SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
1 
DIGITAL SECURITY 
IS SERIOUS BUSINESS 
Updated 9/19/14
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
2 
DIGITAL SECURITY IS SERIOUS BUSINESS 
The number of publicly traded companies that listed security issues as a 
business risk in securities filings increased by 73% from 2012 to 2014.1 
The average cost of a breach is $200 per record, which amounts to an 
average of $5.9 million paid by organizations per breach.2
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
3 
DIGITAL SECURITY IS SERIOUS BUSINESS 
"Security has never been higher on the agenda of CEO's and 
Boards. This study shows that companies can generate additional 
revenue while closing security gaps from non-secure marketing 
technology on their secure pages.” 
Caroline Watteeuw, the former Global Chief Technology Officer 
and SVP of Business Information Solutions of Pepsico and an 
advisor to Ghostery, Inc.
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
4 
YOUR SITE IS SECURE FOR A REASON 
Blind spots in your site security expose your business to issues that directly impact the 
customer experience, hurting your company’s revenues and profits: 
Poor SEO: 
Decline in Google Rankings 
Security Threats: 
Man-In-The-Middle Attacks 
User Experience Issues: 
Mixed Content Warnings
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
5 
• You Might Not See The Security Gaps, But Your Customers Do. Consumers recognize and 
trust the security of a page with an address. Security warnings that result from non-secure 
marketing technology, commonly called “mixed content warnings” (for instance: 
and 
) shake customer confidence and thus your company’s revenues. This happens even 
if the browser blocks the non-secure technology from loading.4,5 
• Most Marketing Cloud Vendors Get To Your Site Indirectly. The technology of the “Marketing 
Cloud” — the collection of digital technologies that power, measure, socialize, and optimize 
performance — is controlled by a wide range of partner companies who have been granted 
access to your site. With so many ways for non-secure technology to end on your site it’s difficult 
to find the security gaps.3 
• Google Rankings Suffer When Your Pages Are Not Secure. Google now rewards secure pages 
with a higher search ranking. Not knowing if Google finds that your secure pages contain non-secure 
elements can lead to valuable rankings slipping away.6 
2 
SECURITY BLIND SPOTS ARE WIDESPREAD, 
HARD TO CONTROL AND COST YOUR COMPANY MONEY
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
6 
CONSUMERS LOSE CONFIDENCE WHEN 
YOUR SITE IS NOT SECURE 
“Consumers have been trained to instinctively trust a green “https” before 
the website address. Conversely a red “http” or any pop up that tells a 
user they are leaving the secure https address is not trusted and thus 
consumers will shy away. 
The result is consumers will register, often subconsciously, that the 
original site is unsecure and thus poses a threat. It is these subtleties in 
the user experience that increase or decrease page rankings and thus 
page views.” 
EJ Hilbert - Head of the Cyber Practice for Kroll EMEA. Hilbert is a former 
FBI Special Agent and former Director of Security Enforcement for 
MySpace/Fox Interactive Media
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
7 
YOUR SITE IS SECURE FOR A REASON 
"Ensuring that websites have better transparency into the causes of 
browser warnings will both improve the online user experience and 
increase overall internet security. False SSL warnings caused by 
SSL misconfigurations result in a negative user experience, with websites 
standing to lose up to 65% of their visitors due to a false SSL warning.” 
Devdatta Akhawe, PhD, co-author of 'Alice in Warningland: A Large- 
Scale Field Study of Browser Security Warning Effectiveness'.
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
8 
SECURITY BLIND SPOTS 
"Our 2013 study showed that the issue of non-secure scripts on secure 
pages exposed millions of web users to the stealing of cookies and the 
injection of malicious javascript. This study goes many steps further due 
to the depth of the real-user data from the 20+ million member 
GhostRank community to illustrate that the prevalence of non-secure 
scripts is even higher on the most popular websites.” 
Nick Nikiforakis, Assistant Professor of Computer Science, Stony Brook 
University and co-author of “A Dangerous Mix: Large-Scale Analysis of 
Mixed Content Websites”
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
9 
ABOUT THE STUDY 
This study examines instances of non-secure digital technologies firing on secure 
pages across 50 companies in the Airline, Financial Services, Insurance, News 
Publishing and Retail industries. The data was captured from Ghostrank’s 20 
million real-user community members between July 14 2014 and August 14 2014 
and includes both active and passive content.
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
10 
SITES STUDIED 
AIRLINE 
FINANCE 
INSURANCE 
NEWS PUBLISHING 
RETAIL 
Airtran 
Bank of America 
AIG 
Daily Mail 
Amazon 
Alaska Air 
Capital One 
Allstate 
Financial Times 
Costco 
American 
Chase 
Farmers 
LA Times 
eBay 
Delta 
Citi 
Geico 
Le Figaro 
Etsy 
JetBlue 
Mellon 
Nationwide 
NY Times 
Overstock 
Hawaiian Air 
HSBC 
Liberty Mutual 
NY Daily News 
Kohls 
Southwest 
PNC 
Progressive 
Telegraaf 
QVC 
United 
TD 
The Hartford 
The Guardian 
Sears 
US Air 
State Street 
Travelers 
USA Today 
Target 
Virgin America 
Wells Fargo 
USAA 
WSJ 
Walmart
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
11 
100% of Insurance Websites 
100% of Retail Websites 
100% of Airline Websites 
90% of Financial Services Websites 
90% of News Publishing Websites 
1 
KEY FINDING: 
96 PERCENT OF WEBSITES HAVE SECURITY BLINDSPOTS
EVERY INDUSTRY GROUP STUDIED HAD NON-SECURE 
TECHNOLOGIES THAT IMPACT THE USER EXPERIENCE AND REVENUE 
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
12 
5 
Industry 
Percent of Websites 
with Non-Secure 
Technologies on Secure 
Pages 
Distinct Non-Secure 
Technologies 
Highest Number of Non- 
Secure Technologies 
Seen on a Website 
Average Non-Secure 
Technologies on Secure 
Pages Seen on a 
Website 
Airline 
100% 
223 
112 
53 
Finance 
90% 
382 
234 
115 
Insurance 
100% 
165 
139 
25 
News Publishing 
90% 
212 
100 
47 
Retail 
100% 
438 
333 
109
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
13 
RETAIL WEBSITES STUDIED HAD THE HIGHEST NUMBER 
OF NON-SECURE TECHNOLOGIES OVERALL 
Of the industries surveyed, Retail websites had the highest total number of 
non-secure technologies found. 
Ghostery saw 438 non-secure technologies across the 10 Retail websites studied. 
The highest individual website in the study was in the Retail category and had 333 
non-secure technologies.
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
14 
FINANCIAL SERVICES WEBSITES COMPRISED 
HALF OF THE TEN WEBSITES WITH THE HIGHEST 
INSTANCES OF NON-SECURE TECHNOLOGIES 
5/10 
Financial Services websites have significant security technology 
in place on their pages, yet 90% studied had non-secure 
technologies on their secure pages.
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
15 
THE TEN WEBSITES WITH THE MOST NON-SECURE TECHNOLOGIES IN THE 
STUDY COVER MANY SECTORS – FINANCE BEING THE MOST AT RISK 
Industry 
Number of Websites in 
the Highest Ten 
Finance 
5 
Retail 
3 
Airline 
1 
Insurance 
1 
News Publishing 
0
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
16 
CONCLUSION: WIDESPREAD CUSTOMER EXPERIENCE AND 
REVENUE RISKS FROM NON-SECURE MARKETING TECHNOLOGIES 
• Non-secure technologies on secure pages can decrease ROI by: 
– Causing mixed content warnings that increase consumer perception of risk on the page, even if the 
browser is blocking the non-secure 
– Creating potential for man-in-the-middle attacks 
– Decreasing Google search rankings 
• 96 Percent of websites studied had non-secure technologies on secure pages 
