from Location: El Salvador
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey
 
10 Hot Consumer Trends 2014 by Ericcson
10 Hot Consumer Trends 2014 by Ericcson10 Hot Consumer Trends 2014 by Ericcson
10 Hot Consumer Trends 2014 by Ericcson
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINAL
 
Security Risks of Uneducated Employees
Security Risks of Uneducated EmployeesSecurity Risks of Uneducated Employees
Security Risks of Uneducated Employees
 
Mobile infographic 2015_english
Mobile infographic 2015_englishMobile infographic 2015_english
Mobile infographic 2015_english
 
How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.
 
Not logging on, but living on
Not logging on, but living onNot logging on, but living on
Not logging on, but living on
 
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers VulnerableMobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
Internet of Things: From Everyday Devices to Conduits of Commerce
Internet of Things: From Everyday Devices to Conduits of CommerceInternet of Things: From Everyday Devices to Conduits of Commerce
Internet of Things: From Everyday Devices to Conduits of Commerce
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust Report
 
The Consumer and 5G - EU
The Consumer and 5G - EUThe Consumer and 5G - EU
The Consumer and 5G - EU
 

Recently uploaded

Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Sonam Pathan
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfMichael Silva
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantagesjayjaymabutot13
 
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...Amil baba
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyTyöeläkeyhtiö Elo
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一S SDS
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companiesprashantbhati354
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithAdamYassin2
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)twfkn8xj
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintSuomen Pankki
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Commonwealth
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Sonam Pathan
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证jdkhjh
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证rjrjkk
 
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...Amil Baba Dawood bangali
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managmentfactical
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppmiss dipika
 

Recently uploaded (20)

Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdf
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantages
 
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companies
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraint
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
 
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managment
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsApp
 

