SlideShare a Scribd company logo
Fraudsters Hackers & Thieves!
How can we better protect our customers?
Fraudsters Hackers & Thieves
It’s official: consumers do not feel their
private data is being kept private
Looking around at the headlines, where high-
profile breach after high-profile breach is
documented, the lack of trust in data security is
no surprise.
Whether it be through a corporate breach, where
consumers’ confidential information is revealed as
part of thousands of records stolen or
inappropriately handled, or an attack that they
themselves initiate via inappropriate use of their
personal computer or mobile phone, or anything in
between, breaches have caused consumer distrust
to become rampant when it comes to whether or
not their personal information is being kept safe.
This is hammered home in a recent Global Survey
on Internet Security and Trust report from
CIGI-Ipsos, in which only 38 percent of consumers
surveyed trusted that their activities on the
internet are not being monitored.
64%
of consumers are more concerned
about their online privacy than a
year ago.
of consumers do not trust that
their internet activity is private.
62%
Source: CIGI-Ipsos Global Survey on Internet Security and Trust
Fraudsters Hackers & Thieves!
Stop for a moment and think
How much of our lives are now conducted online,
or are connected in some way?
When you wake up in the morning, you likely
check personal and perhaps work email from a
tablet or mobile device. You might update
Facebook, Instagram or Twitter. You may ask your
Amazon Echo what the weather and traffic is like
on your way to work. You might place a grocery
order online, or order a new supply of toilet paper.
On the ride into work, you might use a Bluetooth
headset to listen to voice mails or catch up on the
day’s headlines.
When a large majority of our everyday life is
conducted online, how did the industry get to a
point where the consumers who have bought
into this “connected vision” don’t feel safe being
online?
Fraudsters Hackers & Thieves!
Data breaches have consequences far
beyond the fines
Symantec conducted a survey on privacy within
the European Union, and found that 59 percent of
respondents have experienced a data protection
issue in the past.
Reported issues included being notified of a data
breach by a company that had access to some of
their personal information, having an email or
social media account hacked, having bank details
stolen, being a victim of online identify theft,
getting a computer virus, or responding to an
online scam or fake email.
Overall, 57 percent of respondents reported being
worried that their data is not safe.
of survey respondents
have experienced a data
protection issue.59%
TOP PRIVACY & SECURITY CONCERNS
Identity Theft
Banking Fraud
Data Collection
Personal Data Loss
45%
23%
22%
63%
Source: Symantec State of Privacy Report 2015
Fraudsters Hackers & Thieves!
The more connected online, the greater
the risk
The National Telecommunications & Information
Administration (NTIA) in May released a report
that correlates how connected we are online with
a higher risk of data breaches.
The report found that 9 percent of online house-
holds that used just one type of computing
device (such as a desktop, laptop, tablet,
Internet-connected mobile phone, wearable
device, or TV-connected device) reported a
security breach.
While 31 percent of those that used at least five
different types of devices reported a breach.
1 2 3 4 5+
9%
14%
25%
31%
Devices
Breaches
19%
Consumers using multiple
devices are at a higher risk
of data breach.
Source: U.S. Census Bureau NTIA Computer and Internet Use Supplement
Fraudsters Hackers & Thieves!
Fears and distrust about privacy, security
change how consumers use the Internet
Furthermore, there is a potential economic impact
to consumers’ distrust. The report also found that
consumers are so concerned with privacy and
security on the Internet that their household
opted out of participation in certain online
activities.
Forty-five percent of online households reported
that these concerns stopped them from
conducting financial transactions, buying goods or
services, posting on social networks, or
expressing opinions on controversial or political
issues via the Internet, and 30 percent refrained
from at least two of these activities. In households
that experienced a breach, these percentages are
even higher.
This fear and distrust is not without good reason.
In Symantec’s April 2016 Internet Security Threat
Report (ISTR), the security firm estimated that if
all breaches that occurred in 2015 reported the
number of consumers worldwide impacted, it
would total an estimated half-billion people.
40%
ONLINE ACTIVITIES STOPPED DUE TO PRIVACY & SECURITY CONCERNS
Conducting Financial Transactions
Buying Goods | Services
Posting on Social
35%
35%
Source: U.S. Census Bureau NTIA Computer and Internet Use Supplement
Fraudsters Hackers & Thieves!
Credit card numbers? Actually, there’s
a new kid in town
Financial information such as credit card
numbers are still coveted information, although
their per-card value is going down and their shelf
life is short since credit card companies and credit
card owners are using technology to shut down
fraudulent transactions quickly.
Instead, the new sought-after information
being targeted is information from insurance,
government and healthcare organizations.
The more details someone has about an
individual, the easier it is to commit identity fraud,
and targeting these groups provides more
complete profiles of individuals to criminals.
Real names are still the most common
(78 percent) type of information exposed,
according to the ISTR, followed by home
addresses, birth dates, Government IDs (such as
Social Security numbers), medical records, and
financial information.
The more details someone has about
a person, the easier it is to commit
identity fraud.
TOP INFORMATION EXPOSED
Real Names
HomeAddresses
Birth Dates
Gov. ID Numbers
Medical Records
78%
44%
41%
38%
36%
Source: Symantec Internet Security Threat Report Vol. 21
Fraudsters Hackers & Thieves!
The key to success, tailor the experience
to meet the individual user
Businesses can and should be doing much more
to secure customers’ private and oftentimes
sensitive information, reducing the risk for
everyone.
History has shown that when encryption
solutions—including email encryption—are
deployed properly, they work well.
But communications with customers requires a
different set of criteria than internal
communications or communications with partners.
User experience is key, according to a recent
research note from Gartner, consumers are likely
to resist the installation of third-party software or
apps on their devices to access secured content.
FOCUS ON USER EXPERIENCE
Through 2020, 95% of cloud
security failures will be the
customer’s fault. *Gartner
Source: Gartner Guide to Email Encryption
Fraudsters Hackers & Thieves!
So, how can you better protect your
customers?
In summary, consumers today have become much
more discerning about their online activities, and
know controlling their online activity plays a role
in helping protect their privacy.
The organizations they do business with need to
take the security of customers’ private data just as
seriously, and invest the time, effort and budget
into ensuring its safety.
About Echoworx
Since 2000, Echoworx has been bringing simplicity and
flexibility to encryption. Echoworx’s flagship solution,
OneWorld Enterprise Encryption, provides an adaptive, fully
flexible approach to encryption that ensures the privacy
of sensitive messages. Enterprises investing in Echoworx’s
OneWorld platform, are gaining an adaptive, fully flexible
approach to encryption, creating seamless customer
experiences and in turn earning their loyalty and trust.
Recommended Reading
How Effective B2C Encryption Protection Works
Top Banks Demand Performance & Volume
OneWorld Enterprise Encryption
Why OneWorld Encryption with Office 365?
Fraudsters Hackers & Thieves!
Email encryption doesn’t have to be cryptic
Fraudsters Hackers & Thieves
www.echoworx.com
info@echoworx.com
NorthAmerica 1 800.346.4193 | UK 44 0.800.368.5334
@Echoworx

