SlideShare a Scribd company logo
Combating Identity Fraud
I   N   A   V   I   R   T   U   A   L   W   O   R   L   D
More
Connected
and Mobile
Than Ever
Mobile devices are rapidly
overtaking PCs, and companies
are embracing “BYOD.”




Sources:
CTIA. "Semi-annual survey." October 2011. Retrieved from http://www.ctia.org/media/press/body.cfm/prid/2133
Pew Research Center. "Americans and Their Cell Phones." August 2011. Retrieved
from http://www.pewinternet.org/~/media//Files/Reports/2011/Cell%20Phones%202011.pdf
Figure of 142 million rounded down to the nearest whole number. Calculation based on CTIA Wireless Association figure of 322.9 million mobile devices in
use in the United States (2011), multiplied by .44, or 44%—the percentage of mobile device owners accessing the Internet according to a Pew Research
Center study.
Consumers
By 2015, more people will access the Internet from mobile
devices than from desktop computers.
Source: Morgan Stanley Research (2010), Internet Trends
http://www.morganstanley.com/institutional/techresearch/pdfs/Internet_Trends_041210.pdf
Enterprise
67% of surveyed companies expect either to purchase tablets or
provide support for employee-owned tablets.
Source: Morgan Stanley Research (2011), Tablet Demand and Disruption: Mobile Users Come of Age
http://www.morganstanley.com/views/perspectives/tablets_demand.pdf
Good News for Business
Mobile devices enable knowledge workers to take care of
business from virtually anywhere, at any time.
What’s the Catch?
Mobile, social media-savvy employees and customers may
be more likely to become identity fraud victims.
What Puts Users at Risk?




Even sophisticated ecommerce and social media users
are at higher risk.
Source: Javelin Strategy &Research, 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier.
* The higher incidence of fraud among these users can be a factor of demographic composition or social network behavior.
What Puts Users at Risk?

“People are adopting new
methods of interacting [online]
faster than we can educate them
on safe behavior.”
- James Van Dyke, President and Founder of Javelin Strategy & Research
What Puts Users at Risk?

“The more information you
share, and the more you
transact, the more you’re at risk.
One is simply a function of the
other.”
- James Van Dyke, President and Founder of Javelin Strategy & Research
Security Breaches
Becoming More Common
Sony PlayStation Network                                                            LinkedIn
›     70 million user accounts                                                      ›       Approx. 6,500,000
      compromised.                                                                          encrypted passwords
                                                                                            stolen and posted online.
› Thieves accessed birth
      dates, emailaddresses, home
      addresses and login credentials.




    Sources: Hoffman, Stephanie (2011), Sony Warns Of Identity Theft Following PlayStation Hack
    http://www.crn.com/news/security/229402376/sony-warns-of-identity-theft-following-playstation-hack.htm
    LinkedIn press release http://press.linkedin.com/node/1212
What are the Costs?
In 2011…
› 11.6 million adults were victims of identity fraud.

› Identity fraud cost Americans $18 billion.

› Victims lost an average of $1,513 to identity fraud.

› Victims spent an average of $354 to resolve their cases.




 Source: Javelin Strategy &Research, 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier
What Can You Do?
Consumers
› Be cautious about revealing personal information on
  social media sites.

› Take advantage of privacy settings.

› Shop on secure sites with URLs preceded by “https.”

› Don’t share personal information while using public Wi-Fi.
What Can You Do?
Employers
› Offer identity fraud protection as an employee benefit.

› Educate employees about security best practices.

› Offer support for user-supplied mobile devices.
Protection as a Service
Identity theft protection services are a valuable
benefit for all types of businesses.
› Proactive alerts: Notifies clients when personal information
  is being used to apply for utilities, credit cards and loans.

› Remediation: Helps victims recover if identity fraud occurs.
What to Look for in Identity
Theft Protection Services:
› Does the service cover identity theft and/or identity fraud?

› Is there an online portal or other simple way to track activity?

› If identity theft or fraud occurs, does the company offer
  remediation or do they just notify me—and then I have to take
  care of the issue?

› What are the hours of operation, and if they aren’t 24/7, what
  happens if something occurs after hours?

› How easy is it for my employees or members to enroll?
A Virtual Necessity
for Your Business
By offering identity theft protection, you can:
› Build stronger relationships with employees, customers and
  members.

› Ensure secure productivity for your workforce.

› Develop new business and revenue opportunities.

Visit LifeLockBusiness.com or call 1-800-LifeLock to learn how.

