Addressing Consumer Privacy

Size: px
Start display at page:

Download "Addressing Consumer Privacy"

Transcription

1 Addressing Consumer Privacy and Security Concerns in Marketing Pam McHugh President Mintel Comperemedia Monday, March 16, 2009

2 Agenda Consumers Security & Privacy Concerns How to Alleviate Consumers Concerns Summary

3 Data Sources Comperemedia Panel Static panel, 1,000 active users (manage 2+ accounts online) Track nine sectors (financial, telco, tech, auto, hospitality) Capture sector specific data from and landing page Comperemedia Behavioral Survey Quarterly waves of 1,000 surveys each Attitude and usage of related activity Mintel Reports Publications Proprietary surveys and secondary research

4 CONSUMERS SECURITY & PRIVACY CONCERNS

5 Security Fears are on the Rise In January 2009 alone, 669 stories were printed on the topic of online security, phishing or identity theft Although identity theft increased 22% in 2008, online fraud accounted for only 11% of cases* Over 40% of consumers are less likely to open financial services than they were a year ago** Over 60% of consumers are more concerned with online security than they were five years ago**

6 Familiarity is a Critical Factor Most Influential Factors when Opening Knowing the sender 55% Subject line clearly states offer 20% A need for the product of service Cash incentive or bonus opportunity 9% 11% Your name in the subject line 3% 0% 10% 20% 30% 40% 50% 60% % of respondents Which of the following is most important in determining whether or not you will read a personal business ? (N=1,000)

7 Privacy Information about the products I have purchased online or in-store My address from a company I DO have a business relationship with Consumer Comfort Sharing Personal Information 28% 37% My personal/demographic information My online search information 18% 21% My credit score 13% 0% 10% 20% 30% 40% 50% 60% % of respondents comfortable with sharing What personal information would you be comfortable sharing in order to receive more relevant and useful offers? (N=1,000)

8 Share of Phishing 2.5% 2.0% 1.5% 1.0% 0.5% 0.0% Q Q Q Q Q Q Q Q Q1 2009* *Q includes January 2009 through mid-march 2009

9 Credit Card Phishing Increasing 2007 Sector Share of Phishing Activity % 0.5% 1% 0.0% 0.2% Banking 11% 2% 0.2% 0.2% 0.2% Credit Cards Telecoms Investment Mortgage & Loans 98% Other Sectors 87% N=4,245 N=3,335

10 Which is a Phishing ?

11 HOW TO ALLEVIATE CONSUMERS CONCERNS

12 Certified Features that Impact Percieved Trust in Last 4 digits of account Account login box 59% 59% Company Logo 54% Name in body Legal disclaimer Name in subject line 49% 49% 48% Certified 65% 0% 10% 20% 30% 40% 50% 60% 70% % extremely/very important responses Considering the following features of an , how important is each in making you trust the security/validity of an ? (N=1,000)

13 What is Certified ? Certified is a white-listing technique that allows accredited senders to pass through spam filters while verifying legitimate for recipients The most accepted version of the service is Goodmail s Certified , which gained significant credibility when it became available through Yahoo! and AOL in 2006

14 Putting it Together Company Logo Last Four Digits of Account Account Login Box

15 Putting it Together Last Four Digits of Account Company Logo Account Login Box

16 Word-of-Mouth Credit Cards, 2% Auto, 2% Banking, 2% Insurance, 1% Word-of-mouth is the most trustworthy source of information A quarter of consumers would open an if it was forwarded on by a friend The forward-to-a-friend feature and promotions accounted for roughly 15% of total campaigns in 2008 Mortgage & Loans, 4% Telecoms, 5% Investment, 7% Tech, 28% Hospitality, 48%

17 Word-of-Mouth Promotions Subject: Get $25 from Wachovia Subject: Earn up to $500 in statement credits from Citi Cards

18 Moving into Social Networks

19 Efforts Noted, More Needed 75% Three of four consumers reported that their financial services had an additional authentication process to verify that they are logging on to their official site 50% Only 50% felt more secure as a result Which, if any of your online accounts, have an authentication process after logging into the site? (N=829)

20 Security Features Go Digital Digital Security ID from E*Trade SafePass from Bank of America

21 Innovative Security Features Site Keys from Bank of America Free Trustee identity theft security software from Rapport from ING*

