1 / 16

I N A V I R T U A L W O R L D

Combating Identity Fraud. I N A V I R T U A L W O R L D. More Connected and Mobile Than Ever. Mobile devices are rapidly overtaking PCs, and companies are embracing “BYOD.” . Sources: 

rowena
Download Presentation

I N A V I R T U A L W O R L D

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Combating Identity Fraud I N A V I R T U A L W O R L D

  2. More Connected and Mobile Than Ever Mobile devices are rapidly overtaking PCs, and companies are embracing “BYOD.” Sources:  CTIA. "Semi-annual survey." October 2011. Retrieved from http://www.ctia.org/media/press/body.cfm/prid/2133 Pew Research Center. "Americans and Their Cell Phones." August 2011. Retrieved from http://www.pewinternet.org/~/media//Files/Reports/2011/Cell%20Phones%202011.pdf Figure of 142 million rounded down to the nearest whole number. Calculation based on CTIA Wireless Association figure of 322.9 million mobile devices in use in the United States (2011), multiplied by .44, or 44%—the percentage of mobile device owners accessing the Internet according to a Pew Research Center study.

  3. Consumers By 2015, more people will access the Internet from mobile devices than from desktop computers. Source: Morgan Stanley Research (2010), Internet Trends http://www.morganstanley.com/institutional/techresearch/pdfs/Internet_Trends_041210.pdf

  4. Enterprise 67% of surveyed companies expect either to purchase tablets or provide support for employee-owned tablets. Source: Morgan Stanley Research (2011), Tablet Demand and Disruption: Mobile Users Come of Age http://www.morganstanley.com/views/perspectives/tablets_demand.pdf

  5. Good News for Business Mobile devices enable knowledge workers to take care of business from virtually anywhere, at any time.

  6. What’s the Catch? Mobile, social media-savvy employees and customers maybe more likely to become identity fraud victims.

  7. What Puts Users at Risk? Even sophisticated ecommerce and social media users are at higher risk. Source: Javelin Strategy & Research, 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier. * The higher incidence of fraud among these users can be a factor of demographic composition or social network behavior.

  8. What Puts Users at Risk? “People are adopting new methods of interacting [online] faster than we can educate them on safe behavior.” - James Van Dyke, President and Founder of Javelin Strategy & Research

  9. What Puts Users at Risk? “The more information you share, and the more you transact, the more you’re at risk. One is simply a function of the other.” - James Van Dyke, President and Founder of Javelin Strategy & Research

  10. Security Breaches Becoming More Common Sony PlayStation Network › 70 million user accounts compromised. › Thieves accessed birth dates, emailaddresses, home addresses and login credentials. • LinkedIn • › Approx. 6,500,000 • encrypted passwords stolen and posted online. Sources: Hoffman, Stephanie (2011), Sony Warns Of Identity Theft Following PlayStation Hack http://www.crn.com/news/security/229402376/sony-warns-of-identity-theft-following-playstation-hack.htm LinkedIn press release http://press.linkedin.com/node/1212

  11. What are the Costs? In 2011… › 11.6 million adults were victims of identity fraud. › Identity fraud cost Americans $18 billion. › Victims lost an average of $1,513 to identity fraud. › Victims spent an average of $354 to resolve their cases. Source: Javelin Strategy & Research, 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier

  12. What Can You Do? Consumers › Be cautious about revealing personal information on social media sites. › Take advantage of privacy settings. › Shop on secure sites with URLs preceded by “https.” › Don’t share personal information while using public Wi-Fi.

  13. What Can You Do? Employers › Offer identity fraud protection as an employee benefit. › Educate employees about security best practices. › Offer support for user-supplied mobile devices.

  14. Protection as a Service Identity theft protection services are a valuable benefit for all types of businesses. › Proactive alerts: Notifies clients when personal information is being used to apply for utilities, credit cards and loans. › Remediation: Helps victims recover if identity fraud occurs.

  15. What to Look for in Identity Theft Protection Services: › Does the service cover identity theft and/or identity fraud? › Is there an online portal or other simple way to track activity? › If identity theft or fraud occurs, does the company offer remediation or do they just notify me—and then I have to take care of the issue? › What are the hours of operation, and if they aren’t 24/7, what happens if something occurs after hours? › How easy is it for my employees or members to enroll?

  16. A Virtual Necessity for Your Business By offering identity theft protection, you can: › Build stronger relationships with employees, customers and members. › Ensure secure productivity for your workforce. › Develop new business and revenue opportunities. Visit LifeLockBusiness.com or call 1-877-511-7906 to learn how.

More Related