More Related Content

PDF
Taking Control of the Digital and Mobile User Authentication Challenge
 
DOC
111cyber crimes
PDF
Data Breach Visualization
PDF
Netop Remote Control Embedded Devices
PDF
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
PPTX
Iot privacy vs convenience
PDF
You Are the Target
 
PDF
Components of a Model of Cybersecurity Behavior Adoption
Taking Control of the Digital and Mobile User Authentication Challenge
 
111cyber crimes
Data Breach Visualization
Netop Remote Control Embedded Devices
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Iot privacy vs convenience
You Are the Target
 
Components of a Model of Cybersecurity Behavior Adoption

What's hot (20)

PPTX
Privacy Presentation for SOCAP-3
DOC
Computer crimes
PDF
Blue Coat 2013 Systems Mobile Malware Report
PDF
Fraudsters Hackers & Thieves!
PDF
Digital Identities
PDF
Compilation of phishing and keylogger attacks
PPTX
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
DOCX
Hybrid intrusion detection systems (hids) using fuzzy logic
PDF
IT Sample Paper
PDF
Hacking back in self defense
DOCX
Final Copy Cyber Crime Research Essay
PPTX
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
PDF
1. security 20 20 - ebook-vol2
PPTX
Internet Privacy
PPTX
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
PDF
Online Privacy
PDF
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
PDF
Social media marketing 2015
PDF
Is Your Dating App Breaking Your Heart?
PDF
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Privacy Presentation for SOCAP-3
Computer crimes
Blue Coat 2013 Systems Mobile Malware Report
Fraudsters Hackers & Thieves!
Digital Identities
Compilation of phishing and keylogger attacks
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
Hybrid intrusion detection systems (hids) using fuzzy logic
IT Sample Paper
Hacking back in self defense
Final Copy Cyber Crime Research Essay
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
1. security 20 20 - ebook-vol2
Internet Privacy
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
Online Privacy
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
Social media marketing 2015
Is Your Dating App Breaking Your Heart?
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Ad

Similar to LifeLock Javelin Presentation (20)

PDF
Center for Identity Webcast: The Internet of Things
PPTX
ID Theft and Computer Security 2008
PPTX
NSTIC and IDESG Update
PDF
What is cyber fraud?
PDF
A Contextual Framework For Combating Identity Theft
PPT
Chapter 12: Computer Mediated Communicationcmc
PPTX
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
PDF
Fraudsters Hackers & Thieves
PPTX
Cyber security for women using mobile devices
PDF
Consumers' and Citizens' Privacy
DOCX
Cybercriminals Are Lurking
PDF
Privacy study Mobile and online Dating
PDF
Mobile Privacy and Security - Study by Mobidigger
PPTX
11 19-2015 - iasaca membership conference - the state of security
DOCX
Cybercrime blog
PDF
Cybersecurity Nightmare_ 16 Billion Passwords Leaked in Data Breach by Orage ...
PPTX
Impact-of-Cybercrime ppt presentation /cybercrime and digital hygine
PDF
Essays On Cyber Crime
PPTX
CYBERCRIME VICTIMS
Center for Identity Webcast: The Internet of Things
ID Theft and Computer Security 2008
NSTIC and IDESG Update
What is cyber fraud?
A Contextual Framework For Combating Identity Theft
Chapter 12: Computer Mediated Communicationcmc
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Fraudsters Hackers & Thieves
Cyber security for women using mobile devices
Consumers' and Citizens' Privacy
Cybercriminals Are Lurking
Privacy study Mobile and online Dating
Mobile Privacy and Security - Study by Mobidigger
11 19-2015 - iasaca membership conference - the state of security
Cybercrime blog
Cybersecurity Nightmare_ 16 Billion Passwords Leaked in Data Breach by Orage ...
Impact-of-Cybercrime ppt presentation /cybercrime and digital hygine
Essays On Cyber Crime
CYBERCRIME VICTIMS
Ad

Recently uploaded (20)

PDF
Sports Quiz easy sports quiz sports quiz
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Pharma ospi slides which help in ospi learning
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Complications of Minimal Access Surgery at WLH
PDF
01-Introduction-to-Information-Management.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Institutional Correction lecture only . . .
PDF
RMMM.pdf make it easy to upload and study
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Classroom Observation Tools for Teachers
Sports Quiz easy sports quiz sports quiz
Supply Chain Operations Speaking Notes -ICLT Program
TR - Agricultural Crops Production NC III.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Pharma ospi slides which help in ospi learning
FourierSeries-QuestionsWithAnswers(Part-A).pdf
O7-L3 Supply Chain Operations - ICLT Program
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Complications of Minimal Access Surgery at WLH
01-Introduction-to-Information-Management.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Final Presentation General Medicine 03-08-2024.pptx
Institutional Correction lecture only . . .
RMMM.pdf make it easy to upload and study
VCE English Exam - Section C Student Revision Booklet
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Classroom Observation Tools for Teachers

