User Survey on Phone Security and Usage
|
|
|
- Junior Benson
- 10 years ago
- Views:
Transcription
1 User Survey on Phone Security and Usage Frank Breitinger, Claudia Nickel Hochschule Darmstadt Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a wide variety of data stored on the devices which could be a high security risk in case of unauthorized access. A comprehensive user survey was conducted to get information about what data is really stored on the mobile devices, how it is currently protected and if biometric authentication methods could improve the current state. This paper states the results from about 550 users of mobile devices. The analysis revealed a very low securtiy level of the devices. This is partly due to a low security awareness of their owners and partly due to the low acceptance of the offered authentication method based on PIN. Further results like the experiences with mobile thefts and the willingness to use biometric authentication methods as alternative to PIN authentication are also stated. 1 Introduction The number of mobile phone users worldwide exceeded the mark of 4 billion last year for the first time; this means that two-thirds of the world s population use mobile phones. Especially in industrialized countries the trend is strongly towards increased usage of mobile data services [Bit09]. With growing availability of data tariffs and new functionalities, mobile internet and on mobile phones have become accessible to the masses. Modern mobile phones also allow photography, have integrated calendars or can be used as a notepad with consistently small size. These factors have led to an increase in different kinds of sensitive data stored on the mobile phone which makes them even more attractive to thieves. [Fla06] states that 800,000 inhabitants of England and Wales have been victim of mobile phone theft between mid of 2005 and mid of This documents the need for protecting the stored information by applying secure and user-friendly authentication methods which could e.g. be provided by using biometrics. This paper summarizes the results of a comprehensive survey about the security and usage of mobile phones. In order to reach a large and diverse group of people, the survey was realized as a printed survey and as an online questionnaire which was available for about six weeks in April and May Promotion has been made on social networks like facebook 1, different mailing lists, a gym and a physiotherapy. This work was supported by CASED ( 1
2 2 Analysis A total of 548 people took part in the survey, of which about 11% filled out the paper questionnaires. The survey has been in German. Age and gender distribution are given in table 1. It can be seen that the majority of participants (55%) was between 18 and 30 years old. There has been a significant difference between the age of the online participants (60% were between 18 and 30 years) and the people handing in the paper questionnaires, where nearly 75% of the respondents were older than 41 years. There is no significant difference between the number of males and females through all age groups. < > 60 unknown sum male female unknown total Table 1: Age and gender distribution of the participants. 2.1 Familiarity and usage The first four questions have been about the usage of the phone in general and the familarity to the phone s features and IT security. In each case the participant could choose a value between 1 and 4, the results are given in table 2. It reveals that approximately 65% of the mobile phone owners are private users 2. Mobile phones are important to their owners and most of them are mainly familiar with the features. Less familiar is the topic IT security. Only 19% answered, that they are familiar with this topic, nearly 15% even said they are not interested in IT security. 2.2 Using additional features In one question participants should state which additional features they are using. They could select between SMS, , internet, camera, calendar or add further ones. In the following question the kind of stored data should be stated. Again one could choose between the proposed data (phone numbers, addresses, s, appointments, birthdays and 2 This shows the same trend as the comprehensive online survey from 2008 (see [Ifa08]).
3 Question no answ. Usage of mobile device (1 = private, 4 = business) Importance of mobile device (1 = very important, 4 = unimportant) Knowledge of the features of the device (1 = very good, 4 = no interest) Knowledge of IT security (1 = very good, 4 = no interest) Table 2: General questions about familiarity and usage of mobile devices (results in percent). additional functionalities - Top 5 stored data - Top 5 1. SMS (92%) 1. phone numbers (99%) 2. camera (65%) 2. appointments (45%) 3. calendar (53%) 3. birthdays (40%) 4. internet (25%) 4. addresses (34%) 5. (17%) 5. s (24%) Table 3: Top 5 of additional functionalities and stored data on mobile phones. passwords/pins) or add further ones. In both cases participants were allowed to choose several answers. The top 5 of used additional features besides phoning and stored data are given in table 3. On the 6th place with 13% are passwords/pins, which will be in most cases freely available in case the mobile phone is lost (see section 2.4), as only 8% of the phones containing stored PINs of passwords are sufficiently secured. 2.3 Carrying and attending the mobile phone The answers to the question I carry my mobile phone mainly..., show fundamental differences between men and women. One of the seven possibilities (back trousers pocket, front trousers pocket, breast pocket, pocket at the belt, back pack, hand bag, other) could be chosen. Two-thirds of men answered to carry their mobile phone in the front trousers pocket while 63% of women carry their mobile phone in their purse. See figure 1 for more details. All respondents were asked how they take care of their mobile phone and nearly twothirds answered their phone is always within reach. See figure 2 for the proposed values and the distribution of given answers.