More Related Content

PDF
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
PDF
The digital economy and cybersecurity
PDF
2019 Identity Protection and Data Breaches Survey
 
PDF
BLURRING BOUNDARIES
PDF
Security Practices: The Generational Gap | Infographic
PDF
IMC 618 - Public Relations Campaign
PDF
ISTR Internet Security Threat Report 2019
PDF
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
The digital economy and cybersecurity
2019 Identity Protection and Data Breaches Survey
 
BLURRING BOUNDARIES
Security Practices: The Generational Gap | Infographic
IMC 618 - Public Relations Campaign
ISTR Internet Security Threat Report 2019
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)

What's hot (20)

PDF
Detecting Frauds and Identifying Security Challenge | by Money2Conf
PDF
Keep your office secure
PDF
Adjusting Your Security Controls: It’s the New Normal
PDF
INFOGRAPHIC: The Evolution of Data Privacy
PDF
IC3 2019 Internet Crime Report
PDF
Global Commision on Internet Governance
PDF
As telcos go digital, cybersecurity risks intensify by pwc
PDF
TeleSign Consumer Account Security Report 2016 FINAL
PDF
Databreach forecast
PDF
Ict forensics and audit bb
PDF
Breach level index_report_2017_gemalto
PDF
Cyber Claims: GDPR and business email compromise drive greater frequencies
PDF
Security Concerns Around the World | Infographic
PDF
Mobile malware and enterprise security v 1.2_0
PDF
Intelligence-Driven Fraud Prevention
 