LifeLock Javelin Presentation

  • 1. Combating Identity Fraud I N A V I R T U A L W O R L D
  • 2. More Connected and Mobile Than Ever Mobile devices are rapidly overtaking PCs, and companies are embracing “BYOD.” Sources: CTIA. "Semi-annual survey." October 2011. Retrieved from http://www.ctia.org/media/press/body.cfm/prid/2133 Pew Research Center. "Americans and Their Cell Phones." August 2011. Retrieved from http://www.pewinternet.org/~/media//Files/Reports/2011/Cell%20Phones%202011.pdf Figure of 142 million rounded down to the nearest whole number. Calculation based on CTIA Wireless Association figure of 322.9 million mobile devices in use in the United States (2011), multiplied by .44, or 44%—the percentage of mobile device owners accessing the Internet according to a Pew Research Center study.
  • 3. Consumers By 2015, more people will access the Internet from mobile devices than from desktop computers. Source: Morgan Stanley Research (2010), Internet Trends http://www.morganstanley.com/institutional/techresearch/pdfs/Internet_Trends_041210.pdf
  • 4. Enterprise 67% of surveyed companies expect either to purchase tablets or provide support for employee-owned tablets. Source: Morgan Stanley Research (2011), Tablet Demand and Disruption: Mobile Users Come of Age http://www.morganstanley.com/views/perspectives/tablets_demand.pdf
  • 5. Good News for Business Mobile devices enable knowledge workers to take care of business from virtually anywhere, at any time.
  • 6. What’s the Catch? Mobile, social media-savvy employees and customers may be more likely to become identity fraud victims.
  • 7. What Puts Users at Risk? Even sophisticated ecommerce and social media users are at higher risk. Source: Javelin Strategy &Research, 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier. * The higher incidence of fraud among these users can be a factor of demographic composition or social network behavior.
  • 8. What Puts Users at Risk? “People are adopting new methods of interacting [online] faster than we can educate them on safe behavior.” - James Van Dyke, President and Founder of Javelin Strategy & Research
  • 9. What Puts Users at Risk? “The more information you share, and the more you transact, the more you’re at risk. One is simply a function of the other.” - James Van Dyke, President and Founder of Javelin Strategy & Research
  • 10. Security Breaches Becoming More Common Sony PlayStation Network LinkedIn › 70 million user accounts › Approx. 6,500,000 compromised. encrypted passwords stolen and posted online. › Thieves accessed birth dates, emailaddresses, home addresses and login credentials. Sources: Hoffman, Stephanie (2011), Sony Warns Of Identity Theft Following PlayStation Hack http://www.crn.com/news/security/229402376/sony-warns-of-identity-theft-following-playstation-hack.htm LinkedIn press release http://press.linkedin.com/node/1212
  • 11. What are the Costs? In 2011… › 11.6 million adults were victims of identity fraud. › Identity fraud cost Americans $18 billion. › Victims lost an average of $1,513 to identity fraud. › Victims spent an average of $354 to resolve their cases. Source: Javelin Strategy &Research, 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier
  • 12. What Can You Do? Consumers › Be cautious about revealing personal information on social media sites. › Take advantage of privacy settings. › Shop on secure sites with URLs preceded by “https.” › Don’t share personal information while using public Wi-Fi.
  • 13. What Can You Do? Employers › Offer identity fraud protection as an employee benefit. › Educate employees about security best practices. › Offer support for user-supplied mobile devices.
  • 14. Protection as a Service Identity theft protection services are a valuable benefit for all types of businesses. › Proactive alerts: Notifies clients when personal information is being used to apply for utilities, credit cards and loans. › Remediation: Helps victims recover if identity fraud occurs.
  • 15. What to Look for in Identity Theft Protection Services: › Does the service cover identity theft and/or identity fraud? › Is there an online portal or other simple way to track activity? › If identity theft or fraud occurs, does the company offer remediation or do they just notify me—and then I have to take care of the issue? › What are the hours of operation, and if they aren’t 24/7, what happens if something occurs after hours? › How easy is it for my employees or members to enroll?
  • 16. A Virtual Necessity for Your Business By offering identity theft protection, you can: › Build stronger relationships with employees, customers and members. › Ensure secure productivity for your workforce. › Develop new business and revenue opportunities. Visit LifeLockBusiness.com or call 1-800-LifeLock to learn how.