4 Figure 1: I carry my mobile phone mainly in my... Figure 2: My mobile phone is Security settings Section 2.2 showed that almost every mobile phone user saves personal data and 13% of the respondents even save passwords or PINs on their mobile devices. To see how this data is protected, the participants were asked to state which kind of action/input is necessary when using the phone after a standby phase. Figure 3 shows the possible answers to this multiple choice question. The most common setting when reactivating the mobile phone from standby mode is keylock. Only 13% of the phones are sufficiently protected by PIN or visual code 3 which is in half of the cases combined with keylock. Comparing these answers to the ones regarding the familiarness with IT security there are some accordances. Most participants using a PIN or visual code said they are familiar with IT security (32% chose option 1, 37% option 2, 25% option 3, 5% option 4, 1 didn t answer at that question). When asked for the reason for the low level of security (immediately usable or only key- Figure 3: Security level when reactivating from Figure 4: Reasons for the chosen low security standby mode. setting. lock) 40% answered it was chosen because it is faster and a further 34% answered they did not think about it. 17% stated that their phone does not have the function enter PIN after standby mode. For 3% of the participants, the PIN is too difficult to memorize (see figure 4). Table 4 shows the willingness of the participants to use biometric authentication in total and depending on the so far chosen security setting. More than 50% are interested in an 3 A visual code is a technique mostly used from the android operation system in which a pattern must be drawn; similar to a PIN.
5 would choose only use only PIN/ PIN/VC and total biometrics keylock immediately visual code keylock other yes 54.4% 55.1% 51.3% 41.5% 67.7% 66.7% no 37.8% 37.8% 38.5% 43.9% 29.4% 33.3% not specified 7.9% 7.1% 10.3% 14.6% 2.9% 0.0% Table 4: Willingness to use biometric authentication methods instead of the so far chosen security setting. alternative biometric authentication process, 73% of those just use the key lock so far. If this option would be available, 55% of the participants currently using keylock and 51% of the ones which can directly use their phone after standby phase would use biometric authentication instead. This indicates that offering biometric authentication methods on mobile devices would highly increase the security of the data stored in mobile devices. Participants which are willing to use biometric authentication, were asked which biometric modality/ies they would use. The favourite modality is fingerprint (87%), followed by speaker recognition (20%), face recognition (19%) and gait recognition (9%). 2.5 Mobile phone theft Figure 5: Locations at which mobile phones have been stolen. With increasing popularity of mobile phones, also the number of thefts increases. The survey from [Fla06] showed that 4% of households owning a mobile phone have experienced a mobile phone theft. The german TNS-Emnid are talking about more than 7% in year 2008 [NM08] and our survey shows a further growth as approximately 10% of the participants have experienced a mobile phone theft, 22% of those more than once. Analysis of this survey showed that the theft rate for men is 10% higher than the theft rate for women. Four out of five participants who have had their mobile phone stolen are younger than 30. Of the participants which experienced a mobile phone theft, 75% answered their mobile phone is always within reach and 21% said its unsupervised most of the time. The locations in which the thefts occurred (see figure 5) are similar to the ones reported in [Fla06, p15-17].
