2 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA, SINGAPORE, SOUTH AFRICA, SWEDEN, TURKEY, UNITED ARAB EMIRATES, UNITED KINGDOM, UNITED STATES OF AMERICA 13,018 ONLINE ADULTS AGED EXPERT COLLABORATORS ADAM PALMER, NORTON LEAD CYBER SECURITY ADVISOR MARIAN MERRITT, NORTON INTERNET SAFETY ADVOCATE
3 KEY THEMES THE SCALE OF CONSUMER CYBERCRIME ONE-AND-A-HALF MILLION VICTIMS DAILY THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME US $110 BILLION ANNUALLY CHANGING FACE OF CYBERCRIME CYBERCRIME GOES SOCIAL AND MOBILE SECURITY IQ: MIXED REPORT CARD FOR CONSUMERS CONSUMERS WISE UP TO TRADITIONAL THREATS, BUT MANY STILL UNAWARE AS TO HOW CYBERCRIME IS RAPIDLY EVOLVING STRONG PASSWORDS ARE KEY A POTENTIAL GATEWAY FOR CYBERCRIMINALS
4 THE SCALE OF CONSUMER CYBERCRIME 556 MILLION VICTIMS PER YEAR MORE THAN THE ENTIRE POPULATION OF THE EUROPEAN UNION 1.5+ MILLION VICTIMS PER DAY 18 VICTIMS PER SECOND
5 THE SCALE OF CONSUMER CYBERCRIME 2/3 ONLINE ADULTS HAVE BEEN VICTIMS OF CYBERCRIME IN THEIR LIFETIME 46% VICTIMS IN PAST YEAR CLOSE TO HALF OF ONLINE ADULTS HAVE FALLEN VICTIM TO ATTACKS SUCH AS MALWARE, VIRUSES, HACKING, SCAMS, FRAUD & THEFT
6 THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME $110 BN THE COST AMERICANS SPEND ANNUALLY ON FAST FOOD OTHER; 15% 85% OF DIRECT FINANCIAL COSTS ARE A RESULT OF FRAUD, REPAIRS, THEFT & LOSS REPAIRS; 26% FRAUD; 42% USD $197 AVERAGE COST PER VICTIM THEFT OR LOSS; 17% ENOUGH TO BUY A WEEK S WORTH OF NUTRITIOUS FOOD FOR A FAMILY OF FOUR IN THE UNITED STATES
7 THE GLOBAL PRICETAG OF CONSUMER CYBERCRIME 2 BN RUSSIA 21 USA BN 16 EUROPE BN 46 CHINA BN 2 BN MEXICO 8 INDIA BN 0.5 JAPAN BN 8 BRAZIL BN 2 BN AUSTRALIA ALL AMOUNTS IN USD
8 CHANGING FACE OF CYBERCRIME: CYBERCRIME GOES MOBILE AS CONSUMERS GO MOBILE, SO DO CYBERCRIMINALS 2/3 OF ADULTS USE A MOBILE DEVICE TO ACCESS THE INTERNET 2X MOBILE VULNERABILITIES MOBILE VULNERABILITIES DOUBLED IN 2011 FROM 2010* 31% OF MOBILE USERS RECEIVED A TEXT MESSAGE FROM SOMEONE THEY DIDN T KNOW REQUESTING THAT THEY CLICK ON AN EMBEDDED LINK OR DIAL AN UNKNOWN NUMBER TO RETRIEVE A VOIC *Symantec Internet Security Threat Report, Volume 17 (April 2012)
9 CHANGING FACE OF CYBERCRIME: CYBERCRIME GOES MOBILE YET IT CAN BE PREVENTED 35% OF ADULTS HAVE LOST THEIR MOBILE DEVICE OR HAD IT STOLEN 2/3 DON T USE A SECURITY SOLUTION FOR THEIR MOBILE DEVICE 44% AREN T AWARE THAT SECURITY SOLUTIONS FOR MOBILE DEVICES EXIST