22 Phishing Education Over half of consumers have received educational from their financial services provider about phishing, identity theft and other online security and threats

23 Recommendations Customers Viral Marketing Certified Further education and features

24 Thank You Pam McHugh Mintel Comperemedia

New Opportunities in Direct Marketing (Part 1 of 2)

New Opportunities in Direct Marketing (Part 1 of 2) New Opportunities in Direct Marketing (Part 1 of 2) Presented by: Andrew Davidson Mintel Comperemedia David Cooney Wells Fargo Card Services April 28 th, 2011 Mintel Comperemedia: Comperemedia is the premier

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

WHAT S DRIVING CITIZENS CYBER INSECURITY?

WHAT S DRIVING CITIZENS CYBER INSECURITY? An Accenture Public Service Pulse Survey revealed that cyber insecurity is pervasive among U.S. citizens: Eight in 10 citizens (79 percent) express concern about the privacy and security of their personal

More information

Challenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation

Challenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation Challenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation 27 May 2011 ?????? Conception is easy Delivery is difficult 2 Agenda About Aadhaar- What the world

More information

What role will telcos play? - Monetize data or serve as trusted third parties?

What role will telcos play? - Monetize data or serve as trusted third parties? What role will telcos play? - Monetize data or serve as trusted third parties? Give Customers the Control of their Digital Lives Digiworld Summit 2016 Plenary Session Day 2 Trust as an opportunity - Players

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

The Power of the Inbox Tips and Tricks for Successful Marketing

The Power of the Inbox Tips and Tricks for Successful  Marketing The Power of the Inbox Tips and Tricks for Successful Email Marketing Constant Contact 2015 Kimberly Beer Contact me: Midnight Productions, Inc & Constant Contact President, Constant Contact Authorized

More information

Phishing Activity Trends Report January, 2005

Phishing Activity Trends Report January, 2005 Phishing Activity Trends Report January, 2005 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent web sites which attempt to trick them into divulging

More information

FAQ. Usually appear to be sent from official address

FAQ. Usually appear to be sent from official  address FAQ 1. What is Phishing Email? A form of fraud by which an attacker masquerades as a reputable entity in order to obtain your personal information. Usually appear to be sent from official email address

More information

The Rise of Phishing. Dave Brunswick Tumbleweed Communications Anti-Phishing Working Group

The Rise of Phishing. Dave Brunswick Tumbleweed Communications Anti-Phishing Working Group The Rise of Phishing Dave Brunswick Tumbleweed Communications Anti-Phishing Working Group 2 The Anti-Phishing Working Group Industry association focused on eliminating identity theft and fraud from the

More information

Table of content. Authentication Domain Subscribers Content Sending practices Conclusion...

Table of content.  Authentication Domain Subscribers Content Sending practices Conclusion... A User Guide Before sending your carefully-crafted email campaigns, it s important to first understand a few basic ideas and rules of email marketing to ensure your campaigns are successful. To achieve

More information

7 Essentials Content. A quick review of your 7 Essentials Communications.

7 Essentials Content. A quick review of your 7 Essentials Communications. 7 Essentials Content A quick review of your 7 Essentials Communications. First Email: Launch Email It s important to let your contacts know you're about to start communicating with them more frequently.

More information

Bank of america report phishing

Bank of america report phishing Search Search pages & people Search Search Search pages & people Search Bank of america report phishing email We recently discovered a new phishing scam from a Bank of America spam email some reports that

More information

November 2016 G. Oscar Anderson, Senior Research Advisor AARP Research

November 2016 G. Oscar Anderson, Senior Research Advisor AARP Research November 2016 G. Oscar Anderson, Senior Research Advisor AARP Research https://doi.org/10.26419/res.00140.001 AARP is a nonprofit, nonpartisan organization, with a membership of nearly 38 million that

More information

NESTLÉ Consumer Privacy Notice Template PRIVACY NOTICE

NESTLÉ Consumer Privacy Notice Template PRIVACY NOTICE PRIVACY NOTICE Nestlé Purina Petcare Limited (hereinafter referred to as Nestlé ) is committed to safeguarding your privacy and ensuring that you continue to trust Nestlé with your personal data. When