Norton Cyber Crime Report 2013

  • 2. 2013 NORTON REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA, SINGAPORE, SOUTH AFRICA, SWEDEN, TURKEY, UNITED ARAB EMIRATES, UNITED KINGDOM, UNITED STATES OF AMERICA 13,022 ONLINE ADULTS AGED 18-64
  • 3. WHO IS AFFECTED MOST BY CYBERCRIME? CYBERCRIME VICTIMS MORE LIKELY TO BE: HIGHEST NUMBER OF CYBERCRIME VICTIMS FOUND IN: MALE – 64% (COMPARED TO 58% OF FEMALES) MILLENNIAL – 66% (COMPARED TO 54% OF BABY BOOMERS) AND: • MOBILE DEVICE OWNERS – 63% • SOCIAL NETWORK USERS – 63% • PUBLIC / UNSECURED WI-FI USERS – 68% • EMERGING MARKET – 68% • PARENT OF CHILDREN 8-17 – 65% USA 63%; CANADA 68%; UK 58%; FRANCE 45%; GERMANY 53%; ITALY 56%; SWEDEN 56%; POLAND 60%; NETHERLANDS 50%; AUSTRALIA 60%; INDIA 65%; JAPAN 19%; SINGAPORE 61%; NEW ZEALAND 69%; TURKEY 63%; DENMARK 50%; SAUDI ARABIA 62%; UAE 71%, COLOMBIA 64% RUSSIA 85% CHINA 77% SOUTH AFRICA 73% ALL STATS REFER TO LIFETIME VICTIMS
  • 4. KEY THEMES TABLET AND SMARTPHONE CONSUMERS LEAVE SECURITY BEHIND ALMOST 1/2 DON’T USE BASIC PRECAUTIONS SUCH AS PASSWORDS, SECURITY SOFTWARE OR BACK UP FILES FOR THEIR MOBILE DEVICE MORE THAN ONE-THIRD HAVE EXPERIENCED MOBILE CYBERCRIME LAST YEAR THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME US$113 BILLION ANNUALLY, COST PER CYBERCRIME VICTIM UP 50 PERCENT THE SCALE OF CONSUMER CYBERCRIME 1 MILLION+ VICTIMS DAILY CREATING PERFECT STORM AS LINES BLUR BETWEEN WORK/PLAY 49% USE THEIR PERSONAL DEVICE FOR WORK AND PLAY AROUND ONE-IN-FIVE SHARE WORK RELATED INFORMATION WITH FRIENDS AND FAMILY
  • 5. SMARTPHONE/TABLET CONSUMERS LEAVING SECURITY BEHIND 1/2 NEARLY SMARTPHONE/TABLET USERS SLEEP WITH THEIR PHONES WITHIN ARMS’ REACH NEARLY 1/2 DON’T USE BASIC PRECAUTIONS SUCH AS PASSWORDS, SECURITY SOFTWARE OR BACK UP FILES FOR THEIR MOBILE DEVICE * ONLY 26% OF SMARTPHONE USERS HAVE MOBILE SECURITY SOFTWARE WITH ADVANCED PROTECTION 57% AREN’T AWARE THAT SECURITY SOLUTIONS FOR MOBILE DEVICES EXIST * *AMONG MOBILE DEVICE USERS
  • 6. CONSUMERS’ SECURITY IQ – HIGH ON PC, LOW ON MOBILE DELETE SUSPICIOUS EMAILS FROM PEOPLE THEY DON’T KNOW HAVE AT LEAST A BASIC FREE ANTIVIRUS SOLUTION AVOID STORING SENSITIVE FILES ONLINE 90% 72% 78% VS. VS. VS. 60% 42% 53% VS. VS. VS. 56% 33% 48% GOOD JOB! NEEDS WORK! NEEDS WORK!
  • 7. MOBILE CYBERCRIME AND LOSS 38% HAVE EXPERIENCED MOBILE CYBERCRIME IN PAST 12 MONTHS * 27% OF ADULTS HAVE LOST THEIR MOBILE DEVICE OR HAD IT STOLEN *AMONG SMARTPHONE USERS
  • 8. THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME $113 BN ENOUGH TO HOST THE 2012 LONDON OLYMPICS NEARLY 10 TIMES OVER 83% OF DIRECT FINANCIAL COSTS ARE A RESULT OF FRAUD, REPAIRS, THEFT AND LOSS OTHER 17% FRAUD 38% REPAIRS 24% USD $298 AVERAGE COST PER VICTIM THEFT OR LOSS 21% REPRESENTS A 50 PERCENT INCREASE OVER 2012 ALL AMOUNTS IN USD SEE EXTRAPOLATION CALCULATIONS *
  • 9. THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME 1 BN RUSSIA 13 BN EUROPE 38 BN 3 BN USA 37 BN CHINA 4 BN MEXICO INDIA 8 BN 1 BN JAPAN BRAZIL 1 BN AUSTRALIA SOUTH AFRICA 0.3 BN ALL AMOUNTS IN USD ROUNDED TO THE NEAREST BILLION CANADA 3 BN; SINGAPORE 1 BN; NEW ZEALAND 0.1 BN; TURKEY 2 BN; SAUDI ARABIA 0.5 BN; UAE 0.3 BN; COLOMBIA 0.5 BN
  • 10. THE SCALE OF CONSUMER CYBERCRIME 378 MILLION VICTIMS PER YEAR NO 1 NEARLY 2.8 TIMES AS MANY BABIES BORN EACH YEAR 1 MILLION + VICTIMS PER DAY ENOUGH TO FILL WEMBLEY STADIUM (ENGLAND) MORE THAN 10 TIMES 12 VICTIMS PER SECOND SEE EXTRAPOLATION CALCULATIONS *
  • 11. THE SCALE OF CONSUMER CYBERCRIME 50% OF ONLINE ADULTS HAVE BEEN VICTIMS OF CYBERCRIME AND / OR NEGATIVE ONLINE SITUATIONS IN THE PAST YEAR (e.g., RECEIVED NUDE IMAGES FROM STRANGERS OR WERE BULLIED OR STALKED ONLINE) 41% OF ONLINE ADULTS HAVE FALLEN VICTIM TO ATTACKS SUCH AS MALWARE, VIRUSES, HACKING, SCAMS, FRAUD AND THEFT