10 RISKY BEHAVIOR ON POTENTIALLY UNSECURE WI-FI 44% OF ADULTS ACCESS PERSONAL S VIA FREE OR UNSECURED WI-FI CONNECTIONS 2/3 GLOBALLY OF ONLINE ADULTS USE FREE PUBLIC OR UNSECURED WI-FI 53% OF THOSE WHO USE FREE OR UNSECURED Wi-FI CONNECTIONS ARE CONCERNED ABOUT THE SECURITY OF THEIR CONNECTION
11 RISKY BEHAVIOR ON POTENTIALLY UNSECURE WI-FI 67% ACCESS PERSONAL 63% ACCESS THEIR SOCIAL NETWORK ACCOUNT 31% SHOP ONLINE 24% ACCESS THEIR BANK ACCOUNT
12 CHANGING FACE OF CYBERCRIME: CYBERCRIME GOES SOCIAL 4/10 SOCIAL NETWORK USERS HAVE FALLEN VICTIM TO CYBERCRIME ON SOCIAL NETWORKING PLATFORMS 1/6 SOCIAL NETWORK USERS REPORT THAT SOMEONE HAS HACKED INTO THEIR PROFILE AND PRETENDED TO BE THEM 3/4 BELIEVE CYBERCRIMINALS ARE SETTING THEIR SIGHTS ON SOCIAL NETWORKS 1/10 SOCIAL NETWORK USERS HAVE FALLEN VICTIM TO A SCAM OR FAKE LINK ON SOCIAL NETWORK PLATFORMS
13 RISKY BEHAVIOR ON SOCIAL MEDIA LOG OUT 1/3 DON T LOG OUT AFTER EACH SESSION 1/5 DON T CHECK LINKS BEFORE SHARING 1/6 HAVE NO IDEA IF THEIR SETTINGS ARE PUBLIC OR PRIVATE LESS THAN HALF USE A SECURITY TOOL TO PROTECT AGAINST SOCIAL NETWORKING THREATS ONLY HALF USE PRIVACY SETTINGS TO CONTROL WHAT INFORMATION THEY SHARE AND WITH WHOM
14 SOCIAL FRENEMIES? CONSUMERS ARE ONLY AS SECURE AS THEIR CIRCLE OF SOCIAL NETWORK FRIENDS (INCLUDING FRIENDS OF FRIENDS) 36% HAVE ACCEPTED FRIEND REQUESTS FROM PEOPLE THEY DO NOT KNOW 3/10 HAVE RECEIVED POSTS OR MESSAGES THAT THEY SUSPECT ARE NOT ACTUALLY FROM FRIENDS
15 SOCIAL NETWORK STRESSORS REVEALED 36% OF SOCIAL NETWORK USERS CHECK THEIR SOCIAL NETWORK AS SOON AS THEY CAN AFTER WAKING UP 27% ADMIT THAT, UPON GETTING TO WORK, THEY ARE MORE LIKELY TO CHECK THEIR MAIN SOCIAL NETWORK ACCOUNT THAN WORK S 16% WOULD END A RELATIONSHIP AS A CONSEQUENCE OF SEEING SOMETHING THEY DID NOT LIKE ABOUT A PERSON ONLINE 28% FEEL GUILTY WHEN THEY DON T REPLY TO A SOCIAL NETWORK MESSAGE WITHIN A FEW HOURS
16 CONSUMERS SECURITY IQ HIGH MARKS FOR SOME SECURITY FUNDAMENTALS 89% DELETE SUSPICIOUS S FROM PEOPLE THEY DON T KNOW 83% HAVE AT LEAST A BASIC ANTIVIRUS SOLUTION 78% DON T OPEN ATTACHMENTS OR LINKS IN UNSOLICITED S OR TEXTS GOOD JOB!
17 CONSUMERS SECURITY IQ BUT STILL ROOM FOR IMPROVEMENT... 30% DO NOT THINK ABOUT CYBERCRIME WHEN ONLINE BECAUSE THEY DO NOT EXPECT THAT IT WILL HAPPEN TO THEM 21% DO NOT TAKE STEPS TO SECURE THEIR PERSONAL INFO WHEN ACCESSING THE INTERNET?