More information

Keep the Door Open for Users and Closed to Hackers

Keep the Door Open for Users and Closed to Hackers Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According

More information

PARTNERING FOR SUCCESS PARTNER NETWORK

PARTNERING FOR SUCCESS PARTNER NETWORK PARTNERING FOR SUCCESS PARTNER NETWORK PointClickCare Partner Network 204 PointClickCare aims to align with companies that share a similar passion for improving the lives of seniors and who have complementary

More information

JEAS-Accredited Environmental Assessor Qualification Scheme

JEAS-Accredited Environmental Assessor Qualification Scheme JEAS-Accredited Environmental Assessor Qualification Scheme Osamu Kajitani, President Japan Association of Environment Assessment (JEAS) Abstract The Japan Association of Environment Assessment (JEAS)

More information

Canada s Anti-Spam Legislation (CASL) What it means for Advisors. Distributor Learning & Development

Canada s Anti-Spam Legislation (CASL) What it means for Advisors. Distributor Learning & Development Canada s Anti-Spam Legislation (CASL) What it means for Advisors Distributor Learning & Development Learning objectives By the end of this session, you will be able to: Describe CASL and how it impacts

More information

Accelerating growth and digital adoption with seamless identity trust

Accelerating growth and digital adoption with seamless identity trust Accelerating growth and digital adoption with seamless identity trust IBM Trusteer helps organizations seamlessly establish identity trust across the omnichannel customer journey Let s get started 3 Introduction

More information

Why you MUST protect your customer data

Why you MUST protect your customer data Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are

More information

Anti-Phishing Working Group

Anti-Phishing Working Group Phishing Attack Trends Report April, 2004 Phishing attacks use spoofed e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account

More information

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013 Update from HIMSS National Privacy & Security Lisa Gallagher, VP Technology Solutions November 14, 2013 Agenda Update on HIMSS new Technology Solutions Department HIPAA Omnibus Rules Meaningful Use 2 P&S

More information

Paying. on the go: Mobile payments slowly catch on in the United States

Paying. on the go: Mobile payments slowly catch on in the United States Paying on the go: Mobile payments slowly catch on in the United States apan adopted a mobile payment system for mass transit as a way to move millions of commuters through congested stations. Some African

More information

NOT PROTECTIVELY MARKED PHISHING. July 2016

NOT PROTECTIVELY MARKED PHISHING. July 2016 - PHISHING July 2016 1 Introduction: The purpose of this document is to provide an analysis of the most prevalent trends and characteristics of phishing campaigns in the UK in July 2016. The analysis is

More information

DoD Spear-Phishing Awareness Training. Joint Task Force - Global Network Operations

DoD Spear-Phishing Awareness Training. Joint Task Force - Global Network Operations //FOUO DoD Spear-Phishing Awareness Training Joint Task Force - Global Network Operations Updated: 16 NOV 2006 //FOUO Objective Inform and increase the awareness of all Department of Defense personnel

More information

Mobile Device Management

Mobile Device Management Mobile Device Management David Roundtree, CISSP Identity & Security Public Sector State & Local Date: April 23, 2013 1 This document is for informational purposes. It is not a commitment to deliver any

More information

PART 3/3 DEMYSTIFYING THE INBOX

PART 3/3 DEMYSTIFYING THE INBOX PART 3/3 DEMYSTIFYING THE INBOX January 2013 Introduction In part one we looked at factors that make email the ultimate digital communication channel. We got insights on when, where and how South Africans

More information

Bank of Hawaii Protecting Confidential . What's in this User Guide

Bank of Hawaii Protecting Confidential  . What's in this User Guide 1 Bank of Hawaii Protecting Confidential Email Email is commonly used to transmit confidential information such as operational data, legal documents, and financial information. By default, emails are sent

More information

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Featuring Sophia Vargas, Forrester Research Inc. 30 May 2014 Introducing today s presenters: Matt Miszewski Senior Vice President of Sales

More information

Privacy Notice Froneri South Africa (Pty) Ltd t\a Dairymaid ( Froneri ) ( Privacy Notice ) Froneri Froneri Froneri