PDF
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
PPTX
Latin america cyber security market,symantec market share internet security,m...
PDF
Critical Update Needed: Cybersecurity Expertise in the Boardroom
PPTX
Lessons v on fraud awareness (digital forensics) [autosaved]
PDF
The 10 Fastest Growing Cyber Security Companies of 2017
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Keep your office secure
Adjusting Your Security Controls: It’s the New Normal
INFOGRAPHIC: The Evolution of Data Privacy
IC3 2019 Internet Crime Report
Global Commision on Internet Governance
As telcos go digital, cybersecurity risks intensify by pwc
TeleSign Consumer Account Security Report 2016 FINAL
Databreach forecast
Ict forensics and audit bb
Breach level index_report_2017_gemalto
Cyber Claims: GDPR and business email compromise drive greater frequencies
Security Concerns Around the World | Infographic
Mobile malware and enterprise security v 1.2_0
Intelligence-Driven Fraud Prevention
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Latin america cyber security market,symantec market share internet security,m...
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Lessons v on fraud awareness (digital forensics) [autosaved]
The 10 Fastest Growing Cyber Security Companies of 2017

Viewers also liked (18)

PDF
La formación continua como herramienta potenciadora de la administración pública
PPT
Two and a half men yeizel segarra 4ºd
PDF
Vol.2, issue 2, no.3 (1)
PPTX
The Academy (Marketing Management)
PPT
Yeizel greenpeace
PPT
School’s materials
PPT
Natural disaster yeizel segarra 4ºd
PPT
Noma´s restaurant
PDF
Manual de Normas y Procedimientos en materia de Denuncias
PPT
mua pendientes y pulseras
PDF
impacto-del-control-interno-en-la-administracion-publica-municipal
PDF
Manual Descriptivo por Clase de Cargo de la Contraloría del municipio Eulalia...
PDF
Manual de Normas y Procedimientos de Contrataciones Pública
PDF
Manual de Organizacion de la Oficina de Atención al Ciudadano
PPT
205 wikarta-kuliah i mektek ti
DOCX
MRP, MRP2 and ERP system in supply chain
PDF
Manual de normas y procedimiento para el trámite y otorgamiento de viáticos
PDF
Manual de normas y procedimientos para solicitud y aprobacion de permisos
La formación continua como herramienta potenciadora de la administración pública
Two and a half men yeizel segarra 4ºd
Vol.2, issue 2, no.3 (1)
The Academy (Marketing Management)
Yeizel greenpeace
School’s materials
Natural disaster yeizel segarra 4ºd
Noma´s restaurant
Manual de Normas y Procedimientos en materia de Denuncias
mua pendientes y pulseras
impacto-del-control-interno-en-la-administracion-publica-municipal
Manual Descriptivo por Clase de Cargo de la Contraloría del municipio Eulalia...
Manual de Normas y Procedimientos de Contrataciones Pública
Manual de Organizacion de la Oficina de Atención al Ciudadano
205 wikarta-kuliah i mektek ti
MRP, MRP2 and ERP system in supply chain
Manual de normas y procedimiento para el trámite y otorgamiento de viáticos
Manual de normas y procedimientos para solicitud y aprobacion de permisos

Similar to Fraudsters Hackers & Thieves (20)