• Retail websites studied had the highest volume of non-secure technologies on 
secure pages 
• The website with the highest number of non-secure technologies was a Retail 
site with 333 
• Financial Services websites made up half of the 10 highest instances of non-secure 
technologies in the study
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
17 
ABOUT GHOSTERY 
Ghostery is a technology company that empowers consumers and businesses expose and eliminate the digital blindspots in the 
Marketing Cloud - the collection of digital technologies that power, measure, socialize, and optimize performance. Over 40 million 
people globally rely on the free Ghostery browser extension to see and control the tracking technologies that follow them across 
the web. Businesses rely on Ghostery Marketing Cloud Management to drive ROI by maximizing the security, performance, and 
profitability of their digital assets. Key clients like Equifax, Intercontinental Hotels Group and Procter & Gamble depend on 
Ghostery to take their digital business from chaos to control. Ghostery also is the leading global provider of privacy governance 
services, powering compliance for more than $2 billion of advertising and e-commerce transactions annually. Founded in 2009, 
Ghostery is headquartered in New York City with a technology office in Salt Lake City and sales offices in London and San 
Francisco. The company is backed by Warburg Pincus, LLC, the global private equity fund. 
Learn more at GhosteryEnterprise.com and @ghosteryinc.
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
18 
GLOSSARY 
• Digital marketing technology or digital marketing vendor: Ghostery defines a “digital marketing 
technology” as code within a webpage or called by another technology (i.e. piggyback tag or third-party 
tag) which communicates with a server, transfers data, and has been identified by Ghostery as 
participating in advertising and marketing activities such as ad targeting, analytics, social media and ad 
serving. Digital marketing technologies can be images, objects, documents, iframes, or scripts. See: 
http://www.ghosteryenterprise.com/company-database/ 
• Non-secure digital marketing technologies: Ghostery defines a “non-secure digital marketing 
technology” as an http t (see above) that is called from an https url. 
• Website: Ghostery defines a “Website” as a site’s top level server such as site.com or school.edu. 
• Secure web page: A secure web page is an http web page that uses an added security layer and is 
denoted by “https.” The security layer is usually an SSL (secure socket layer,) a commonly-used protocol 
for managing the security of a message transmission on the Internet; it uses a program layer located 
between the Internet's HTTP and TCP program layers. http://en.wikipedia.org/wiki/HTTP_Secure
GLOSSARY (cont.) 
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
19 
• Man-in-the-Middle attack: A Man-in-the-Middle attack is a type of cyber attack where a malicious 
actor inserts him/herself into a conversation between two parties, impersonates both parties and gains 
access to information that the two parties were trying to send to each other. A Man-in-the-Middle Attack 
allows a malicious actor to intercept, send, and receive data meant for someone else, or not meant to 
be sent at all, without either outside party knowing until it is too late. http://en.wikipedia.org/wiki/ 
HTTP_Secure 
• Mixed content: “Mixed content” is a term to describe a web page that contains both secure and non-secure 
content elements (images, scripts, etc.) Mixed content jeopardizes the security of the entire 
page, and causes browsers to warn site visitors and attempt to block the non-secure content. See: 
http://www.troyhunt.com/2013/06/understanding-risk-of-mixed-content.html
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
20 
REFERENCES 
1 “Corporate Boards Race to Shore Up Cyber Security” (The Wall Street Journal June 29, 2014) 
2 “2014 Cost of Data Breach Security US” (IBM 2014) 
3 “Global Tracker Report” (Evidon February 2013) 
4 “Crying Wolf: An Empirical Study of SSL Warning Effectiveness” (Carnegie Mellon 2009) 
5 “A Dangerous Mix: Large-scale analysis of mixed-content websites (Chen et al. 2013) 
6 “HTTPS As a Ranking Signal” (Google blog August 6, 2014)
FOR MORE 
INFORMATION: 
sales@ghostery.com 
@ghosteryinc 
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved.
21
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
22 
APPENDIX A: 
Study Breakdown By Industry Type 
Industry 
Percent of Websites With 
Non-Secure Technologies 
Found 
No Non-Secure 
Technologies Found 
Airline 
100% 
Financial Services 
90% 
State Street 
Insurance 
100% 
News Publishing 
90% 
Telegraaf 
Retail 
100%
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
23 
APPENDIX B: 
Distinct Non-Secure Technologies Found Per Industry in Study 
Industry 
Non-Secure 
Technologies 
Min 
Max 
Average 
Airline 
223 
1 
112 
53 
Financial Services 
382 
2 
234 
115 
Insurance 
165 
2 
139 
25 
News Publishing 
212 
2 
100 
47 
Retail 
438 
20 
333 
109
APPENDIX C: 
Non-Secure Technologies Loaded Per 1000 Calls on Secure Pages Loaded 
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
Industry 
Non-Secure Calls Per 1000 
on Secure Pages 
Website With Highest Non- 
Secure Calls Per 1000 on 
Secure Pages 
Highest Number of Non- 
Secure Calls Seen on a 
Website 
Airline 
1.9 
7.4 
3578 
Financial Services 
1.5 
51.7 
5518 
Insurance 
1.0 
9.6 
1665 
News Publishing 
1.4 
389.6 
5575 
Retail 
3.0 
43.6 
19820 
24
SAMPLE DATA: 
Allstate Non-Secure Technologies (Top 10) 
Website 
Digital Marketing Technology 
Number of Times Seen on Secure Pages 
Allstate.com 
geoPlugin 
29 
Allstate.com 
Google Adsense 
24 
Allstate.com 
Adcash 
15 
Allstate.com 
Omniture (Adobe Analytics) 
9 
Allstate.com 
Google Analytics 
6 
Allstate.com 
Mixpanel 
5 
Allstate.com 
ScoreCard Research Beacon 
4 
Allstate.com 
DoubleClick 
3 
Allstate.com 
ValueClick Media 
3 
Allstate.com 
Right Media 
2 
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
25 
*Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study
SAMPLE DATA: 
Hawaiian Air Non-Secure Technologies (Top 10) 
Website 
Digital Marketing Technology 
Number of Times Seen on Secure Pages 
HawaiianAir.com 
BridgeTrack 
37 
HawaiianAir.com 
Intermarkets 
7 
HawaiianAir.com 
Commission Junction 
3 
HawaiianAir.com 
DoubleClick 
3 
HawaiianAir.com 
Adap.tv 
1 
HawaiianAir.com 
Adobe Test & Target 
1 
HawaiianAir.com 
Adometry 
1 
HawaiianAir.com 
Adzerk 
1 
HawaiianAir.com 
Atlas 
1 
HawaiianAir.com 
Dotomi 
1 
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
26 
*Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study
SAMPLE DATA: 
Walmart Non-Secure Technologies (Top 10) 
Website 
Digital Marketing Technology 
Number of Times Seen on Secure Pages 
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
27 
Walmart.com 
*Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study 
DoubleClick Spotlight 
2498 
Walmart.com 
DoubleClick 
640 
Walmart.com 
Omniture (Adobe Analytics) 
634 
Walmart.com 
Criteo 
394 
Walmart.com 
DoubleClick Floodlight 
253 
Walmart.com 
Experian Marketing Services 
251 
Walmart.com 
AppNexus 
202 
Walmart.com 
MediaMath 
181 
Walmart.com 
TriggIt 
157 
Walmart.com 
Rocket Fuel 
123
SAMPLE DATA: 
Wells Fargo Non-Secure Technologies (Top 10) 
Website 
Digital Marketing Technology 
Number of Times Seen on Secure Pages 
Wellsfargo.com 
Google Analytics 
390 
Wellsfargo.com 
DoubleClick 
224 
Wellsfargo.com 
Twitter Badge 
195 
Wellsfargo.com 
Intermarkets 
152 
Wellsfargo.com 
Google Adsense 
125 
Wellsfargo.com 
Omniture (Adobe Analytics) 
122 
Wellsfargo.com 
ScoreCard Research Beacon 
105 
Wellsfargo.com 
Adcash 
86 
Wellsfargo.com 
Quantcast 
86 
Wellsfargo.com 
geoPlugin 
65 
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
28 
*Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study