  • 12. BLURRING BETWEEN WORK AND PLAY 49% 36% 30% USE THEIR PERSONAL DEVICE FOR WORK AND PLAY* SAY THEIR COMPANY HAS NO POLICY ON USE OF PERSONAL DEVICES FOR WORK* OF PARENTS LET THEIR KIDS PLAY, DOWNLOAD AND SHOP ON THEIR WORK DEVICE ** 49% 34% OF RESPONDENTS ACCESS ACCESS THEIR SOCIAL OR SEND PERSONAL EMAILS NETWORK THROUGH THROUGH THEIR WORK THEIR WORK DEVICE* DEVICE* 27% STORE PERSONAL INFORMATION ON THEIR WORK DEVICE* *AMONG WORKING ADULTS **AMONG PARENTS WHO USE DEVICES PROVIDED BY THEIR EMPLOYER
  • 13. ONLINE FILE STORAGE OPENS DOOR TO OVERSHARING 24% OF USERS SAVE BOTH WORK AND PERSONAL DOCUMENTS TO THE SAME ONLINE FILE STORAGE ACCOUNT ON SHARING WORK-RELATED INFORMATION THROUGH ONLINE FILE STORAGE SITES: 18% SHARE WITH FRIENDS 21% SHARE WITH FAMILY PUTTING BOTH WORK AND PERSONAL DOCUMENTS AT RISK
  • 14. RISKY BEHAVIOR ON SOCIAL MEDIA ? LOG OUT **** ? ? 39% 1/4 31% OF SOCIAL MEDIA USERS DON’T LOG OUT AFTER EACH SESSION OF SOCIAL MEDIA USERS SHARE THEIR SOCIAL MEDIA PASSWORDS WITH OTHERS OF SOCIAL MEDIA USERS CONNECT WITH PEOPLE THEY DO NOT KNOW 12% OF SOCIAL MEDIA USERS SAY SOMEONE HAS HACKED INTO THEIR SOCIAL NETWORK ACCOUNT AND PRETENDED TO BE THEM
  • 15. MOBILE AND SOCIAL STRESSORS 49% OF MOBILE DEVICE USERS WOULD FEEL UPSET/CONCERNED IF THEY LEFT HOME WITHOUT THEIR MOBILE DEVICE 6/10 OF MOBILE DEVICE USERS GET ANNOYED BY OTHERS CHECKING THEIR MOBILES DURING A MEAL 1/4 OF MOBILE DEVICE USERS CHECK THEIR MOBILES WHILE SHARING A MEAL WITH OTHERS 25% OF SOCIAL NETWORK USERS CHECK THEIR SOCIAL NETWORK WITHIN 15 MINUTES OF WAKING UP
  • 16. CONSUMERS PICK CONVENIENCE OVER SAFETY 1/3 62% ADMIT THE CONVENIENCE OF CONSTANTLY CONNECTED OUTWEIGHED ANY POTENTIAL SECURITY RISKS AGREE THERE IS NO SUCH THING AS ‘ONLINE PRI ACY’ IN TODAY’S WORLD EVEN THOUGH… 46% 7/10 WISH THEY COULD PERMANENTLY DELETE SOME OF THEIR PERSONAL ONLINE CONTENT COMPLETELY DON’T PUT ANYTHING ON SOCIAL NETWORKS THAT THEY WOULDN’T WANT THEIR PARENTS / KIDS TO SEE
  • 17. CONCLUSION 50% OF ONLINE ADULTS HAVE BEEN VICTIMS OF CYBERCRIME AND / OR NEGATIVE ONLINE SITUATIONS IN THE PAST YEAR 1M+ ADULTS BECOME CYBERCRIME VICTIMS EVERY DAY THAT’S 12 VICTIMS PER SECOND $113 BILLION TOTAL DIRECT GLOBAL COSTS IN JUST 12 MONTHS CONSUMERS MOVE TO MOBILE DEVICES BUT LEAVE PROTECTION BEHIND CONSUMERS ARE INCREASINGLY USING MOBILE DEVICES AND TABLET DEVICES BUT ARE NOT PROTECTING THEMSELVES. WHILE DESKTOP PROTECTION IS HIGH AMONG CONSUMERS, THE CYBERCRIMINAL IS MOVING TO MOBILE AND TABLET DEVICES WHERE CONSUMERS ARE VULNERABLE. MOBILE DEVICE ADOPTION CONTINUES TO GROW, SUGGESTING A DEGREE OF MOBILE DEPENDENCE, WHICH WILL INCREASE OPPORTUNITIES FOR CYBERCRIMINALS TO STRIKE. BLURRING BETWEEN WORK AND PERSONAL MOBILE DEVICE USAGE AS PERSONAL MOBILE DEVICES ARE BEING USED MORE AND MORE FOR WORK-RELATED ACTIVITIES, CONSUMERS’ LIFESTYLES ARE PUTTING BUSINESS ENVIRONMENTS AT RISK. AN ALARMING NUMBER OF BUSINESSES HAVE NO POLICIES IN PLACE. FOR THOSE WHO DO, OUR RESEARCH SUGGESTS THE POLICIES ARE OFTEN NOT RESPECTED BY THEIR EMPLOYEES. CONSUMERS PICK CONVENIENCE OVER SAFETY MANY CONSUMERS ARE MAKING A CONSCIOUS DECISION TO TRADE THEIR SAFETY FOR CONVENIENCE; MANY MORE ARE UNAWARE THAT THEY’RE MAKING THE SAME TRADE. BUT, “CONSTANTLY CONNECTED” DOESN’T HAVE TO EQUAL “CONSTANTLY AT RISK” ALL AMOUNTS IN USD