PDF
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
PDF
Ericsson ConsumerLab: Privacy, security and safety online
PDF
Combating Cybersecurity Challenges with Advanced Analytics
PDF
SVB Cybersecurity Impact on Innovation Report - Overview
PDF
Norton Cyber Security Insights Report 2017
PDF
The economics of digital identity
PDF
Accenture four keys digital trust
PDF
TeleSign Consumer Account Security Report 2015 FINAL
PDF
Why is cyber security a disruption in the digital economy
PDF
Citrix Security Survey Guide
PDF
IE_ERS_CyberAnalysisReport
PDF
FRISS_Insurance fraud report 2020
PDF
SayanMitra.pdf
PPTX
Who is the next target and how is big data related ulf mattsson
PDF
The State of Privacy Report
PPTX
LifeLock Javelin Presentation
PDF
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
PDF
CBIZ Cyber Security - What Every Business Needs to Know
PDF
White Paper: The Age of Data
PDF
IBM X-Force Threat Intelligence Report 2016
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Ericsson ConsumerLab: Privacy, security and safety online
Combating Cybersecurity Challenges with Advanced Analytics
SVB Cybersecurity Impact on Innovation Report - Overview
Norton Cyber Security Insights Report 2017
The economics of digital identity
Accenture four keys digital trust
TeleSign Consumer Account Security Report 2015 FINAL
Why is cyber security a disruption in the digital economy
Citrix Security Survey Guide
IE_ERS_CyberAnalysisReport
FRISS_Insurance fraud report 2020
SayanMitra.pdf
Who is the next target and how is big data related ulf mattsson
The State of Privacy Report
LifeLock Javelin Presentation
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
CBIZ Cyber Security - What Every Business Needs to Know
White Paper: The Age of Data
IBM X-Force Threat Intelligence Report 2016

Recently uploaded (20)

PPT
Data mining for business intelligence ch04 sharda
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
Laughter Yoga Basic Learning Workshop Manual
PPTX
HR Introduction Slide (1).pptx on hr intro
DOCX
Business Management - unit 1 and 2
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
Tata consultancy services case study shri Sharda college, basrur
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPT
Chapter four Project-Preparation material
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PDF
A Brief Introduction About Julia Allison
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Data mining for business intelligence ch04 sharda
DOC-20250806-WA0002._20250806_112011_0000.pdf
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
Laughter Yoga Basic Learning Workshop Manual
HR Introduction Slide (1).pptx on hr intro
Business Management - unit 1 and 2
Ôn tập tiếng anh trong kinh doanh nâng cao
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Lecture (1)-Introduction.pptx business communication
Tata consultancy services case study shri Sharda college, basrur
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Chapter four Project-Preparation material
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
A Brief Introduction About Julia Allison
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...