SAMPLE DATA: 
Wall Street Journal Non-Secure Technologies (Top 10) 
Website 
Digital Marketing Technology 
Number of Times Seen on Secure Pages 
WSJ.com 
DoubleClick Spotlight 
134 
WSJ.com 
AppNexus 
86 
WSJ.com 
DoubleClick 
80 
WSJ.com 
MaxPoint Interactive 
62 
WSJ.com 
ValueClick Media 
47 
WSJ.com 
Resonate Networks 
43 
WSJ.com 
Livefyre 
39 
WSJ.com 
ChartBeat 
36 
WSJ.com 
Krux Digital 
33 
WSJ.com 
MediaMath 
29 
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
29 
*Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study
Company Secure 
Host Secure 
Path Tag Non-­‐Secure 
Tag 
URL 
Allstate myaccount.allstate.com /anon/login/login.aspx Omniture 
(Adobe 
Analytics) images.apple.com/metrics/scripts/s_code_h.js 
Allstate myaccount.allstate.com /secured/billing/paybill.aspx Adcash www.adcash.com/script/java.php?option=rotateur&r=247707 
Allstate myaccount.allstate.com /secured/home.aspx Right 
Media ads.yahoo.com/cms/v1?esig=1~d816e430d739f6042b0cff31022d2e86413f153e&Allstate purchase.allstate.com /auto/PersonalQuote.aspx Omniture 
(Adobe 
Analytics) allstate.122.2o7.net/b/ss/allstatedevelopment/1/H.21-­‐-­‐NS/Allstate termlife.allstate.com / Google 
Adsense pagead2.googlesyndication.com/pagead/gen_204?id=cyclops&Allstate email.allstate.com /owa/ Mixpanel api.mixpanel.com/track/?data=eyJldmVudCI6ICJFbWFpbCBPcGVuZWQiLCAicHJvcGVydGllcyI6IHsiRW1haWwgTmFtZSI6ICJTdWdnZXN0ZWQgQ29udGVudCAoV2Vla2x5KSBBd2Vzb21lIiwgInVAllstate email.allstate.com /vdesk/hangup.php3 ValueClick 
Media cdn.fastclick.net/js/adcodes/pubcode.min.js?sid=9991&media_Allstate myaccount.allstate.com /anon/login/login.aspx Xaxis oascentral.comcast.net/RealMedia/ads/adstream_jx.ads/Allstate webmail.allstate.com /owa/ Constant 
Contact r20.rs6.net/on.jsp?ca=c271e5bd-­‐d711-­‐4a30-­‐82c1-­‐0c83d0cdc0e4&Allstate drivewise.allstate.com /dw/drivewise/common/login NetSeer cmi.netseer.com/redirect?ex=27&t=16 
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
30 
Sample Data: Allstate Non-Secure Technologies 
(Raw Data) 
*Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study
Company Secure 
Host Secure 
Path Tag Non-­‐Secure 
Tag 
URL 
Hawaiian 
Air apps.hawaiianairlines.com/MyHawaiianMiles/MyTrips/MaBnraidggeeTTrirpa.cakspx ads.bridgetrack.com/a/i/?BT_CON=15&BT_PID=1657729&Hawaiian 
Air apps.hawaiianairlines.com/myhawaiianmiles/Login.aspx Intermarkets cdn.intermarkets.net/u/Intermarkets/AdFeedback/processAdFeedback.Hawaiian 
Air apps.hawaiianairlines.com/myhawaiianmiles/MyTrips/MaBnraigdegTerTirpa.ackspx ads.bridgetrack.com/a/i/?BT_CON=15&BT_PID=1657729&Hawaiian 
Air checkin.hawaiianairlines./cwomci/start Media 
Innovation 
Group b3.mookie1.com/2/LB/4459175926@x96? 
Hawaiian 
Air partners.hawaiianairlines/.pcoagmes/rewards/shopListing.aspAxdometry log.dmtry.com/138091/0/2973/109753508/57743978/56157/Hawaiian 
Air www.hawaiianairlines.co/mhawaiianmiles/pages/frequentA-­‐fdlyzeerr-­‐kmiles-­‐membership-­‐levestlsa.taics.paxdzerk.net/reddit/ads.html?sr=-­‐reddit.com,loggedin&Hawaiian 
Air apps.hawaiianairlines.com/myhawaiianmiles/Login.aspx Quantcast widget.quantcast.com/user/widgetImage?domain=drudgereport.Hawaiian 
Air checkin.hawaiianairlines./cwomci/start Atlas view.atdmt.com/jaction/HA_Special_Offers_Page 
Hawaiian 
Air fly.hawaiianairlines.com /reservations/1/FlightPrices.aspDxoubleClick www.googletagservices.com/tag/js/gpt.js 
Hawaiian 
Air fly.hawaiianairlines.com /reservations/1/FlightPrices.aspLxiveRail ad4.liverail.com/?LR_PUBLISHER_ID=1912&LR_SCHEMA=Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
31 
Sample Data: Hawaiian Air Non-Secure Technologies 
(Raw Data) 
*Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study
Company Secure 
Host Secure 
Path Tag Non-­‐Secure 
Tag 
URL 
Walmart affiliates.walmart.com / LinkShare merchant.linksynergy.com/fs/banners/2149/2149_10003964.Walmart corporate.walmart.com /privacy-­‐security/ MediaMath pixel.mathtag.com/event/js?mt_id=366527&mt_adid=116823&Walmart savingscatcher.walmart.c/odmashboard Gravity 
Insights i.api.grvcdn.com/personalization/fonts/SourceSansPro/sourcesanspro-­‐Walmart www.walmart.com /cart2/cart.do Adometry log.dmtry.com/873028/0/3687/75727622/56074393/635261/Walmart www2.walmart.com /wmflows/checkout DoubleClick 
Spotlight pubads.g.doubleclick.net/activity;dc_iu=/55875582/Walmart-­‐Walmart corporate.walmart.com /_submit/feedback MediaMath pixel.mathtag.com/event/js?mt_id=366527&mt_adid=116823&Walmart corporate.walmart.com /contact-­‐us/store-­‐corporate-­‐feeMdbeadciakMath pixel.mathtag.com/event/js?mt_id=366527&mt_adid=116823&Walmart survey.walmart.com /WMExp/Processor BrightRoll vast.bp3848655.btrll.com/vast/3848655?n=471386826&Walmart www.walmart.com /cart2/cart.do Omniture 
(Adobe 
Analytics) i2.walmartimages.com/webanalytics/omniture/s_code.js 
Walmart classrooms.walmart.com/lists/61-­‐Middle-­‐School-­‐SupplieEs-­‐xLpisetrian 
Marketing 
Services d.audienceiq.com/r/dd/id/L21rdC80NC9jaWQvMjQ4NDMzMDMvdC8yL2NhdC8yNTMwMTgwNA 
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
32 
Sample Data: Walmart Non-Secure Technologies 
(Raw Data) 
*Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study
Company Secure 
Host Secure 
Path Tag Non-­‐Secure 
Tag 
URL 
Wells 
Fargo billpay.wellsfargo.com /billpay/application/EBillFrameBlueKai tags.bkrtx.com/js/bk-­‐coretag.js 
Wells 
Fargo connect.secure.wellsfarg/op.caoymments/channel/viewTransfgeerCooPnlufgirimn www.geoplugin.net/json.gp?jsoncallback=fn 
Wells 
Fargo icomplete.wellsfargo.com/oas/status/details Intermarkets cdn.intermarkets.net/u/Intermarkets/AdFeedback/processAdFeedback.Wells 
Fargo oam.wellsfargo.com /oam/access/challengeRegistraTtiwonitSteetru 
BpaDdigspelay urls.api.twitter.com/1/urls/count.json?url=https://oam.wellsfargo.Wells 
Fargo online.wellsfargo.com /das/cgi-­‐bin/session.cgi Adcash www.adcash.com/script/java.php?option=rotateur&r=168413 
Wells 
Fargo online.wellsfargo.com /das/cgi-­‐bin/session.cgi Adknowledge cache.blogads.com/37323961/feed.js 
Wells 
Fargo online.wellsfargo.com /das/cgi-­‐bin/session.cgi Advertising.com o.aolcdn.com/ads/adsWrapper.js 
Wells 
Fargo online.wellsfargo.com /das/cgi-­‐bin/session.cgi Amazon 
Associates c.amazon-­‐adsystem.com/aax2/amzn_ads.js 
Wells 
Fargo wellsoffice.wellsfargo.com/ceoportal/signon/index.jsp Facebook 
Connect connect.facebook.net/en_US/all.js 
Wells 
Fargo www.wellsfargo.com / AppNexus ib.adnxs.com/tt?id=3341204&cb=DC766C8D720449822546403 
Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
33 
Sample Data: Wells Fargo Non-Secure Technologies 
(Raw Data) 
*Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study
Company Secure 
Host Secure 
Path Tag Non-­‐Secure 
Tag 
URL 
WSJ buy.wsj.com /offers/html/offerPrnUpPI.htmlMaxPoint 
Interactive mpp.mxptint.net/2/6657/?rnd=2093531899 
WSJ customercenter.wsj.com/public/view/login.html Adometry log.dmtry.com/132500/189/3491/1181/330/248925/0/0/WSJ customercenter.wsj.com/view/home.html ScoreCard 
Research 
Beacon b.scorecardresearch.com/b?c1=8&c2=6135404&c3=3000&WSJ id.wsj.com /access/509b1a086458232f6e00A0p0p0N2e/xlautsest/login_standalonibe..ahdtmnxls.com/seg?add=1578697&t=2 
WSJ id.wsj.com /access/509b1a086458232f6e00In0t0e0g2ra/lla 
Ateds 
St/clioegnicne_standalondet..hadtmsalfeprotected.com/dt?asId=76efb4d6-­‐0d21-­‐11e4-­‐97b0-­‐WSJ portfolio.wsj.com /auth/portfolio_login DoubleClick 
Spotlight ad.doubleclick.net/activity;src=1373310;type=rapta615;cat=WSJ portfolio.wsj.com /marketing Turn r.turn.com/r/beacon?b2=Wg7NDNqjfn8DHtWyTdw0hccfpHiLCI-­‐WSJ signin.wsj.com /login.asp DoubleClick cm.g.doubleclick.net/pixel?google_nid=bluekai&google_WSJ subscribe.wsj.com /hpupgrade Turn r.turn.com/r/beacon?b2=iVXhpQdP31vtxinJjuJkZrDXF3ErZ-­‐WSJ www.subscribe.wsj.com/hpheaderlink/ DoubleClick 
Spotlight ad.doubleclick.net/activity;src=4327673;met=1;v=1;pid=Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 
34 
Sample Data: Wall Street Journal Non-Secure 
Technologies (Raw Data) 
*Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study

