Discover the hard facts and real risks of identity theft from Javelin Strategy & Research. Here we share the 2012 Identity Fraud Report findings that reveal the new fraud frontier of social media and mobile—and why even the most sophisticated technology users are vulnerable. See how individuals and businesses can protect personal information from identity theft while interacting online, and learn more at http://www.LifeLockBusinessSolutions.com.
2. More
Connected
and Mobile
Than Ever
Mobile devices are rapidly
overtaking PCs, and companies
are embracing “BYOD.”
Sources:
CTIA. "Semi-annual survey." October 2011. Retrieved from http://www.ctia.org/media/press/body.cfm/prid/2133
Pew Research Center. "Americans and Their Cell Phones." August 2011. Retrieved
from http://www.pewinternet.org/~/media//Files/Reports/2011/Cell%20Phones%202011.pdf
Figure of 142 million rounded down to the nearest whole number. Calculation based on CTIA Wireless Association figure of 322.9 million mobile devices in
use in the United States (2011), multiplied by .44, or 44%—the percentage of mobile device owners accessing the Internet according to a Pew Research
Center study.
3. Consumers
By 2015, more people will access the Internet from mobile
devices than from desktop computers.
Source: Morgan Stanley Research (2010), Internet Trends
http://www.morganstanley.com/institutional/techresearch/pdfs/Internet_Trends_041210.pdf
4. Enterprise
67% of surveyed companies expect either to purchase tablets or
provide support for employee-owned tablets.
Source: Morgan Stanley Research (2011), Tablet Demand and Disruption: Mobile Users Come of Age
http://www.morganstanley.com/views/perspectives/tablets_demand.pdf
5. Good News for Business
Mobile devices enable knowledge workers to take care of
business from virtually anywhere, at any time.
6. What’s the Catch?
Mobile, social media-savvy employees and customers may
be more likely to become identity fraud victims.
7. What Puts Users at Risk?
Even sophisticated ecommerce and social media users
are at higher risk.
Source: Javelin Strategy &Research, 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier.
* The higher incidence of fraud among these users can be a factor of demographic composition or social network behavior.
8. What Puts Users at Risk?
“People are adopting new
methods of interacting [online]
faster than we can educate them
on safe behavior.”
- James Van Dyke, President and Founder of Javelin Strategy & Research
9. What Puts Users at Risk?
“The more information you
share, and the more you
transact, the more you’re at risk.
One is simply a function of the
other.”
- James Van Dyke, President and Founder of Javelin Strategy & Research
10. Security Breaches
Becoming More Common
Sony PlayStation Network LinkedIn
› 70 million user accounts › Approx. 6,500,000
compromised. encrypted passwords
stolen and posted online.
› Thieves accessed birth
dates, emailaddresses, home
addresses and login credentials.
Sources: Hoffman, Stephanie (2011), Sony Warns Of Identity Theft Following PlayStation Hack
http://www.crn.com/news/security/229402376/sony-warns-of-identity-theft-following-playstation-hack.htm
LinkedIn press release http://press.linkedin.com/node/1212
11. What are the Costs?
In 2011…
› 11.6 million adults were victims of identity fraud.
› Identity fraud cost Americans $18 billion.
› Victims lost an average of $1,513 to identity fraud.
› Victims spent an average of $354 to resolve their cases.
Source: Javelin Strategy &Research, 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier
12. What Can You Do?
Consumers
› Be cautious about revealing personal information on
social media sites.
› Take advantage of privacy settings.
› Shop on secure sites with URLs preceded by “https.”
› Don’t share personal information while using public Wi-Fi.
13. What Can You Do?
Employers
› Offer identity fraud protection as an employee benefit.
› Educate employees about security best practices.
› Offer support for user-supplied mobile devices.
14. Protection as a Service
Identity theft protection services are a valuable
benefit for all types of businesses.
› Proactive alerts: Notifies clients when personal information
is being used to apply for utilities, credit cards and loans.
› Remediation: Helps victims recover if identity fraud occurs.
15. What to Look for in Identity
Theft Protection Services:
› Does the service cover identity theft and/or identity fraud?
› Is there an online portal or other simple way to track activity?
› If identity theft or fraud occurs, does the company offer
remediation or do they just notify me—and then I have to take
care of the issue?
› What are the hours of operation, and if they aren’t 24/7, what
happens if something occurs after hours?
› How easy is it for my employees or members to enroll?
16. A Virtual Necessity
for Your Business
By offering identity theft protection, you can:
› Build stronger relationships with employees, customers and
members.
› Ensure secure productivity for your workforce.
› Develop new business and revenue opportunities.
Visit LifeLockBusiness.com or call 1-800-LifeLock to learn how.