  • 18. TOP TIPS DEFEND YOUR DATA A COMPREHENSIVE SECURITY SUITE PROVIDES A STRONG DEFENSE AGAINST ONLINE THREATS. NORTON 360 MULTI-DEVICE OFFERS PROTECTION FOR PCS, SMARTPHONES AND TABLETS, IN A SINGLE SOLUTION THINK OF MOBILE DEVICES AS MINI-COMPUTERS MOBILE IS THE FASTEST-GROWING TARGET FOR CYBERCRIMINALS. MAKE SURE YOUR MOBILE DEVICE REQUIRES A PASSWORD, AND TAKE PRECAUTIONS TO ENSURE YOUR DEVICE IS PROTECTED AGAINST THEFT, LOSS AND CYBERCRIME BE CAUTIOUS IN THE CLOUD WHILE CLOUD STORAGE SOLUTIONS MAKE IT EASY TO SAVE AND SHARE FILES, THEY ALSO OPEN OTHER AVENUES FOR ATTACK. BE CAREFUL ABOUT WHO HAS ACCESS TO YOUR FILES, AND USE A SOLUTION WITH BUILT-IN SECURITY IF POSSIBLE SAVE SENSITIVE TRANSACTIONS FOR SECURE CONNECTIONS FREE OR UNSECURED WI-FI NETWORKS CAN MAKE IT EASY FOR THIEVES TO EAVESDROP ON YOUR ACTIVITY. AVOID DOING ANY SENSITIVE TRANSACTIONS LIKE BANKING OR SHOPPING WHILE CONNECTED TO THESE NETWORKS, OR USE A PERSONAL VPN CLIENT AFTER YOU CONNECT, DOUBLE CHECK CHECK CREDIT CARD AND BANK STATEMENTS REGULARLY FOR FRAUDULENT TRANSACTIONS, AND REPORT ANY SUSPICIOUS ACTIVITY TO YOUR PROVIDER AND/OR LAW ENFORCEMENT
  • 22. POTENTIALLY RISKY BEHAVIOR ON UNSECURED WI-FI 56% ACCESS 54% ACCESS THEIR SOCIAL NETWORK ACCOUNT PERSONAL E-MAIL 29% ACCESS 29% SHOP ONLINE THEIR BANK ACCOUNT 3/10 DO NOT NEEDS WORK! 39% DO NOT TAKE ALWAYS LOG OFF AFTER HAVING USED A PUBLIC WI-FI CONNECTION ANY SPECIAL STEPS TO PROTECT THEMSELVES WHEN USING PUBLIC WI-FI *AMONG FREE/UNSECURED WI-FI USERS
  • 23. BLURRING LINES BETWEEN FRIENDS AND ENEMIES 1/10 HA E ACCESSED THEIR PARTNER/FRIEND’S ACCOUNTS WITHOUT PERMISSION 41% 26% 18% DID IT BECAUSE THEY WERE CURIOUS* WERE GOOFING AROUND / PLAYING A JOKE* DIDN’T TRUST THEIR PARTNER / FRIEND TO BE HONEST ON THEIR OWN* *AMONG THOSE WHO HAVE ACCESSED PARTNER/FRIEND'S EMAIL/ SOCIAL MEDIA
  • 25. THE METHODOLOGY DETAIL EDELMAN BERLAND CONDUCTED AN ONLINE SURVEY AMONG CONSUMERS: 13,022 ADULTS AGED 18-64 YEARS The survey was conducted in 24 countries (Australia, Brazil, Canada, China, Colombia, France, Denmark, Germany, India, Italy, Japan, Mexico, Netherlands, New Zealand, Poland, Russia, Saudi Arabia, Singapore, South Africa, Sweden, Turkey, United Arab Emirates, United Kingdom and United States). The survey was conducted in the primary language of each country, and questions asked were identical across all countries. Interviews were conducted between 4th July 2013 – 1st August 2013. The margin of error for the total sample of adults (n=13,022) is + 0.9% at the 95% level of confidence. Important notes: The Norton Cybercrime Report is an annual report commissioned by Norton by Symantec aimed at understanding how cybercrime affects consumers and how the adoption and evolution of new technologies impacts consumers’ security. The research was conducted by Edelman Berland, an international research agency. Findings are based on self-reported experiences of over 13,000 adults across 24 countries. 1000 adult respondents were interviewed in each of USA and India. The global data has been weighted to ensure all countries have equal representation of n=500 adults. Additional notes: Developed Markets: USA, Canada, UK, France, Germany, Italy, Sweden, Netherlan ds, Australia, Japan, Singapore, New Zealand, Denmark Emerging Markets: Brazil, Mexico, Poland, India, China, Russia, Turkey, Saudi Arabia, UAE, Colombia, South Africa Millennials: aged 18-34 Boomers: aged 45-64