6 3 Conclusion As the number of mobile phones, their functionalities and application scenarios increases and hence also the amount of data stored on mobile devices, it is interesting and important to analyse the security awareness of the users which is mirrored by their chosen security settings. This paper states the result of a comprehensive survey with 548 participants. It is shown that after a stand by period only 13% of the mobile devices are secured with a PIN or visual code. This means that in 87% all data is freely available in case the phone is stolen or lost. The reason for unsecured phones is in 74% of the cases that it is faster or people did not even think about securing it. Offering biometric authentication methods on mobile phones would increase the number of secured phones as these methods would be used by about 54% of the participants. One reason for this might be that the problem of memorization and speed (see section 2.4) could be solved with biometric authentication. Comparing the results of this survey to the ones from 2006 in [Fla06], there are still a lot of parallels. In general it is necessary to increase the user s security awareness such that he chooses sufficient security settings. This could for example be achieved by publications like the Guidelines on mobile Phone and PDA Security (2008, see [JS08]) by the National Institute of Standards and Technology (NIST). On the other hand configuring a PIN or biometric authentication as default setting when reactivating the mobile phone would probably also increase the number of secured phones as many people did not even think about changing the settings. In addition to the possibility of data loss because of stolen of lost phones, also attacks on mobile devices (see e.g. [HJO08]) should be considered. References [Bit09] Bitkom. Mehr als vier Milliarden Handy-Nutzer weltweit aspx, August last checked: [german]. [Fla06] John Flatley. Mobile phone theft, plastic card and identity fraud /06. [HJO08] S.M. Habib, C. Jacob, and T. Olovsson. A practical analysis of the robustness and stability of the network stack in smartphones. In 11th International Conference on Computer and Information Technology (ICCIT 2008)., pages , [Ifa08] Ifak Institut, Media Markt Analysen. Typologie der Wünsche October last checked: [german]. [JS08] W. Jansen and K. Scarfone. Guidelines on Cell Phone and PDA Security. NIST Special Publication , October [NM08] Netzzeitung.de and Felix Magin. Das sollte man beim Handy-Verlust machen. July last checked: [german].
Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012
Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents
Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P: 222.333.4444
Working Together Managing and Securing Enterprise Mobility WHITE PAPER Larry Klimczyk Digital Defence P: 222.333.4444 Contents Executive Summary... 3 Introduction... 4 Security Requirements... 5 Authentication...
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot
Token Security or Just Token Security? A Vanson Bourne report for Entrust
Token Security or Just Token Security? A Vanson Bourne report for Entrust Foreword In 2011, Entrust Inc., an identity-based security company, partnered with respected technology research firm Vanson Bourne
Welcome Guide for MP-1 Token for Microsoft Windows
Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made
Consumers Awareness of, Attitudes Towards and Adoption of Mobile Phone Security
Consumers Awareness of, Attitudes Towards and Adoption of Mobile Phone Security Stewart Kowalski Ericsson Research, Kista, Sweden [email protected] Mikael Goldstein Migoli, Stockholm, Sweden
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda
Identity Theft: Prevention & Survival
Identity Theft: Prevention & Survival Crime of the Century Provide By: Nick Sabetta Don t t Let Someone Steal Your Good Name What is Identity Theft? When someone uses your personal information without
ONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Northeast Bank Mobile Deposit Service FAQ
Northeast Bank Mobile Deposit Service FAQ What is Northeast Bank Mobile Deposit? What items can be deposited via Northeast Bank Mobile Deposit service? What items cannot be deposited through Northeast
Unisys Security Index TM : US
Unisys Security Index TM : US 14 March 12 (Wave 1H 12) Lieberman Research Group 1 Contents Executive summary...3 Detailed findings...4 Supplemental questions...9 Variation by demographic group... 13 Polling
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary
BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME Executive Summary In support of National Cyber Security Awareness Month (October), ESET and the National Cyber Security Alliance (NCSA) commissioned
Securing Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
Trust Digital Best Practices
> ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or
Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)
Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected
Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty
Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty Conducted by Javelin Strategy & Research June 2010 All Rights Reserved Rising Fraud
Fraud Prevention Tips
Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back
What the Future of Online Banking Authentication Could Be
Universal Banking Solution System Integration Consulting Business Process Outsourcing Banking on Internet and mobile is gaining popularity The Pew Internet & American Life Project Tracking survey of December
Multi-Factor Authentication
Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to
Advisor Guide. www.grades First.com 1/2/13
2012 Advisor Guide www.grades First.com 1/2/13 Table of Contents Introduction. 1 Links and Support. 1 Mass Edit of Students 2-4 Home Tab... 5-9 Appointment Campaign 9-16 Home tab (Continued) 16-17 Search
3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.