18 CONSUMERS SECURITY IQ MANY ONLINE ADULTS DON T KNOW OR RECOGNIZE HOW VIRUSES OR MALICIOUS SOFTWARE ACTS 40% DO NOT KNOW THAT A VIRUS OR MALWARE CAN ACT IN A DISCRETE FASHION, MAKING IT HARD TO RECOGNIZE IF A COMPUTER HAS BEEN COMPROMISED 49% AGREE THAT UNLESS THEIR COMPUTER CRASHES OR GOES SLOW, IT S HARD TO KNOW IF THEIR COMPUTER IS INFECTED WITH A VIRUS OR MALWARE
19 CONSUMERS SECURITY IQ AND CONSUMERS DON T KNOW HOW TO PROTECT THEMSELVES 55% AREN T 100% SURE THEIR COMPUTER IS CURRENTLY CLEAN AND FREE FROM VIRUSES 3/10 DON T UNDERSTAND THE RISK OF CYBERCRIME OR HOW TO PROTECT THEMSELVES ONLINE 48% ARE ONLY USING BASIC ANTIVIRUS PROTECTION
20 STRONG PASSWORDS STILL KEY NEARLY HALF 46% HAVE BEEN NOTIFIED TO CHANGE THEIR PASSWORD BECAUSE THEIR PASSWORD OR PRIVACY WAS COMPROMISED TOP 3 ACCOUNTS PEOPLE HAVE RECEIVED NOTIFICATIONS TO CHANGE PASSWORDS FOR, FOLLOWING A COMPROMISE: 27% SOCIAL NETWORK 19% BANK ACCOUNT 15%
21 STRONG PASSWORDS STILL KEY IS A POTENTIAL GATEWAY FOR CRIMINALS LOOKING FOR PERSONAL / CORPORATE INFORMATION WHAT PEOPLE SEND BY 50% 42% 22% 17% PERSONAL PHOTOGRAPHS WORK RELATED DOCUMENTS AND CORRESPONDENCE BANK STATEMENTS PASSWORDS FOR OTHER ONLINE ACCOUNTS YET 40% DON T USE COMPLEX PASSWORDS OR CHANGE THEIR PASSWORDS REGULARLY
22 WHO IS AFFECTED MOST BY CYBERCRIME? HIGHEST NUMBER OF CYBERCRIME VICTIMS FOUND IN: RUSSIA 92% CHINA 84% SOUTH AFRICA 80% CYBERCRIME VICTIMS MORE LIKELY TO BE: MALE 71% (COMPARED TO 63% OF FEMALES) MILLENNIAL - 75% (COMPARED TO 56% OF BABY BOOMERS) AND: MOBILE INTERNET USERS SOCIAL NETWORK USERS
23 CONCLUSION $110 BILLION THE COSTS OF CYBERCRIME ARE CRIMINAL: $110 BN LOST IN JUST 12 MONTHS. 556 MILLION VICTIMS 1.5M ADULTS BECOME CYBERCRIME VICTIMS EVERY DAY - THAT S 18 VICTIMS PER SECOND. CHANGING FACE OF CYBERCRIME MORE ONLINE ADULTS THAN LAST YEAR INDICATED THAT THEY HAVE FALLEN VICTIM TO NEW FORMS OF CYBERCRIME SUCH AS THOSE FOUND ON SOCIAL NETWORKS OR MOBILE DEVICES A SIGN THAT CYBERCRIMINALS ARE STARTING TO FOCUS THEIR EFFORTS ON THESE INCREASINGLY POPULAR PLATFORMS CONSUMERS DON T RECOGNIZE CYBERCRIME HAS CHANGED HALF OF ONLINE ADULTS DON T KNOW OR RECOGNIZE HOW MALWARE OR CYBERCRIME ACTS HAVE EVOLVED AND DON T KNOW HOW TO PROTECT THEMSELVES. CYBERCRIMINALS METHODS HAVE CHANGED NOT ONLY DO THEY WANT TO AVOID DETECTION FOR AS LONG AS POSSIBLE, THEY RE CHANGING THEIR TACTICS TO TARGET FAST GROWING MOBILE PLATFORMS AND SOCIAL NETWORKS WHERE CONSUMERS ARE LESS AWARE OF THE SECURITY RISKS. STRONG PASSWORDS KEY ACCOUNTS CAN BE A GATEWAY FOR CRIMINALS LOOKING FOR PERSONAL AND CORPORATE INFORMATION, WITH PEOPLE SENDING EVERYTHING FROM PERSONAL PHOTOS TO WORK RELATED CORRESPONDENCE TO BANK STATEMENTS AND PASSWORDS FOR OTHER ONLINE ACCOUNTS. AND YET 40% DON T USE COMPLEX PASSWORDS OR CHANGE THEIR PASSWORDS REGULARLY
