SlideShare une entreprise Scribd logo
1  sur  16
Combating Identity Fraud
I   N   A   V   I   R   T   U   A   L   W   O   R   L   D
More
Connected
and Mobile
Than Ever
Mobile devices are rapidly
overtaking PCs, and companies
are embracing “BYOD.”




Sources:
CTIA. "Semi-annual survey." October 2011. Retrieved from http://www.ctia.org/media/press/body.cfm/prid/2133
Pew Research Center. "Americans and Their Cell Phones." August 2011. Retrieved
from http://www.pewinternet.org/~/media//Files/Reports/2011/Cell%20Phones%202011.pdf
Figure of 142 million rounded down to the nearest whole number. Calculation based on CTIA Wireless Association figure of 322.9 million mobile devices in
use in the United States (2011), multiplied by .44, or 44%—the percentage of mobile device owners accessing the Internet according to a Pew Research
Center study.
Consumers
By 2015, more people will access the Internet from mobile
devices than from desktop computers.
Source: Morgan Stanley Research (2010), Internet Trends
http://www.morganstanley.com/institutional/techresearch/pdfs/Internet_Trends_041210.pdf
Enterprise
67% of surveyed companies expect either to purchase tablets or
provide support for employee-owned tablets.
Source: Morgan Stanley Research (2011), Tablet Demand and Disruption: Mobile Users Come of Age
http://www.morganstanley.com/views/perspectives/tablets_demand.pdf
Good News for Business
Mobile devices enable knowledge workers to take care of
business from virtually anywhere, at any time.
What’s the Catch?
Mobile, social media-savvy employees and customers may
be more likely to become identity fraud victims.
What Puts Users at Risk?




Even sophisticated ecommerce and social media users
are at higher risk.
Source: Javelin Strategy &Research, 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier.
* The higher incidence of fraud among these users can be a factor of demographic composition or social network behavior.
What Puts Users at Risk?

“People are adopting new
methods of interacting [online]
faster than we can educate them
on safe behavior.”
- James Van Dyke, President and Founder of Javelin Strategy & Research
What Puts Users at Risk?

“The more information you
share, and the more you
transact, the more you’re at risk.
One is simply a function of the
other.”
- James Van Dyke, President and Founder of Javelin Strategy & Research
Security Breaches
Becoming More Common
Sony PlayStation Network                                                            LinkedIn
›     70 million user accounts                                                      ›       Approx. 6,500,000
      compromised.                                                                          encrypted passwords
                                                                                            stolen and posted online.
› Thieves accessed birth
      dates, emailaddresses, home
      addresses and login credentials.




    Sources: Hoffman, Stephanie (2011), Sony Warns Of Identity Theft Following PlayStation Hack
    http://www.crn.com/news/security/229402376/sony-warns-of-identity-theft-following-playstation-hack.htm
    LinkedIn press release http://press.linkedin.com/node/1212
What are the Costs?
In 2011…
› 11.6 million adults were victims of identity fraud.

› Identity fraud cost Americans $18 billion.

› Victims lost an average of $1,513 to identity fraud.

› Victims spent an average of $354 to resolve their cases.




 Source: Javelin Strategy &Research, 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier
What Can You Do?
Consumers
› Be cautious about revealing personal information on
  social media sites.

› Take advantage of privacy settings.

› Shop on secure sites with URLs preceded by “https.”

› Don’t share personal information while using public Wi-Fi.
What Can You Do?
Employers
› Offer identity fraud protection as an employee benefit.

› Educate employees about security best practices.

› Offer support for user-supplied mobile devices.
Protection as a Service
Identity theft protection services are a valuable
benefit for all types of businesses.
› Proactive alerts: Notifies clients when personal information
  is being used to apply for utilities, credit cards and loans.

› Remediation: Helps victims recover if identity fraud occurs.
What to Look for in Identity
Theft Protection Services:
› Does the service cover identity theft and/or identity fraud?

› Is there an online portal or other simple way to track activity?

› If identity theft or fraud occurs, does the company offer
  remediation or do they just notify me—and then I have to take
  care of the issue?

› What are the hours of operation, and if they aren’t 24/7, what
  happens if something occurs after hours?

› How easy is it for my employees or members to enroll?
A Virtual Necessity
for Your Business
By offering identity theft protection, you can:
› Build stronger relationships with employees, customers and
  members.

› Ensure secure productivity for your workforce.

› Develop new business and revenue opportunities.

Visit LifeLockBusiness.com or call 1-800-LifeLock to learn how.