G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely
Deutsche Bank db easynet. Secure method of use of the db easynet e-banking system
Deutsche Bank Secure method of use of the e-banking system Introduction Deutsche Bank pays particular attention to your security. Therefore, the funds entrusted to us by our Customers are protected, using
Many of these tips are just common sense and others are tips to keep in mind when doing a transaction, at ATMs, restaurants and merchants.
Credit and Debit Card Security Tips Many of these tips are just common sense and others are tips to keep in mind when doing a transaction, at ATMs, restaurants and merchants. Be careful with your PIN Always
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Information Systems. Connecting Smartphones to NTU s Email System
Information Systems Connecting Smartphones to NTU s Email System Connecting Smartphones to NTU s Email System Contents Things to be aware of before you start 3 Connecting a Windows Mobile 6 (6.0-6.5) Phone
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
Identity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection
Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself
How To Prevent Cybercrime
2013 NORTON REPORT 2013 NORTON REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA,
Your Digital Dollars Online & Mobile Banking
Your Digital Dollars Online & Mobile Banking There are a lot of benefits to being able to bank or make payments from just about anywhere, but it s important to know how to do these things safely. Understanding
Premium Advertising Sweden UK France Germany
Premium Advertising Sweden UK France Germany On behalf of Widespace 05.11.2015 Content Study design Management Summary Sample Results Total Sweden UK France Germany Contact 2 Study design Study characteristics
Smart Ideas for Smartphone Security
Page 1 of 6 8814 Fargo Road, Suite 105 Richmond, Virginia 804.360.4490 www.seltekinc.com July 2013 Computer Forensics IT Support Security ediscovery Security Apps for your Smartphone Smart Ideas for Smartphone
Wealthy Consumers and Real Estate
Wealthy Consumers and Real Estate Custom Research for Coldwell Banker Previews International Table of Contents Topic Slide # Research Notes and Methodology 3 Key Findings 7 Survey Results Real Estate Profile
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
Biometrics for payments. The use of biometrics in banking
Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,
News consumption in the UK: 2014 Report
News consumption in the UK: 2014 Report Research Document Publication date: June 2014 About this document This report provides key findings from Ofcom s 2014 research into news consumption across television,
There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.
There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business. We put this document together to help you understand
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
The definitive guide to consumer perceptions on home security in Australia. Secure Homes Report. ADT Always There
The definitive guide to consumer perceptions on home security in Australia Secure Homes Report 2012 ADT Always There KEY FINDINGS AT A GLANCE 30% of surveyed residents have been a victim of a break-in
First Citizens Mobile & Tablet Banking
First Citizens Mobile & Tablet Banking What is Mobile Banking? Mobile Banking is the ultimate on-demand service. With it, members can access their account information 24/7 from any mobile phone with either
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more
Turning your account into a retirement income. BASF UK Group Pension Scheme
Turning your account into a retirement income BASF UK Group Pension Scheme November 2008 Helping you decide As you approach retirement, you will need to make some important decisions about the type of
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Preventing Identity Theft National City Bank. How to protect your identity
Preventing Identity Theft National City Bank How to protect your identity Understanding and Preventing Identity Theft Identity Theft is the fastest growing crime in America 500,000 people fall victim to
If you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
Platinum and Platinum Rewards Visa EMV Credit Cards Frequently Asked Questions (FAQ s)
Platinum and Platinum Rewards Visa EMV Credit Cards Frequently Asked Questions (FAQ s) What is EMV? EMV stands for Europay, MasterCard and Visa. EMV or chip cards have been in use in Europe for over 20
Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android
Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.