24 THANK YOU
25 THE METHODOLOGY DETAIL STRATEGYONE CONDUCTED AN ONLINE SURVEY AMONG: 13,018 ADULTS THE SURVEY WAS CONDUCTED IN 24 COUNTRIES (AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, FRANCE, DENMARK, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA, SOUTH AFRICA, SWEDEN, TURKEY, UNITED ARAB EMIRATES, UNITED KINGDOM AND UNITED STATES).* THE SURVEY WAS CONDUCTED IN THE PRIMARY LANGUAGE OF EACH COUNTRY, AND QUESTIONS ASKED WERE IDENTICAL ACROSS ALL COUNTRIES. INTERVIEWS WERE CONDUCTED BETWEEN 16TH JULY TH JULY THE MARGIN OF ERROR FOR THE TOTAL SAMPLE OF ADULTS (N=13, 018) IS + 0.9% AT THE 95% LEVEL OF CONFIDENCE. IMPORTANT NOTES: THE NORTON CYBERCRIME REPORT IS AN ANNUAL REPORT COMMISSIONED BY NORTON BY SYMANTEC AIMED AT UNDERSTANDING HOW CYBERCRIME AFFECTS CONSUMERS AND HOW THE ADOPTION AND EVOLUTION OF NEW TECHNOLOGIES IMPACTS CONSUMERS SECURITY. THE RESEARCH WAS CONDUCTED BY STRATEGYONE, AN INTERNATIONAL RESEARCH AGENCY ADULT RESPONDENTS WERE INTERVIEWED IN EACH OF USA AND INDIA. THE GLOBAL DATA HAS BEEN WEIGHTED TO ENSURE ALL COUNTRIES HAVE EQUAL REPRESENTATION OF N=500 ADULTS. * REFERENCES TO DATA CHANGES IS BASED UPON 20 TRACKING MARKETS ONLY: AUSTRALIA, BRAZIL, CANADA, CHINA, FRANCE, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, SOUTH AFRICA, SWEDEN, UNITED ARAB EMIRATES, UNITED KINGDOM, UNITED STATES.
26 MOBILE CYBERCRIME IS DEFINED AS ANY OF THE FOLLOWING ACTIVITIES: I RESPONDED TO AN UNSOLICITED SMS TEXT MESSAGE WHICH CAPTURED MY PERSONAL DETAILS MY PHONE WAS INFECTED AND A TEXT MESSAGE WAS SENT FROM MY MOBILE PHONE WITHOUT MY PERMISSION OR KNOWLEDGE THAT I LATER HAD TO PAY FOR I EXPERIENCED ANOTHER TYPE OF CYBERCRIME ON MY CELL / MOBILE PHONE / TABLET DEVICE DEFINITION OF CYBERCRIME CYBERCRIME IS DEFINED AS ANY OF THE FOLLOWING ACTIVITIES: COMPUTER VIRUSES OR MALICIOUS SOFTWARE APPEARED ON MY COMPUTER I RESPONDED TO A FORGED, SPOOFED OR FAKE OR WEBSITE WHICH CAPTURED MY PERSONAL DETAILS I HAVE EXPERIENCED ONLINE BULLYING, ONLINE STALKING, HATE CRIME OR OTHER FORM OF ONLINE HARASSMENT SOMEONE HAS HACKED INTO MY ACCOUNT AND PRETENDED TO BE ME SOMEONE HAS HACKED INTO MY SOCIAL NETWORKING PROFILE AND PRETENDED TO BE ME I WAS APPROACHED ONLINE BY SOMEONE IN AN UNWANTED SEXUAL WAY I RESPONDED TO ONLINE SCAMS I EXPERIENCED ONLINE CREDIT CARD FRAUD I EXPERIENCED IDENTITY THEFT I RESPONDED TO AN UNSOLICITED SMS TEXT MESSAGE WHICH CAPTURED MY PERSONAL DETAILS MY PHONE WAS INFECTED AND A TEXT MESSAGE WAS SENT FROM MY MOBILE PHONE WITHOUT MY PERMISSION OR KNOWLEDGE THAT I LATER HAD TO PAY FOR I