Privacy Notice Froneri South Africa (Pty) Ltd t\a Dairymaid ( Froneri ) ( Privacy Notice ) Froneri Froneri Froneri Privacy Notice Effective on 10/05/2013; last updated on 08/09/2015 Froneri South Africa (Pty) Ltd t\a Dairymaid ( Froneri ) is committed to safeguarding your privacy and ensuring that you continue to trust

More information

Guide 6: Effective marketing

Guide 6: Effective  marketing Guide 6: Effective email marketing Andy s handy marketing tips Guide No. 6 of 10 Find out more at justadviser.com FOR FINANCIAL INTERMEDIARIES ONLY. NOT APPROVED FOR USE WITH CUSTOMERS. Boost your retirement

More information

Bobbye Marsala, CPPO, CPPB, C.P.M., FCPM, FCPA Russ Wetherington, CPCM, CPPB, CPM

Bobbye Marsala, CPPO, CPPB, C.P.M., FCPM, FCPA Russ Wetherington, CPCM, CPPB, CPM Bobbye Marsala, CPPO, CPPB, C.P.M., FCPM, FCPA Russ Wetherington, CPCM, CPPB, CPM Current Trends in Public Procurement FAPPO Survey completed Spring 2011 SurveyMonkey.com 2-Part Survey 125 Responses to

More information

CE Advanced Network Security Phishing I

CE Advanced Network Security Phishing I CE 817 - Advanced Network Security Phishing I Lecture 15 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained

More information

THE STATE OF CLOUD & DATA PROTECTION 2018

THE STATE OF CLOUD & DATA PROTECTION 2018 THE STATE OF CLOUD & DATA PROTECTION 2018 Survey Results: 10 Findings on how over 800 IT Pros handle Disaster Recovery & Cloud Adoption. INTRODUCTION The Unitrends 2018 annual survey of IT professionals

More information

IMPORTANT SECURITY INFORMATION PHISHING

IMPORTANT SECURITY INFORMATION PHISHING IMPORTANT SECURITY INFORMATION PHISHING Protect Yourself and Your Accounts Important Security Information At Century Savings Bank, security and privacy of your financial information is a top priority.

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

Deluxe Provent Customer Notifications

Deluxe Provent Customer Notifications Deluxe Provent Customer s Product Information The table below summarizes the product features, and what each feature means. Delivery methods fall into three categories: Email Customer s Registered Email),

More information

Financial scams. What to look for and how to avoid them.

Financial scams. What to look for and how to avoid them. Financial scams What to look for and how to avoid them. Keep your money secure We take the security and wellbeing of our customers very seriously. So we ve created this guide to highlight the most common

More information

Ensure holiday s reach the inbox

Ensure holiday  s reach the inbox Ensure holiday emails reach the inbox 2013 2014 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Information

More information

Views, Reactions and Impact of Digitally-Signed Mail in e-commerce.

Views, Reactions and Impact of Digitally-Signed Mail in e-commerce. Views, Reactions and Impact of Digitally-Signed Mail in e-commerce Simson L. Garfinkel (MIT) Jeffrey I. Schiller (MIT) Erik Nordlander (MIT) David Margrave (Amazon.com) Robert C. Miller (MIT) http://www.simson.net/smime-survey.html/

More information

A Market Solution to Online Identity Trust. Trust Frameworks 101: An Introduction

A Market Solution to Online Identity Trust. Trust Frameworks 101: An Introduction A Market Solution to Online Identity Trust Background OIX is an Internet scale solution to the problem of how identity credentials can be trusted online. Background "OIX is the organization where different

More information

The Ten Golden Rules of Online Marketing

The Ten Golden Rules of Online Marketing The Ten Golden Rules of Online Marketing Presented to The American Marketing Association and The Direct Marketing Association May 20, 2004 Jay Berkowitz jay@tengoldenrules.com 561-716-1334 The Internet

More information

DigiCert Certified Partner Program. Delivering Confidence for Customers and Consumers by Securing Websites and Applications

DigiCert Certified Partner Program. Delivering Confidence for Customers and Consumers by Securing Websites and Applications DigiCert Certified Program Delivering Confidence for Customers and Consumers by Securing Websites and Applications Table Of Contents 3 Introduction 4 About this Guide 5 Program Structure 6 Program Benefits

More information

How to make Secure Easier to use

How to make Secure  Easier to use How to make Secure Email Easier to use Simson L. Garfinkel (MIT) Jeffrey I. Schiller (MIT) Erik Nordlander (MIT) David Margrave (Amazon) Robert C. Miller (MIT) http://www.simson.net/smime-survey.html/

More information

Canadian Anti-Spam Legislation (CASL) Compliance Policy. 2. Adopt Canadian Anti-Spam Legislation (CASL) Compliance Policy.