Contenu connexe

Tendances

The Technology Horizon: Essential Technologies for Legal Marketers
The Technology Horizon: Essential Technologies for Legal MarketersThe Technology Horizon: Essential Technologies for Legal Marketers
The Technology Horizon: Essential Technologies for Legal MarketersAdam Stock
 
Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013Appinions
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise The Economist Media Businesses
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The Economist Media Businesses
 
Innovation in Insurance - necessity or luxury?
Innovation in Insurance - necessity or luxury?Innovation in Insurance - necessity or luxury?
Innovation in Insurance - necessity or luxury?Mateusz Maj
 
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...Michael Brito | Zeno Group
 
We’re leaking, and everything’s fine: How and why companies deliberately leak...
We’re leaking, and everything’s fine: How and why companies deliberately leak...We’re leaking, and everything’s fine: How and why companies deliberately leak...
We’re leaking, and everything’s fine: How and why companies deliberately leak...Ian McCarthy
 
18th Annual Global CEO Survey - Technology industry key findings
18th Annual Global CEO Survey - Technology industry key findings18th Annual Global CEO Survey - Technology industry key findings
18th Annual Global CEO Survey - Technology industry key findingsPwC
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryDistil Networks
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad BotsDistil Networks
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Designbradley_g
 
What-Do-We-Do-with-All-This-Big-Data-Altimeter-Group
What-Do-We-Do-with-All-This-Big-Data-Altimeter-GroupWhat-Do-We-Do-with-All-This-Big-Data-Altimeter-Group
What-Do-We-Do-with-All-This-Big-Data-Altimeter-GroupSusan Etlinger
 
White Paper: Social Login 101
White Paper: Social Login 101White Paper: Social Login 101
White Paper: Social Login 101Gigya
 

Tendances (20)

The Technology Horizon: Essential Technologies for Legal Marketers
The Technology Horizon: Essential Technologies for Legal MarketersThe Technology Horizon: Essential Technologies for Legal Marketers
The Technology Horizon: Essential Technologies for Legal Marketers
 
Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013
 
IAB Best Practices Traffic Fraud Final
IAB Best Practices Traffic Fraud FinalIAB Best Practices Traffic Fraud Final
IAB Best Practices Traffic Fraud Final
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...
 
The economics of digital identity
The economics of digital identityThe economics of digital identity
The economics of digital identity
 
Innovation in Insurance - necessity or luxury?
Innovation in Insurance - necessity or luxury?Innovation in Insurance - necessity or luxury?
Innovation in Insurance - necessity or luxury?
 