  • 26. DEFINITION OF CYBERCRIME Cybercrime is defined as any of the following activities: • Computer viruses or malicious software appeared on my computer • I responded to a forged, ‘spoofed’ or fake email or website which captured my personal details such as passwords, credit card numbers, or bank account information thinking it was a legitimate request in order to access information or provide information to a legitimate organization, such as my bank, etc. • Someone has hacked into my email account and pretended to be me • Someone has hacked into my social networking profile and pretended to be me • I responded to an online scam • I experienced online credit card fraud • I experienced identity theft • My phone was infected and a text message was sent from my mobile phone without my permission or knowledge that I later had to pay for • My screen was locked and an alert was shown, which told me to pay a fine to get it unlocked • My smartphone was lost or stolen and someone found it and used it without my permission • An app appeared on my smartphone that I didn’t download • I’ve had someone purporting to be from a computer company call me to inform that I have an infected computer • I experienced another type of cybercrime on my cell / mobile phone / tablet device • I experienced another type of cybercrime on my desktop or laptop computer
  • 27. DEFINITION OF CYBERCRIME Cybercrime and /or negative online experience is defined as any of the following activities: • Computer viruses or malicious software appeared on my computer • I responded to a forged, ‘spoofed’ or fake email or website which captured my personal details such as passwords, credit card numbers, or bank account information thinking it was a legitimate request in order to access information or provide information to a legitimate organization, such as my bank, etc. • Someone has hacked into my email account and pretended to be me • Someone has hacked into my social networking profile and pretended to be me • I responded to an online scam • I experienced online credit card fraud • I experienced identity theft • My phone was infected and a text message was sent from my mobile phone without my permission or knowledge that I later had to pay for • My screen was locked and an alert was shown, which told me to pay a fine to get it unlocked • My smartphone was lost or stolen and someone found it and used it without my permission • An app appeared on my smartphone that I didn’t download • I’ve had someone purporting to be from a computer company call me to inform that I have an infected computer • I experienced another type of cybercrime on my cell / mobile phone / tablet device • I experienced another type of cybercrime on my desktop or laptop computer • I experienced someone posting private/intimate photos or videos of me without my permission • I was approached online by someone in an unwanted sexual way • I have experienced online bullying, online stalking, online hate crime or other forms of online harassment • I have received SMS text messages from people I do not know, requesting me to click on an embedded link or stating that I have received a voicemail and need to dial a number which is not my voicemail to retrieve it • I have received unwanted nude images of someone I don’t know • I have received unwanted nude images of someone I do know
  • 28. EXTRAPOLATIONS CALCULATIONS 1) Nearly 380 million victims in 24 countries over past 12 months Online adults per country x % cybercrime victims past 12 months per country = 377,943,431 (sum of 24 countries). 2) 12 cybercrime victims every second / 719 cybercrime victims every minute / 43,144 per hour / more than 1 million per day impacting almost 378 million adults in the past year in 24 countries* Victims over past 12 months (as above) 377,943,431 / 365 days per year / 24 hours / 60 minutes / 60 seconds 3) Cybercrime is big business costing $113 billion in the last year in 24 countries Victims over past 12 months (per country) x average financial cost of cybercrime (per country in US currency). Figure shown in the sum of all countries total cost.