Today s mobile ecosystem means shared responsibility
It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has
AN ANALYSIS OF CUSTOMER AND SELLER VERIFICATION IN E-COMMERCE 2.0
AN ANALYSIS OF CUSTOMER AND SELLER VERIFICATION IN E-COMMERCE 2.0 Iman Khaghanifar Department of Mathematics Eastern Mediterranean University, Famagusta, North Cyprus via Mersin 10, Turkey Phone: (+90)5338402371
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
CONTENTS. About the report 3. Methodology & survey demographics. Key findings. SECTION 1: Most-used online resources and devices
Published July 2014 Published July 2014 Contents CONTENTS About the report 3 Methodology & survey demographics 4 Key findings 5 SECTION 1: Most-used online resources and devices Online versus offline resources
Smartphone Security Survey of U.S. consumers
Smartphone Security Survey of U.S. consumers Sponsored by AVG Technologies Independently conducted by Ponemon Institute LLC Publication Date: March 2011 Ponemon Institute Research Report Smartphone Security
PRACTICAL MONEY GUIDES DEBIT CARD BASICS. What you need to know about using your debit card
PRACTICAL MONEY GUIDES DEBIT CARD BASICS What you need to know about using your debit card MONEY IN THE BANK If credit cards mean pay later, debit cards mean pay now. These cards are issued by your bank,
STRONGER ONLINE SECURITY
STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial
Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.
Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints
EasiShare Whitepaper - Empowering Your Mobile Workforce
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
HELPFUL TIPS: MOBILE DEVICE SECURITY
HELPFUL TIPS: MOBILE DEVICE SECURITY Privacy tips for Public Bodies/Trustees using mobile devices This document is intended to provide general advice to organizations on how to protect personal information
To all GRSB debit and credit card customers:
To all GRSB debit and credit card customers: A data breach at the Target Corporation may have exposed 40 million credit/debit cards to potential fraudulent activity. If you made purchases in a Target store
Policy for Protecting Customer Data
Policy for Protecting Customer Data Store Name Store Owner/Manager Protecting our customer and employee information is very important to our store image and on-going business. We believe all of our employees
Keywords: German electronic ID card, e-government and e-business applications, identity management
From Student Smartcard Applications to the German Electronic Identity Card Lucie Langer, Axel Schmidt, Alex Wiesmaier Technische Universität Darmstadt, Department of Computer Science, Darmstadt, Germany
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Are free Android virus scanners any good?
Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)
Experiences with Studying Usability of Two-Factor Authentication Technologies. Emiliano De Cristofaro https://emilianodc.com
Experiences with Studying Usability of Two-Factor Authentication Technologies Emiliano De Cristofaro https://emilianodc.com Two Factor (2FA) Authentication Authentication Token password Fingerprint Phone
Documentation. OpenScape Office V3 OpenScape Office MX V2 Linking to MS Exchange Server 2010
Documentation OpenScape Office V3 OpenScape Office MX V2 Linking to MS Exchange Server 2010 The following steps describe how to connect an OpenScape Office MX V2 or MX/LX V3 system to a Microsoft Exchange
NHSmail mobile configuration guide Android mobile devices
NHSmail mobile configuration guide Android mobile devices Version: V.6 Date: September 2011 THIS INFORMATION IS FOR NHS STAFF AND IS NOT TO BE DISTRIBUTED OR COPIED OUTSIDE OF THE NHS Version 6.0 Crown
Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com
Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity
Business Banking Customer Login Experience for Enhanced Login Security
Business Banking Customer Login Experience for Enhanced Login Security User credentials uniquely identify each person who uses the banking platform. The intent of authentication is unequivocal verification
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
FAQs Electronic residence permit
FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit
Welcome to Bank of Geneva Mobile Banking
Welcome to Bank of Geneva Mobile Banking Frequently Asked Questions Welcome to Bank of Geneva Mobile Banking Questions General How much does this service cost? Is it secure? Which wireless carriers are
Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of
The Essentials of Enterprise Password Management. FastPass Password Manager V 3.4 Enterprise & Service Provider Editions
The Essentials of Enterprise Password Management FastPass Password Manager V 3.4 Enterprise & Service Provider Editions FastPassCorp 2012 FPC0 FastPassCorp Page 1 of 14 OVERVIEW When deciding on a new
iphone and ipad in the enterprise. Secure? Sure.
iphone and ipad in the enterprise. Secure? Sure. According to the current state of the art, when smart-card mode is activated, it is impossible to gain unauthorized access to business data stored in SecurePIM.