Fraudsters Hackers & Thieves

  • 1. Fraudsters Hackers & Thieves! How can we better protect our customers?
  • 3. It’s official: consumers do not feel their private data is being kept private Looking around at the headlines, where high- profile breach after high-profile breach is documented, the lack of trust in data security is no surprise. Whether it be through a corporate breach, where consumers’ confidential information is revealed as part of thousands of records stolen or inappropriately handled, or an attack that they themselves initiate via inappropriate use of their personal computer or mobile phone, or anything in between, breaches have caused consumer distrust to become rampant when it comes to whether or not their personal information is being kept safe. This is hammered home in a recent Global Survey on Internet Security and Trust report from CIGI-Ipsos, in which only 38 percent of consumers surveyed trusted that their activities on the internet are not being monitored. 64% of consumers are more concerned about their online privacy than a year ago. of consumers do not trust that their internet activity is private. 62% Source: CIGI-Ipsos Global Survey on Internet Security and Trust Fraudsters Hackers & Thieves!
  • 4. Stop for a moment and think How much of our lives are now conducted online, or are connected in some way? When you wake up in the morning, you likely check personal and perhaps work email from a tablet or mobile device. You might update Facebook, Instagram or Twitter. You may ask your Amazon Echo what the weather and traffic is like on your way to work. You might place a grocery order online, or order a new supply of toilet paper. On the ride into work, you might use a Bluetooth headset to listen to voice mails or catch up on the day’s headlines. When a large majority of our everyday life is conducted online, how did the industry get to a point where the consumers who have bought into this “connected vision” don’t feel safe being online? Fraudsters Hackers & Thieves!
  • 5. Data breaches have consequences far beyond the fines Symantec conducted a survey on privacy within the European Union, and found that 59 percent of respondents have experienced a data protection issue in the past. Reported issues included being notified of a data breach by a company that had access to some of their personal information, having an email or social media account hacked, having bank details stolen, being a victim of online identify theft, getting a computer virus, or responding to an online scam or fake email. Overall, 57 percent of respondents reported being worried that their data is not safe. of survey respondents have experienced a data protection issue.59% TOP PRIVACY & SECURITY CONCERNS Identity Theft Banking Fraud Data Collection Personal Data Loss 45% 23% 22% 63% Source: Symantec State of Privacy Report 2015 Fraudsters Hackers & Thieves!
  • 6. The more connected online, the greater the risk The National Telecommunications & Information Administration (NTIA) in May released a report that correlates how connected we are online with a higher risk of data breaches. The report found that 9 percent of online house- holds that used just one type of computing device (such as a desktop, laptop, tablet, Internet-connected mobile phone, wearable device, or TV-connected device) reported a security breach. While 31 percent of those that used at least five different types of devices reported a breach. 1 2 3 4 5+ 9% 14% 25% 31% Devices Breaches 19% Consumers using multiple devices are at a higher risk of data breach. Source: U.S. Census Bureau NTIA Computer and Internet Use Supplement Fraudsters Hackers & Thieves!
  • 7. Fears and distrust about privacy, security change how consumers use the Internet Furthermore, there is a potential economic impact to consumers’ distrust. The report also found that consumers are so concerned with privacy and security on the Internet that their household opted out of participation in certain online activities. Forty-five percent of online households reported that these concerns stopped them from conducting financial transactions, buying goods or services, posting on social networks, or expressing opinions on controversial or political issues via the Internet, and 30 percent refrained from at least two of these activities. In households that experienced a breach, these percentages are even higher. This fear and distrust is not without good reason. In Symantec’s April 2016 Internet Security Threat Report (ISTR), the security firm estimated that if all breaches that occurred in 2015 reported the number of consumers worldwide impacted, it would total an estimated half-billion people. 40% ONLINE ACTIVITIES STOPPED DUE TO PRIVACY & SECURITY CONCERNS Conducting Financial Transactions Buying Goods | Services Posting on Social 35% 35% Source: U.S. Census Bureau NTIA Computer and Internet Use Supplement Fraudsters Hackers & Thieves!
  • 8. Credit card numbers? Actually, there’s a new kid in town Financial information such as credit card numbers are still coveted information, although their per-card value is going down and their shelf life is short since credit card companies and credit card owners are using technology to shut down fraudulent transactions quickly. Instead, the new sought-after information being targeted is information from insurance, government and healthcare organizations. The more details someone has about an individual, the easier it is to commit identity fraud, and targeting these groups provides more complete profiles of individuals to criminals. Real names are still the most common (78 percent) type of information exposed, according to the ISTR, followed by home addresses, birth dates, Government IDs (such as Social Security numbers), medical records, and financial information. The more details someone has about a person, the easier it is to commit identity fraud. TOP INFORMATION EXPOSED Real Names HomeAddresses Birth Dates Gov. ID Numbers Medical Records 78% 44% 41% 38% 36% Source: Symantec Internet Security Threat Report Vol. 21 Fraudsters Hackers & Thieves!
  • 9. The key to success, tailor the experience to meet the individual user Businesses can and should be doing much more to secure customers’ private and oftentimes sensitive information, reducing the risk for everyone. History has shown that when encryption solutions—including email encryption—are deployed properly, they work well. But communications with customers requires a different set of criteria than internal communications or communications with partners. User experience is key, according to a recent research note from Gartner, consumers are likely to resist the installation of third-party software or apps on their devices to access secured content. FOCUS ON USER EXPERIENCE Through 2020, 95% of cloud security failures will be the customer’s fault. *Gartner Source: Gartner Guide to Email Encryption Fraudsters Hackers & Thieves!
  • 10. So, how can you better protect your customers? In summary, consumers today have become much more discerning about their online activities, and know controlling their online activity plays a role in helping protect their privacy. The organizations they do business with need to take the security of customers’ private data just as seriously, and invest the time, effort and budget into ensuring its safety. About Echoworx Since 2000, Echoworx has been bringing simplicity and flexibility to encryption. Echoworx’s flagship solution, OneWorld Enterprise Encryption, provides an adaptive, fully flexible approach to encryption that ensures the privacy of sensitive messages. Enterprises investing in Echoworx’s OneWorld platform, are gaining an adaptive, fully flexible approach to encryption, creating seamless customer experiences and in turn earning their loyalty and trust. Recommended Reading How Effective B2C Encryption Protection Works Top Banks Demand Performance & Volume OneWorld Enterprise Encryption Why OneWorld Encryption with Office 365? Fraudsters Hackers & Thieves! Email encryption doesn’t have to be cryptic