FinTech survey 2015
FinTech survey 2015FinTech survey 2015
FinTech survey 2015
 
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
 
We’re leaking, and everything’s fine: How and why companies deliberately leak...
We’re leaking, and everything’s fine: How and why companies deliberately leak...We’re leaking, and everything’s fine: How and why companies deliberately leak...
We’re leaking, and everything’s fine: How and why companies deliberately leak...
 
2016 Payments Predictions
2016 Payments Predictions2016 Payments Predictions
2016 Payments Predictions
 
18th Annual Global CEO Survey - Technology industry key findings
18th Annual Global CEO Survey - Technology industry key findings18th Annual Global CEO Survey - Technology industry key findings
18th Annual Global CEO Survey - Technology industry key findings
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad Inventory
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
 
ComplianceBrief
ComplianceBriefComplianceBrief
ComplianceBrief
 
CII-EY Insurance Report - Insurer of the Future 2016
CII-EY Insurance Report - Insurer of the Future 2016CII-EY Insurance Report - Insurer of the Future 2016
CII-EY Insurance Report - Insurer of the Future 2016
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
 
What-Do-We-Do-with-All-This-Big-Data-Altimeter-Group
What-Do-We-Do-with-All-This-Big-Data-Altimeter-GroupWhat-Do-We-Do-with-All-This-Big-Data-Altimeter-Group
What-Do-We-Do-with-All-This-Big-Data-Altimeter-Group
 
The Audience Behind Digital Transformation 2019
The Audience Behind Digital Transformation 2019The Audience Behind Digital Transformation 2019
The Audience Behind Digital Transformation 2019
 
White Paper: Social Login 101
White Paper: Social Login 101White Paper: Social Login 101
White Paper: Social Login 101
 

Similaire à Ghostery Enterprise Security Study

Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery, Inc.
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperMarco Essomba
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance RecommendationsMeg Weber
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...XEventsHospitality
 
CIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security CompaniesCIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security CompaniesCIOBulletin1
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Entersoft Security
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application SecurityVeracode
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersSynopsys Software Integrity Group
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5accenture
 
Find IT & Marketing’s Common Ground: Make Your Site Faster
Find IT & Marketing’s Common Ground: Make Your Site FasterFind IT & Marketing’s Common Ground: Make Your Site Faster
Find IT & Marketing’s Common Ground: Make Your Site FasterGhostery, Inc.
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeEMC
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionEMC
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodesciccone
 

Similaire à Ghostery Enterprise Security Study (20)

Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security Study
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance Recommendations
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
CIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security CompaniesCIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security Companies
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
Automotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still ExistsAutomotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still Exists
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application Security
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Find IT & Marketing’s Common Ground: Make Your Site Faster
Find IT & Marketing’s Common Ground: Make Your Site FasterFind IT & Marketing’s Common Ground: Make Your Site Faster
Find IT & Marketing’s Common Ground: Make Your Site Faster
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication Challenge
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
MindSHARE: Staying Secure Online
MindSHARE: Staying Secure OnlineMindSHARE: Staying Secure Online
MindSHARE: Staying Secure Online
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
 

Plus de Ghostery, Inc.

Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery, Inc.
 
The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today Ghostery, Inc.
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationGhostery, Inc.
 
The Next $50 Billion will Come From...Putting Users First
The Next $50 Billion will Come From...Putting Users FirstThe Next $50 Billion will Come From...Putting Users First
The Next $50 Billion will Come From...Putting Users FirstGhostery, Inc.
 
Developing Mobile Trust In Today's E-Privacy Landscape
Developing Mobile Trust In Today's E-Privacy LandscapeDeveloping Mobile Trust In Today's E-Privacy Landscape
Developing Mobile Trust In Today's E-Privacy LandscapeGhostery, Inc.
 
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015Ghostery, Inc.
 
Economic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer BehaviorEconomic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer BehaviorGhostery, Inc.
 
Ghostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing CloudGhostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing CloudGhostery, Inc.
 

Plus de Ghostery, Inc. (8)

Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery MCM - May 2016
Ghostery MCM - May 2016
 
The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
 
The Next $50 Billion will Come From...Putting Users First
The Next $50 Billion will Come From...Putting Users FirstThe Next $50 Billion will Come From...Putting Users First
The Next $50 Billion will Come From...Putting Users First
 
Developing Mobile Trust In Today's E-Privacy Landscape
Developing Mobile Trust In Today's E-Privacy LandscapeDeveloping Mobile Trust In Today's E-Privacy Landscape
Developing Mobile Trust In Today's E-Privacy Landscape
 
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
 
Economic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer BehaviorEconomic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer Behavior
 
Ghostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing CloudGhostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing Cloud
 

Dernier

Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋nirzagarg
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋nirzagarg
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 

Dernier (20)

Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 

Ghostery Enterprise Security Study

  • 1. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 1 DIGITAL SECURITY IS SERIOUS BUSINESS Updated 9/19/14
  • 2. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 2 DIGITAL SECURITY IS SERIOUS BUSINESS The number of publicly traded companies that listed security issues as a business risk in securities filings increased by 73% from 2012 to 2014.1 The average cost of a breach is $200 per record, which amounts to an average of $5.9 million paid by organizations per breach.2
  • 3. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 3 DIGITAL SECURITY IS SERIOUS BUSINESS "Security has never been higher on the agenda of CEO's and Boards. This study shows that companies can generate additional revenue while closing security gaps from non-secure marketing technology on their secure pages.” Caroline Watteeuw, the former Global Chief Technology Officer and SVP of Business Information Solutions of Pepsico and an advisor to Ghostery, Inc.
  • 4. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 4 YOUR SITE IS SECURE FOR A REASON Blind spots in your site security expose your business to issues that directly impact the customer experience, hurting your company’s revenues and profits: Poor SEO: Decline in Google Rankings Security Threats: Man-In-The-Middle Attacks User Experience Issues: Mixed Content Warnings
  • 5. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 5 • You Might Not See The Security Gaps, But Your Customers Do. Consumers recognize and trust the security of a page with an address. Security warnings that result from non-secure marketing technology, commonly called “mixed content warnings” (for instance: and ) shake customer confidence and thus your company’s revenues. This happens even if the browser blocks the non-secure technology from loading.4,5 • Most Marketing Cloud Vendors Get To Your Site Indirectly. The technology of the “Marketing Cloud” — the collection of digital technologies that power, measure, socialize, and optimize performance — is controlled by a wide range of partner companies who have been granted access to your site. With so many ways for non-secure technology to end on your site it’s difficult to find the security gaps.3 • Google Rankings Suffer When Your Pages Are Not Secure. Google now rewards secure pages with a higher search ranking. Not knowing if Google finds that your secure pages contain non-secure elements can lead to valuable rankings slipping away.6 2 SECURITY BLIND SPOTS ARE WIDESPREAD, HARD TO CONTROL AND COST YOUR COMPANY MONEY
  • 6. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 6 CONSUMERS LOSE CONFIDENCE WHEN YOUR SITE IS NOT SECURE “Consumers have been trained to instinctively trust a green “https” before the website address. Conversely a red “http” or any pop up that tells a user they are leaving the secure https address is not trusted and thus consumers will shy away. The result is consumers will register, often subconsciously, that the original site is unsecure and thus poses a threat. It is these subtleties in the user experience that increase or decrease page rankings and thus page views.” EJ Hilbert - Head of the Cyber Practice for Kroll EMEA. Hilbert is a former FBI Special Agent and former Director of Security Enforcement for MySpace/Fox Interactive Media
  • 7. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 7 YOUR SITE IS SECURE FOR A REASON "Ensuring that websites have better transparency into the causes of browser warnings will both improve the online user experience and increase overall internet security. False SSL warnings caused by SSL misconfigurations result in a negative user experience, with websites standing to lose up to 65% of their visitors due to a false SSL warning.” Devdatta Akhawe, PhD, co-author of 'Alice in Warningland: A Large- Scale Field Study of Browser Security Warning Effectiveness'.
  • 8. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 8 SECURITY BLIND SPOTS "Our 2013 study showed that the issue of non-secure scripts on secure pages exposed millions of web users to the stealing of cookies and the injection of malicious javascript. This study goes many steps further due to the depth of the real-user data from the 20+ million member GhostRank community to illustrate that the prevalence of non-secure scripts is even higher on the most popular websites.” Nick Nikiforakis, Assistant Professor of Computer Science, Stony Brook University and co-author of “A Dangerous Mix: Large-Scale Analysis of Mixed Content Websites”
  • 9. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 9 ABOUT THE STUDY This study examines instances of non-secure digital technologies firing on secure pages across 50 companies in the Airline, Financial Services, Insurance, News Publishing and Retail industries. The data was captured from Ghostrank’s 20 million real-user community members between July 14 2014 and August 14 2014 and includes both active and passive content.
  • 10. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 10 SITES STUDIED AIRLINE FINANCE INSURANCE NEWS PUBLISHING RETAIL Airtran Bank of America AIG Daily Mail Amazon Alaska Air Capital One Allstate Financial Times Costco American Chase Farmers LA Times eBay Delta Citi Geico Le Figaro Etsy JetBlue Mellon Nationwide NY Times Overstock Hawaiian Air HSBC Liberty Mutual NY Daily News Kohls Southwest PNC Progressive Telegraaf QVC United TD The Hartford The Guardian Sears US Air State Street Travelers USA Today Target Virgin America Wells Fargo USAA WSJ Walmart
  • 11. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 11 100% of Insurance Websites 100% of Retail Websites 100% of Airline Websites 90% of Financial Services Websites 90% of News Publishing Websites 1 KEY FINDING: 96 PERCENT OF WEBSITES HAVE SECURITY BLINDSPOTS
  • 12. EVERY INDUSTRY GROUP STUDIED HAD NON-SECURE TECHNOLOGIES THAT IMPACT THE USER EXPERIENCE AND REVENUE Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 12 5 Industry Percent of Websites with Non-Secure Technologies on Secure Pages Distinct Non-Secure Technologies Highest Number of Non- Secure Technologies Seen on a Website Average Non-Secure Technologies on Secure Pages Seen on a Website Airline 100% 223 112 53 Finance 90% 382 234 115 Insurance 100% 165 139 25 News Publishing 90% 212 100 47 Retail 100% 438 333 109
  • 13. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 13 RETAIL WEBSITES STUDIED HAD THE HIGHEST NUMBER OF NON-SECURE TECHNOLOGIES OVERALL Of the industries surveyed, Retail websites had the highest total number of non-secure technologies found. Ghostery saw 438 non-secure technologies across the 10 Retail websites studied. The highest individual website in the study was in the Retail category and had 333 non-secure technologies.
  • 14. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 14 FINANCIAL SERVICES WEBSITES COMPRISED HALF OF THE TEN WEBSITES WITH THE HIGHEST INSTANCES OF NON-SECURE TECHNOLOGIES 5/10 Financial Services websites have significant security technology in place on their pages, yet 90% studied had non-secure technologies on their secure pages.
  • 15. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 15 THE TEN WEBSITES WITH THE MOST NON-SECURE TECHNOLOGIES IN THE STUDY COVER MANY SECTORS – FINANCE BEING THE MOST AT RISK Industry Number of Websites in the Highest Ten Finance 5 Retail 3 Airline 1 Insurance 1 News Publishing 0