EXPERIENCED ANOTHER TYPE OF CYBERCRIME ON MY CELL / MOBILE PHONE / TABLET DEVICE I EXPERIENCED ANOTHER TYPE OF CYBERCRIME ON MY DESKTOP OR LAPTOP COMPUTER SOCIAL CYBERCRIME IS DEFINED AS ANY OF THE FOLLOWING ACTIVITIES ON SOCIAL NETWORKING PLATFORMS: I HAVE BEEN HARASSED OR BULLIED OR HAD INAPPROPRIATE CONTENT POSTED ABOUT ME I HAVE RESPONDED TO A FORGED OR FAKE MESSAGE OR WEBSITE TRYING TO GET MY PERSONAL DETAILS SUCH AS PASSWORDS, BANK ACCOUNT INFORMATION (I.E., PHISHING) I CLICKED ON A LINK OR A LIKE AND IT TOOK ME TO A BLANK PAGE, OR REPOSTED ITSELF AUTOMATICALLY INTO MY ACCOUNT I HAVE FALLEN FOR A SCAM OR CLICKED ON A FAKE LINK I HAVE CLICKED ON A LINK OR LIKED SOMETHING WHICH HAS THEN REPOSTED ITSELF ONTO MY PROFILE
27 EXTRAPOLATIONS CALCULATIONS 1) OVER 556 MILLION VICTIMS IN 24 COUNTRIES OVER PAST 12 MONTHS: ONLINE POPULATION FROM CIA FACTBOOK (24 COUNTRY TOTAL = 1, 015,861,551. ONLINE ADULTS PER COUNTRY X % CYBERCRIME VICTIMS PAST 12 MONTHS PER COUNTRY = 556,152,181 (SUM OF 24 COUNTRIES). 2) 18 CYBERCRIME VICTIMS EVERY SECOND / 1058 CYBERCRIME VICTIMS EVERY MINUTE / ALMOST 64,000 PER HOUR / 1.5 MILLION PER DAY IMPACTING OVER 556 MILLION ADULTS IN THE PAST YEAR IN 24 COUNTRIES* VICTIMS OVER PAST 12 MONTHS (AS ABOVE) 556,152,181 / 365 DAYS PER YEAR / 24 HOURS / 60 MINUTES / 60 SECONDS. 3) CYBERCRIME COST NEARLY $110 BILLION IN THE LAST YEAR IN 24 COUNTRIES VICTIMS OVER PAST 12 MONTHS (PER COUNTRY) X AVERAGE FINANCIAL COST OF CYBERCRIME (PER COUNTRY IN US CURRENCY). FIGURE SHOWN IN THE SUM OF ALL COUNTRIES TOTAL COST.
EUROPEAN MOBILE INSIGHTS 2012 NORTON CYBERCRIME REPORT APRIL 2013 EUROPEAN MOBILE INSIGHTS: 2012 NORTON CYBERCRIME REPORT 9 COUNTRIES DENMARK, FRANCE, GERMANY, ITALY, NETHERLANDS, POLAND, RUSSIA, SWEDEN,
Norton Online Reputation Report: Why Millennials should manage their online footprint France May 2016 Methodology A quantitative survey was conducted online among 3,038 mobile users aged 18-34 years who
Norton Online Reputation Report: Why Millennials should manage their online footprint Germany May 2016 Methodology A quantitative survey was conducted online among 3,038 mobile users aged 18-34 years who
National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
2012 Endpoint Security Best Practices Survey GLOBAL RESULTS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Top tier organizations fare better against attacks... 8 Finding 2: Top tier organizations
2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
NORTON CYBERSECURITY INSIGHTS REPORT Get informed about the truths of online crime and the personal impact it has on you Table of Contents > INTRODUCTION... 3 > WE KNOW THE RISK FOR ONLINE CRIME IS HIGH...
cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends
Exploring the Landscape of Philippine Cybersecurity Understanding the Risk and Taking Appropriate Steps to Mitigate Cybersecurity Threats Freddy Tan, CISSP Chairperson, (ISC)² Board of Directors Copyright
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
HAS BRAZIL REALLY TAKEN OFF? BRAZIL LONG-RUN ECONOMIC GROWTH AND CONVERGENCE COUNTRY PROFILE: A COUNTRY IN TRANSFORMATION POLICY RECOMENDATIONS COUNTRY PROFILE Brazilian Equivalent Population in The World
TrendLabs Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. We live out our digital lives on the Internet. There, communication is quicker and easier, and our
Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the
Income INTECH Global Income Managed Volatility Fund Australia 0.0066 0.0375 Austria 0.0045 0.0014 Belgium 0.0461 0.0138 Bermuda 0.0000 0.0059 Canada 0.0919 0.0275 Cayman Islands 0.0000 0.0044 China 0.0000
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
Special Eurobarometer 423 CYBER SECURITY SUMMARY Fieldwork: October 2014 Publication: February 2015 This survey has been requested by the European Commission, Directorate-General for Home Affairs and co-ordinated
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
A A GENERAL ENGLISH Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + 1 Internet crime Match the following words to their correct definitions: 1. hacker a. a computer program which can make copies of itself
International Institute of Business Analysis Salary Survey Report December 15, 2013 Introduction International Institute of Business Analysis (IIBA) is the independent, nonprofit, professional association
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
SECURITY OF VIRTUAL INFRASTRUCTURE IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks survey details: More than 5500 companies in 25+ countries around the world Top managers
Kenya Internet Security Threat Profile Worldwide Ranking.%.%.%.%.%.%.%.%.%.%.%.% Overall Average Spam Zombies Malicious Code Phishing Hosts Bots Network Copyright Symantec Corporation. All rights reserved.
World Consumer Income and Expenditure Patterns 2014 14th edi tion Euromonitor International Ltd. 60-61 Britton Street, EC1M 5UX TableTypeID: 30010; ITtableID: 22914 Income Algeria Income Algeria Income
The Apsalar App Install and Transaction FRAUD INDEX An investigation into the instance of fraud in in-app transactions and app installs JULY 2015 INTRODUCTION Digital marketing has lately focused significant
Keeping you and your computer safe in the digital world. After completing this class, you should be able to: Explain the terms security and privacy as applied to the digital world Identify digital threats
Contents Introduction... 1 Main findings... 2 Methodology... 3 Section 1. Device usage... 4 Section 2. Online and on the move: Internet activity... 6 Section 3. The connected treasure chest: what is stored
The Path Forward International Women s Day 2012 Global Research Results Research objectives Accenture conducted its global research study, The Path Forward for release on International Women s Day to gain
2016 Edelman Trust Barometer The State of Trust Methodology General Online Population 5 years in 25+ markets Ages 18+ 1,150 respondents per country Online Survey in 28 Countries 16 years of data 33,000+
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
Report on Government Information July 1 - December 31, 2014 apple Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software
Career Capital 2014 Global Research Results International Women s Day 2014 1 Research Objectives Accenture conducted its global research study, Career Capital for release on International Women s Day to
Business Attitudes Toward Cybersecurity 2014 Contents The Main Findings... 2 Current Status of Cybersecurity in Business... 2 Business Cybersecurity Trends... 2 Methodology... 3 Current Status of Cybersecurity
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer
Report on Government Information July 1 - December 31, 2015 Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software and
2009 Antispyware Coalition Public Workshop Jeffrey Fox Technology Editor, Consumer Reports Media contact: Lauren Hackett, 914-378-2561 Background For several years, Consumer Reports has been testing and
Cross-border Executive Search to large and small corporations through personalized and flexible services In-depth local knowledge of each job market as well as reliable information on compensation, industry
