160 likes | 242 Views
Combating Identity Fraud. I N A V I R T U A L W O R L D. More Connected and Mobile Than Ever. Mobile devices are rapidly overtaking PCs, and companies are embracing “BYOD.” . Sources:
E N D
Combating Identity Fraud I N A V I R T U A L W O R L D
More Connected and Mobile Than Ever Mobile devices are rapidly overtaking PCs, and companies are embracing “BYOD.” Sources: CTIA. "Semi-annual survey." October 2011. Retrieved from http://www.ctia.org/media/press/body.cfm/prid/2133 Pew Research Center. "Americans and Their Cell Phones." August 2011. Retrieved from http://www.pewinternet.org/~/media//Files/Reports/2011/Cell%20Phones%202011.pdf Figure of 142 million rounded down to the nearest whole number. Calculation based on CTIA Wireless Association figure of 322.9 million mobile devices in use in the United States (2011), multiplied by .44, or 44%—the percentage of mobile device owners accessing the Internet according to a Pew Research Center study.
Consumers By 2015, more people will access the Internet from mobile devices than from desktop computers. Source: Morgan Stanley Research (2010), Internet Trends http://www.morganstanley.com/institutional/techresearch/pdfs/Internet_Trends_041210.pdf
Enterprise 67% of surveyed companies expect either to purchase tablets or provide support for employee-owned tablets. Source: Morgan Stanley Research (2011), Tablet Demand and Disruption: Mobile Users Come of Age http://www.morganstanley.com/views/perspectives/tablets_demand.pdf
Good News for Business Mobile devices enable knowledge workers to take care of business from virtually anywhere, at any time.
What’s the Catch? Mobile, social media-savvy employees and customers maybe more likely to become identity fraud victims.
What Puts Users at Risk? Even sophisticated ecommerce and social media users are at higher risk. Source: Javelin Strategy & Research, 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier. * The higher incidence of fraud among these users can be a factor of demographic composition or social network behavior.
What Puts Users at Risk? “People are adopting new methods of interacting [online] faster than we can educate them on safe behavior.” - James Van Dyke, President and Founder of Javelin Strategy & Research
What Puts Users at Risk? “The more information you share, and the more you transact, the more you’re at risk. One is simply a function of the other.” - James Van Dyke, President and Founder of Javelin Strategy & Research
Security Breaches Becoming More Common Sony PlayStation Network › 70 million user accounts compromised. › Thieves accessed birth dates, emailaddresses, home addresses and login credentials. • LinkedIn • › Approx. 6,500,000 • encrypted passwords stolen and posted online. Sources: Hoffman, Stephanie (2011), Sony Warns Of Identity Theft Following PlayStation Hack http://www.crn.com/news/security/229402376/sony-warns-of-identity-theft-following-playstation-hack.htm LinkedIn press release http://press.linkedin.com/node/1212
What are the Costs? In 2011… › 11.6 million adults were victims of identity fraud. › Identity fraud cost Americans $18 billion. › Victims lost an average of $1,513 to identity fraud. › Victims spent an average of $354 to resolve their cases. Source: Javelin Strategy & Research, 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier
What Can You Do? Consumers › Be cautious about revealing personal information on social media sites. › Take advantage of privacy settings. › Shop on secure sites with URLs preceded by “https.” › Don’t share personal information while using public Wi-Fi.
What Can You Do? Employers › Offer identity fraud protection as an employee benefit. › Educate employees about security best practices. › Offer support for user-supplied mobile devices.
Protection as a Service Identity theft protection services are a valuable benefit for all types of businesses. › Proactive alerts: Notifies clients when personal information is being used to apply for utilities, credit cards and loans. › Remediation: Helps victims recover if identity fraud occurs.
What to Look for in Identity Theft Protection Services: › Does the service cover identity theft and/or identity fraud? › Is there an online portal or other simple way to track activity? › If identity theft or fraud occurs, does the company offer remediation or do they just notify me—and then I have to take care of the issue? › What are the hours of operation, and if they aren’t 24/7, what happens if something occurs after hours? › How easy is it for my employees or members to enroll?
A Virtual Necessity for Your Business By offering identity theft protection, you can: › Build stronger relationships with employees, customers and members. › Ensure secure productivity for your workforce. › Develop new business and revenue opportunities. Visit LifeLockBusiness.com or call 1-877-511-7906 to learn how.