  • 16. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 16 CONCLUSION: WIDESPREAD CUSTOMER EXPERIENCE AND REVENUE RISKS FROM NON-SECURE MARKETING TECHNOLOGIES • Non-secure technologies on secure pages can decrease ROI by: – Causing mixed content warnings that increase consumer perception of risk on the page, even if the browser is blocking the non-secure – Creating potential for man-in-the-middle attacks – Decreasing Google search rankings • 96 Percent of websites studied had non-secure technologies on secure pages • Retail websites studied had the highest volume of non-secure technologies on secure pages • The website with the highest number of non-secure technologies was a Retail site with 333 • Financial Services websites made up half of the 10 highest instances of non-secure technologies in the study
  • 17. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 17 ABOUT GHOSTERY Ghostery is a technology company that empowers consumers and businesses expose and eliminate the digital blindspots in the Marketing Cloud - the collection of digital technologies that power, measure, socialize, and optimize performance. Over 40 million people globally rely on the free Ghostery browser extension to see and control the tracking technologies that follow them across the web. Businesses rely on Ghostery Marketing Cloud Management to drive ROI by maximizing the security, performance, and profitability of their digital assets. Key clients like Equifax, Intercontinental Hotels Group and Procter & Gamble depend on Ghostery to take their digital business from chaos to control. Ghostery also is the leading global provider of privacy governance services, powering compliance for more than $2 billion of advertising and e-commerce transactions annually. Founded in 2009, Ghostery is headquartered in New York City with a technology office in Salt Lake City and sales offices in London and San Francisco. The company is backed by Warburg Pincus, LLC, the global private equity fund. Learn more at GhosteryEnterprise.com and @ghosteryinc.
  • 18. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 18 GLOSSARY • Digital marketing technology or digital marketing vendor: Ghostery defines a “digital marketing technology” as code within a webpage or called by another technology (i.e. piggyback tag or third-party tag) which communicates with a server, transfers data, and has been identified by Ghostery as participating in advertising and marketing activities such as ad targeting, analytics, social media and ad serving. Digital marketing technologies can be images, objects, documents, iframes, or scripts. See: http://www.ghosteryenterprise.com/company-database/ • Non-secure digital marketing technologies: Ghostery defines a “non-secure digital marketing technology” as an http t (see above) that is called from an https url. • Website: Ghostery defines a “Website” as a site’s top level server such as site.com or school.edu. • Secure web page: A secure web page is an http web page that uses an added security layer and is denoted by “https.” The security layer is usually an SSL (secure socket layer,) a commonly-used protocol for managing the security of a message transmission on the Internet; it uses a program layer located between the Internet's HTTP and TCP program layers. http://en.wikipedia.org/wiki/HTTP_Secure
  • 19. GLOSSARY (cont.) Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 19 • Man-in-the-Middle attack: A Man-in-the-Middle attack is a type of cyber attack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A Man-in-the-Middle Attack allows a malicious actor to intercept, send, and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late. http://en.wikipedia.org/wiki/ HTTP_Secure • Mixed content: “Mixed content” is a term to describe a web page that contains both secure and non-secure content elements (images, scripts, etc.) Mixed content jeopardizes the security of the entire page, and causes browsers to warn site visitors and attempt to block the non-secure content. See: http://www.troyhunt.com/2013/06/understanding-risk-of-mixed-content.html
  • 20. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 20 REFERENCES 1 “Corporate Boards Race to Shore Up Cyber Security” (The Wall Street Journal June 29, 2014) 2 “2014 Cost of Data Breach Security US” (IBM 2014) 3 “Global Tracker Report” (Evidon February 2013) 4 “Crying Wolf: An Empirical Study of SSL Warning Effectiveness” (Carnegie Mellon 2009) 5 “A Dangerous Mix: Large-scale analysis of mixed-content websites (Chen et al. 2013) 6 “HTTPS As a Ranking Signal” (Google blog August 6, 2014)
  • 21. FOR MORE INFORMATION: sales@ghostery.com @ghosteryinc Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 21
  • 22. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 22 APPENDIX A: Study Breakdown By Industry Type Industry Percent of Websites With Non-Secure Technologies Found No Non-Secure Technologies Found Airline 100% Financial Services 90% State Street Insurance 100% News Publishing 90% Telegraaf Retail 100%
  • 23. Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 23 APPENDIX B: Distinct Non-Secure Technologies Found Per Industry in Study Industry Non-Secure Technologies Min Max Average Airline 223 1 112 53 Financial Services 382 2 234 115 Insurance 165 2 139 25 News Publishing 212 2 100 47 Retail 438 20 333 109
  • 24. APPENDIX C: Non-Secure Technologies Loaded Per 1000 Calls on Secure Pages Loaded Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. Industry Non-Secure Calls Per 1000 on Secure Pages Website With Highest Non- Secure Calls Per 1000 on Secure Pages Highest Number of Non- Secure Calls Seen on a Website Airline 1.9 7.4 3578 Financial Services 1.5 51.7 5518 Insurance 1.0 9.6 1665 News Publishing 1.4 389.6 5575 Retail 3.0 43.6 19820 24
  • 25. SAMPLE DATA: Allstate Non-Secure Technologies (Top 10) Website Digital Marketing Technology Number of Times Seen on Secure Pages Allstate.com geoPlugin 29 Allstate.com Google Adsense 24 Allstate.com Adcash 15 Allstate.com Omniture (Adobe Analytics) 9 Allstate.com Google Analytics 6 Allstate.com Mixpanel 5 Allstate.com ScoreCard Research Beacon 4 Allstate.com DoubleClick 3 Allstate.com ValueClick Media 3 Allstate.com Right Media 2 Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 25 *Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study
  • 26. SAMPLE DATA: Hawaiian Air Non-Secure Technologies (Top 10) Website Digital Marketing Technology Number of Times Seen on Secure Pages HawaiianAir.com BridgeTrack 37 HawaiianAir.com Intermarkets 7 HawaiianAir.com Commission Junction 3 HawaiianAir.com DoubleClick 3 HawaiianAir.com Adap.tv 1 HawaiianAir.com Adobe Test & Target 1 HawaiianAir.com Adometry 1 HawaiianAir.com Adzerk 1 HawaiianAir.com Atlas 1 HawaiianAir.com Dotomi 1 Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 26 *Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study
  • 27. SAMPLE DATA: Walmart Non-Secure Technologies (Top 10) Website Digital Marketing Technology Number of Times Seen on Secure Pages Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 27 Walmart.com *Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study DoubleClick Spotlight 2498 Walmart.com DoubleClick 640 Walmart.com Omniture (Adobe Analytics) 634 Walmart.com Criteo 394 Walmart.com DoubleClick Floodlight 253 Walmart.com Experian Marketing Services 251 Walmart.com AppNexus 202 Walmart.com MediaMath 181 Walmart.com TriggIt 157 Walmart.com Rocket Fuel 123
  • 28. SAMPLE DATA: Wells Fargo Non-Secure Technologies (Top 10) Website Digital Marketing Technology Number of Times Seen on Secure Pages Wellsfargo.com Google Analytics 390 Wellsfargo.com DoubleClick 224 Wellsfargo.com Twitter Badge 195 Wellsfargo.com Intermarkets 152 Wellsfargo.com Google Adsense 125 Wellsfargo.com Omniture (Adobe Analytics) 122 Wellsfargo.com ScoreCard Research Beacon 105 Wellsfargo.com Adcash 86 Wellsfargo.com Quantcast 86 Wellsfargo.com geoPlugin 65 Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 28 *Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study