Canadian Anti-Spam Legislation (CASL) Compliance Policy. 2. Adopt Canadian Anti-Spam Legislation (CASL) Compliance Policy. NO: R055 COUNCIL DATE: April 27, 2015 REGULAR COUNCIL TO: Mayor & Council DATE: March 30, 2015 FROM: City Clerk FILE: 0625-20 SUBJECT: Canadian Anti-Spam Legislation (CASL) Compliance Policy RECOMMENDATION

More information

Cyber Insurance: What is your bank doing to manage risk? presented by

Cyber Insurance: What is your bank doing to manage risk? presented by Cyber Insurance: What is your bank doing to manage risk? David Kitchen presented by Lisa Micciche Today s Agenda Claims Statistics Common Types of Cyber Attacks Typical Costs Incurred to Respond to an

More information

Startup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ):

Startup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ): Privacy Policy Startup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ): visit any websites or mobile sites offered by Startup

More information

31 Examples of how Microsoft Dynamics 365 Integrates with Marketing Automation

31 Examples of how Microsoft Dynamics 365 Integrates with Marketing Automation 31 Examples of how Microsoft Dynamics 365 Integrates with Marketing Automation Manage Email Campaigns In-House 1. Quickly Design Emails Save time creating marketing emails using drag and drop template

More information

Pulse of The Industry Periodicals Volume PAG Initiatives. Incentives & Promotions. Open Discussion. Agenda

Pulse of The Industry Periodicals Volume PAG Initiatives. Incentives & Promotions. Open Discussion. Agenda November 19, 2014 Agenda Pulse of The Industry Periodicals Volume PAG Initiatives Incentives & Promotions 2014 Promotions Saturation & High Density Incentive Every Door Direct Mail Alternate Postage Proposed

More information

LWMMI. Protecting The Communities We Live In. DIRECTORS. David Benforado Village Trustee Village of Shorewood Hills

LWMMI. Protecting The Communities We Live In. DIRECTORS. David Benforado Village Trustee Village of Shorewood Hills Protecting The Communities We Live In. DIRECTORS David Benforado Village Trustee Village of Shorewood Hills David De Angelis Village Manager Village of Elm Grove Joseph Laux Administrator City of Eagle

More information

ACHIEVING FIFTH GENERATION CYBER SECURITY

ACHIEVING FIFTH GENERATION CYBER SECURITY ACHIEVING FIFTH GENERATION CYBER SECURITY A Survey Research Report of IT and Security Professionals MARCH 2018 INTRODUCTION The pursuit of the highest level of cyber security is a top priority for IT and

More information

2-TIER AUTHORIZED INFORMATICA RESELLER PROGRAM GUIDE

2-TIER AUTHORIZED INFORMATICA RESELLER PROGRAM GUIDE 2-TIER AUTHORIZED INFORMATICA RESELLER PROGRAM GUIDE 2017 Informatica. For Authorized Informatica Partners Only -1- The Informatica Partner Program The Informatica Partner Program is a holistic membership

More information

Elders Estates Privacy Notice

Elders Estates Privacy Notice 15A Bath Street, Ilkeston Derbyshire. DE7 8AH 01159 32 55 23 info@eldersestates.co.uk 31 Market Place, Ripley Derbyshire. DE5 3HA 01773 30 44 44 info@eldersestates.co.uk Elders Estates Privacy Notice Introduction

More information

Technology Priorities SURVEY. Exclusive Research from CIO magazine

Technology Priorities SURVEY. Exclusive Research from CIO magazine Technology Priorities SURVEY Exclusive Research from CIO magazine JULY 2010 EXECUTIVE SUMMARY Top Technology Priorities for CIOs: Cloud Computing, Virtualization Desktop and network virtualization, along