An Introduction on How to Better Protect Your Computer and Sensitive Data Common Security Problems Computer users who fail to use strong passwords Constant attacks by viruses, worms, key loggers and bots
www.pwc.com/us/nes Global s Global s April 14, 2011 This document has been prepared pursuant to an engagement between PwC and its Client. As to all other parties, it is for general information purposes
Appendix 1: Full Country Rankings Below please find the complete rankings of all 75 markets considered in the analysis. Rankings are broken into overall rankings and subsector rankings. Overall Renewable
STATE OF GLOBAL E-COMMERCE REPORT (Preview) February 2013 THE E-COMMERCE REPORT WHAT IS THE E-COMMERCE REPORT? It is an annual investigation into the global uptake and impact of e- commerce. The report
Last updated: 4 September 2015 Reporting practices for domestic and total debt securities While the BIS debt securities statistics are in principle harmonised with the recommendations in the Handbook on
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
1 Cost of Data Breach Study 2014 By Digital Empowerment Foundation IBM, in association with the Ponemon Institute released its 2014 Cost of Data Breach Study which aims to measure the cost that companies
Sample Questions Part I: Good Neighborhoods, Bad Neighborhoods In what way is the Internet like a city? (It contains good places and dangerous places.) Name five different kinds of bad neighborhood websites.
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright
Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security
10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth
400,000000 Almost 400 million people 1 fall victim to cybercrime every year. A common way for criminals to attack people is via websites, unfortunately this includes legitimate sites that have been hacked
Special Eurobarometer 423 CYBER SECURITY REPORT Fieldwork: October 2014 Publication: February 2015 This survey has been requested by the European Commission, Directorate-General for Home Affairs and co-ordinated
BT Managed Event and BT Self-Managed Event (also referred to as Express, Plus and Premium) Conference Bridge and Call for Booked Audio Conferencing Services will comprise the following for each phone-conference:
CONSUMERS' ACTIVITIES WITH MOBILE PHONES IN STORES Global GfK survey February 2015 1 Global GfK survey: Consumers activities with mobile phones in stores 1. Methodology 2. Global results 3. Country results
Job searching online has become the most popular method of finding employment. Searching for the type of job you want is fast and easy, and you can see new jobs as soon as employers / agencies post them.
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Security and Internet Censorship Computer Literacy 1 Lecture 24 13/11/2008 Topics Security Hacker Viruses Phishing Firewall Censorship of the Internet 2 Examples Hacking or Cracking Cracking = Subverting
Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile
ecommercial SAT ecommercial Security Awareness Training Version 3.0 Welcome The goal of this training course is to provide you with the information needed to assist in keeping your online banking account
Internet Safety & Awareness Dan Tomlinson 02/23/2013 Internet risks Top six tips for online safety What to do if there is a problem Online safety resources Internet Risks Primary Threats to your Computer
TRUST IN MOBILE MALWARE REPORT THREAT REPORT: H2/2014 CONTENTS At a Glance 03-03 Forecasts and trends 04-04 Current situation: 4.500 new Android malware instances every day 05-05 Third-party App-Stores
PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD April 2013 As cybercriminals will have it, phishing attacks are quite the seasonal trend. It seems that every April, after showing a slight decline
Digital Consumer s Online Trends and Risks Modern consumers live a full-scale digital life. Their virtual assets like personal photos and videos, work documents, passwords to access social networking and
SYMANTEC INTELLIGENCE REPORT NOVEMBER 2013 p. 2 CONTENTS CONTENTS 3 Executive Summary 4 BIG NUMBERS 7 TARGETED ATTACKS 8 Targeted Attacks in 2013 8 Targeted Attacks per Day 8 First Attacks Logged by Month
: Risks, Management and Opportunity Key Note Address, European Summer Academy for Leading Women June 26, 2015, Malta Dr. Sarah Lohmann, Institute for Political Science, University of the German National
Digital Trends 2015 The Evolution of Digital Consumer Experiences Rob Pryce Sales & Strategy Director - Europe Digital Trends 2015 Methodology QUANTITATIVE 13,200 consumers in Brazil, Canada, China, France,