  • 29. SAMPLE DATA: Wall Street Journal Non-Secure Technologies (Top 10) Website Digital Marketing Technology Number of Times Seen on Secure Pages WSJ.com DoubleClick Spotlight 134 WSJ.com AppNexus 86 WSJ.com DoubleClick 80 WSJ.com MaxPoint Interactive 62 WSJ.com ValueClick Media 47 WSJ.com Resonate Networks 43 WSJ.com Livefyre 39 WSJ.com ChartBeat 36 WSJ.com Krux Digital 33 WSJ.com MediaMath 29 Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 29 *Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study
  • 30. Company Secure Host Secure Path Tag Non-­‐Secure Tag URL Allstate myaccount.allstate.com /anon/login/login.aspx Omniture (Adobe Analytics) images.apple.com/metrics/scripts/s_code_h.js Allstate myaccount.allstate.com /secured/billing/paybill.aspx Adcash www.adcash.com/script/java.php?option=rotateur&r=247707 Allstate myaccount.allstate.com /secured/home.aspx Right Media ads.yahoo.com/cms/v1?esig=1~d816e430d739f6042b0cff31022d2e86413f153e&Allstate purchase.allstate.com /auto/PersonalQuote.aspx Omniture (Adobe Analytics) allstate.122.2o7.net/b/ss/allstatedevelopment/1/H.21-­‐-­‐NS/Allstate termlife.allstate.com / Google Adsense pagead2.googlesyndication.com/pagead/gen_204?id=cyclops&Allstate email.allstate.com /owa/ Mixpanel api.mixpanel.com/track/?data=eyJldmVudCI6ICJFbWFpbCBPcGVuZWQiLCAicHJvcGVydGllcyI6IHsiRW1haWwgTmFtZSI6ICJTdWdnZXN0ZWQgQ29udGVudCAoV2Vla2x5KSBBd2Vzb21lIiwgInVAllstate email.allstate.com /vdesk/hangup.php3 ValueClick Media cdn.fastclick.net/js/adcodes/pubcode.min.js?sid=9991&media_Allstate myaccount.allstate.com /anon/login/login.aspx Xaxis oascentral.comcast.net/RealMedia/ads/adstream_jx.ads/Allstate webmail.allstate.com /owa/ Constant Contact r20.rs6.net/on.jsp?ca=c271e5bd-­‐d711-­‐4a30-­‐82c1-­‐0c83d0cdc0e4&Allstate drivewise.allstate.com /dw/drivewise/common/login NetSeer cmi.netseer.com/redirect?ex=27&t=16 Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 30 Sample Data: Allstate Non-Secure Technologies (Raw Data) *Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study
  • 31. Company Secure Host Secure Path Tag Non-­‐Secure Tag URL Hawaiian Air apps.hawaiianairlines.com/MyHawaiianMiles/MyTrips/MaBnraidggeeTTrirpa.cakspx ads.bridgetrack.com/a/i/?BT_CON=15&BT_PID=1657729&Hawaiian Air apps.hawaiianairlines.com/myhawaiianmiles/Login.aspx Intermarkets cdn.intermarkets.net/u/Intermarkets/AdFeedback/processAdFeedback.Hawaiian Air apps.hawaiianairlines.com/myhawaiianmiles/MyTrips/MaBnraigdegTerTirpa.ackspx ads.bridgetrack.com/a/i/?BT_CON=15&BT_PID=1657729&Hawaiian Air checkin.hawaiianairlines./cwomci/start Media Innovation Group b3.mookie1.com/2/LB/4459175926@x96? Hawaiian Air partners.hawaiianairlines/.pcoagmes/rewards/shopListing.aspAxdometry log.dmtry.com/138091/0/2973/109753508/57743978/56157/Hawaiian Air www.hawaiianairlines.co/mhawaiianmiles/pages/frequentA-­‐fdlyzeerr-­‐kmiles-­‐membership-­‐levestlsa.taics.paxdzerk.net/reddit/ads.html?sr=-­‐reddit.com,loggedin&Hawaiian Air apps.hawaiianairlines.com/myhawaiianmiles/Login.aspx Quantcast widget.quantcast.com/user/widgetImage?domain=drudgereport.Hawaiian Air checkin.hawaiianairlines./cwomci/start Atlas view.atdmt.com/jaction/HA_Special_Offers_Page Hawaiian Air fly.hawaiianairlines.com /reservations/1/FlightPrices.aspDxoubleClick www.googletagservices.com/tag/js/gpt.js Hawaiian Air fly.hawaiianairlines.com /reservations/1/FlightPrices.aspLxiveRail ad4.liverail.com/?LR_PUBLISHER_ID=1912&LR_SCHEMA=Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 31 Sample Data: Hawaiian Air Non-Secure Technologies (Raw Data) *Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study
  • 32. Company Secure Host Secure Path Tag Non-­‐Secure Tag URL Walmart affiliates.walmart.com / LinkShare merchant.linksynergy.com/fs/banners/2149/2149_10003964.Walmart corporate.walmart.com /privacy-­‐security/ MediaMath pixel.mathtag.com/event/js?mt_id=366527&mt_adid=116823&Walmart savingscatcher.walmart.c/odmashboard Gravity Insights i.api.grvcdn.com/personalization/fonts/SourceSansPro/sourcesanspro-­‐Walmart www.walmart.com /cart2/cart.do Adometry log.dmtry.com/873028/0/3687/75727622/56074393/635261/Walmart www2.walmart.com /wmflows/checkout DoubleClick Spotlight pubads.g.doubleclick.net/activity;dc_iu=/55875582/Walmart-­‐Walmart corporate.walmart.com /_submit/feedback MediaMath pixel.mathtag.com/event/js?mt_id=366527&mt_adid=116823&Walmart corporate.walmart.com /contact-­‐us/store-­‐corporate-­‐feeMdbeadciakMath pixel.mathtag.com/event/js?mt_id=366527&mt_adid=116823&Walmart survey.walmart.com /WMExp/Processor BrightRoll vast.bp3848655.btrll.com/vast/3848655?n=471386826&Walmart www.walmart.com /cart2/cart.do Omniture (Adobe Analytics) i2.walmartimages.com/webanalytics/omniture/s_code.js Walmart classrooms.walmart.com/lists/61-­‐Middle-­‐School-­‐SupplieEs-­‐xLpisetrian Marketing Services d.audienceiq.com/r/dd/id/L21rdC80NC9jaWQvMjQ4NDMzMDMvdC8yL2NhdC8yNTMwMTgwNA Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 32 Sample Data: Walmart Non-Secure Technologies (Raw Data) *Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study
  • 33. Company Secure Host Secure Path Tag Non-­‐Secure Tag URL Wells Fargo billpay.wellsfargo.com /billpay/application/EBillFrameBlueKai tags.bkrtx.com/js/bk-­‐coretag.js Wells Fargo connect.secure.wellsfarg/op.caoymments/channel/viewTransfgeerCooPnlufgirimn www.geoplugin.net/json.gp?jsoncallback=fn Wells Fargo icomplete.wellsfargo.com/oas/status/details Intermarkets cdn.intermarkets.net/u/Intermarkets/AdFeedback/processAdFeedback.Wells Fargo oam.wellsfargo.com /oam/access/challengeRegistraTtiwonitSteetru BpaDdigspelay urls.api.twitter.com/1/urls/count.json?url=https://oam.wellsfargo.Wells Fargo online.wellsfargo.com /das/cgi-­‐bin/session.cgi Adcash www.adcash.com/script/java.php?option=rotateur&r=168413 Wells Fargo online.wellsfargo.com /das/cgi-­‐bin/session.cgi Adknowledge cache.blogads.com/37323961/feed.js Wells Fargo online.wellsfargo.com /das/cgi-­‐bin/session.cgi Advertising.com o.aolcdn.com/ads/adsWrapper.js Wells Fargo online.wellsfargo.com /das/cgi-­‐bin/session.cgi Amazon Associates c.amazon-­‐adsystem.com/aax2/amzn_ads.js Wells Fargo wellsoffice.wellsfargo.com/ceoportal/signon/index.jsp Facebook Connect connect.facebook.net/en_US/all.js Wells Fargo www.wellsfargo.com / AppNexus ib.adnxs.com/tt?id=3341204&cb=DC766C8D720449822546403 Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 33 Sample Data: Wells Fargo Non-Secure Technologies (Raw Data) *Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study
  • 34. Company Secure Host Secure Path Tag Non-­‐Secure Tag URL WSJ buy.wsj.com /offers/html/offerPrnUpPI.htmlMaxPoint Interactive mpp.mxptint.net/2/6657/?rnd=2093531899 WSJ customercenter.wsj.com/public/view/login.html Adometry log.dmtry.com/132500/189/3491/1181/330/248925/0/0/WSJ customercenter.wsj.com/view/home.html ScoreCard Research Beacon b.scorecardresearch.com/b?c1=8&c2=6135404&c3=3000&WSJ id.wsj.com /access/509b1a086458232f6e00A0p0p0N2e/xlautsest/login_standalonibe..ahdtmnxls.com/seg?add=1578697&t=2 WSJ id.wsj.com /access/509b1a086458232f6e00In0t0e0g2ra/lla Ateds St/clioegnicne_standalondet..hadtmsalfeprotected.com/dt?asId=76efb4d6-­‐0d21-­‐11e4-­‐97b0-­‐WSJ portfolio.wsj.com /auth/portfolio_login DoubleClick Spotlight ad.doubleclick.net/activity;src=1373310;type=rapta615;cat=WSJ portfolio.wsj.com /marketing Turn r.turn.com/r/beacon?b2=Wg7NDNqjfn8DHtWyTdw0hccfpHiLCI-­‐WSJ signin.wsj.com /login.asp DoubleClick cm.g.doubleclick.net/pixel?google_nid=bluekai&google_WSJ subscribe.wsj.com /hpupgrade Turn r.turn.com/r/beacon?b2=iVXhpQdP31vtxinJjuJkZrDXF3ErZ-­‐WSJ www.subscribe.wsj.com/hpheaderlink/ DoubleClick Spotlight ad.doubleclick.net/activity;src=4327673;met=1;v=1;pid=Confidential | Draft for Discussion Purposes Only | © 2014 Ghostery, Inc. All Rights Reserved. 34 Sample Data: Wall Street Journal Non-Secure Technologies (Raw Data) *Based on a 7/14/14 - 8/14/14 Ghostery Inc. Security Study