Contenu connexe

Tendances

Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Gary Kazmer
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Echoworx
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
Hybrid intrusion detection systems (hids) using fuzzy logic
Hybrid intrusion detection systems (hids) using fuzzy logicHybrid intrusion detection systems (hids) using fuzzy logic
Hybrid intrusion detection systems (hids) using fuzzy logicShakas Technologies
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...Declan Winston Ramsaran
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015Nicole Black
 
Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?IBM Security
 

Tendances (20)

Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
Digital Identities
Digital IdentitiesDigital Identities
Digital Identities
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
Hybrid intrusion detection systems (hids) using fuzzy logic
Hybrid intrusion detection systems (hids) using fuzzy logicHybrid intrusion detection systems (hids) using fuzzy logic
Hybrid intrusion detection systems (hids) using fuzzy logic
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Hacking back in self defense
Hacking back in self defenseHacking back in self defense
Hacking back in self defense
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015
 
Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 

Similaire à LifeLock Javelin Presentation

Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG UpdateIan Glazer
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftMartha Brown
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcRay Brannon
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYgailmowal
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & ThievesLorena Magee
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devicesJ A Bhavsar
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerHubert Moik
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online DatingMobiDigger
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 

Similaire à LifeLock Javelin Presentation (19)

Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG Update
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by Mobidigger
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online Dating
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 

Dernier

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Dernier (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

LifeLock Javelin Presentation

  • 1. Combating Identity Fraud I N A V I R T U A L W O R L D
  • 2. More Connected and Mobile Than Ever Mobile devices are rapidly overtaking PCs, and companies are embracing “BYOD.” Sources: CTIA. "Semi-annual survey." October 2011. Retrieved from http://www.ctia.org/media/press/body.cfm/prid/2133 Pew Research Center. "Americans and Their Cell Phones." August 2011. Retrieved from http://www.pewinternet.org/~/media//Files/Reports/2011/Cell%20Phones%202011.pdf Figure of 142 million rounded down to the nearest whole number. Calculation based on CTIA Wireless Association figure of 322.9 million mobile devices in use in the United States (2011), multiplied by .44, or 44%—the percentage of mobile device owners accessing the Internet according to a Pew Research Center study.
  • 3. Consumers By 2015, more people will access the Internet from mobile devices than from desktop computers. Source: Morgan Stanley Research (2010), Internet Trends http://www.morganstanley.com/institutional/techresearch/pdfs/Internet_Trends_041210.pdf
  • 4. Enterprise 67% of surveyed companies expect either to purchase tablets or provide support for employee-owned tablets. Source: Morgan Stanley Research (2011), Tablet Demand and Disruption: Mobile Users Come of Age http://www.morganstanley.com/views/perspectives/tablets_demand.pdf
  • 5. Good News for Business Mobile devices enable knowledge workers to take care of business from virtually anywhere, at any time.
  • 6. What’s the Catch? Mobile, social media-savvy employees and customers may be more likely to become identity fraud victims.
  • 7. What Puts Users at Risk? Even sophisticated ecommerce and social media users are at higher risk. Source: Javelin Strategy &Research, 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier. * The higher incidence of fraud among these users can be a factor of demographic composition or social network behavior.
  • 8. What Puts Users at Risk? “People are adopting new methods of interacting [online] faster than we can educate them on safe behavior.” - James Van Dyke, President and Founder of Javelin Strategy & Research
  • 9. What Puts Users at Risk? “The more information you share, and the more you transact, the more you’re at risk. One is simply a function of the other.” - James Van Dyke, President and Founder of Javelin Strategy & Research
  • 10. Security Breaches Becoming More Common Sony PlayStation Network LinkedIn › 70 million user accounts › Approx. 6,500,000 compromised. encrypted passwords stolen and posted online. › Thieves accessed birth dates, emailaddresses, home addresses and login credentials. Sources: Hoffman, Stephanie (2011), Sony Warns Of Identity Theft Following PlayStation Hack http://www.crn.com/news/security/229402376/sony-warns-of-identity-theft-following-playstation-hack.htm LinkedIn press release http://press.linkedin.com/node/1212
  • 11. What are the Costs? In 2011… › 11.6 million adults were victims of identity fraud. › Identity fraud cost Americans $18 billion. › Victims lost an average of $1,513 to identity fraud. › Victims spent an average of $354 to resolve their cases. Source: Javelin Strategy &Research, 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier
  • 12. What Can You Do? Consumers › Be cautious about revealing personal information on social media sites. › Take advantage of privacy settings. › Shop on secure sites with URLs preceded by “https.” › Don’t share personal information while using public Wi-Fi.
  • 13. What Can You Do? Employers › Offer identity fraud protection as an employee benefit. › Educate employees about security best practices. › Offer support for user-supplied mobile devices.
  • 14. Protection as a Service Identity theft protection services are a valuable benefit for all types of businesses. › Proactive alerts: Notifies clients when personal information is being used to apply for utilities, credit cards and loans. › Remediation: Helps victims recover if identity fraud occurs.
  • 15. What to Look for in Identity Theft Protection Services: › Does the service cover identity theft and/or identity fraud? › Is there an online portal or other simple way to track activity? › If identity theft or fraud occurs, does the company offer remediation or do they just notify me—and then I have to take care of the issue? › What are the hours of operation, and if they aren’t 24/7, what happens if something occurs after hours? › How easy is it for my employees or members to enroll?
  • 16. A Virtual Necessity for Your Business By offering identity theft protection, you can: › Build stronger relationships with employees, customers and members. › Ensure secure productivity for your workforce. › Develop new business and revenue opportunities. Visit LifeLockBusiness.com or call 1-800-LifeLock to learn how.