More information

How to recognize phishing s

How to recognize phishing  s Phishing email messages, websites, and phone calls are designed to steal money, steal data and/or destroy information. Cybercriminals can do this by installing malicious software on your computer or stealing

More information

2014 INTERNET COMMERCE CASE STUDY. The Battle Against Phishing and Fraudulent s. 100 S. Ellsworth Ave 4th Floor San Mateo, CA

2014 INTERNET COMMERCE CASE STUDY. The Battle Against Phishing and Fraudulent  s. 100 S. Ellsworth Ave 4th Floor San Mateo, CA 2014 INTERNET COMMERCE CASE STUDY The Battle Against Phishing and Fraudulent Emails 100 S. Ellsworth Ave 4th Floor San Mateo, CA 94401 650.627.7667 ABOUT AGARI Agari analizes big data from the world s

More information

Australia. Consumer Survey Mail Findings

Australia. Consumer Survey Mail Findings Australia Post Consumer Survey Mail Findings July 2012 Methodology The Australia Post Consumer Survey measures consumer attitudes and behaviours of interest to Australia Post, particularly mail (letters),

More information

Newcomer Finances Toolkit. Fraud. Worksheets

Newcomer Finances Toolkit. Fraud. Worksheets Newcomer Finances Toolkit Fraud Worksheets Ottawa Community Loan Fund Fonds d emprunt Communautaire d Ottawa 22 O Meara St., Causeway Work Centre, Ottawa, ON K1Y 4N6 Tel: 613-594-3535 Fax: 613-594-8118

More information

Webroot Phishing Threat Trends

Webroot Phishing Threat Trends December 2016 Webroot Phishing Threat Trends An update to the 2016 Threat Brief Introduction Who would ever fall for that? That s what many people think when they see a phishing attempt, since less advanced

More information

A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY. Samu Konttinen, CEO Interim Results Q1 2017

A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY. Samu Konttinen, CEO Interim Results Q1 2017 A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY Samu Konttinen, CEO Interim Results Q1 2017 1 AGENDA Key takeaways from Q1 Financials Business updates Outlook 2 KEY TAKEAWAYS FROM Q1 Corporate security

More information

Invoice Gateway Customer Enrollment

Invoice Gateway Customer Enrollment Invoice Gateway Customer Enrollment Billtrust is the Stock Building Supply provider of Statement and Invoice delivery. They also host our Customer Portal where you can view your invoices and statements

More information

Rethinking Your Approach to Paperless

Rethinking Your Approach to Paperless Rethinking Your Approach to Paperless For 7 Reasons to Add Email to Your Multi-channel Offering Matt Swain Director April 1, 2015 2015 InfoTrends Industry analyst firm focused on the digital imaging, marketing,

More information

A Direct Mail Guide for Mortgage Lenders

A Direct Mail Guide for Mortgage Lenders Writing Tips that Work: A Direct Mail Guide for Mortgage Lenders FROM TITANLISTS.COM 1 of 7 Writing Tips that Work: A Direct Mail Guide for Mortgage Lenders - The Benefits of Direct Mail - Writing Tips

More information

Digital Layer Trends PostalVision 2020

Digital Layer Trends PostalVision 2020 Digital Layer Trends PostalVision 2020 Matt Swain Associate Director June 12, 2012 @SwainfoTrends @InfoTrends #PV2020 2012 InfoTrends www.infotrends.com 1 Comprehensive Research on Customer Communications

More information

RISING CYBER SECURITY CAPABILITY WITH A UNIQUE NETWORK OF TRUSTED PARTNERS. Jan De Blauwe Chairman Cyber Security Coalition Belgium

RISING CYBER SECURITY CAPABILITY WITH A UNIQUE NETWORK OF TRUSTED PARTNERS. Jan De Blauwe Chairman Cyber Security Coalition Belgium RISING CYBER SECURITY CAPABILITY WITH A UNIQUE NETWORK OF TRUSTED PARTNERS Jan De Blauwe Chairman Cyber Security Coalition Belgium Brussels, 3 October 2017 FACTS AND FIGURES ABOUT BELGIAN COMPANIES 79%

More information

TRUSTED MOBILITY INDEX

TRUSTED MOBILITY INDEX TRUSTED MOBILITY INDEX Published May 2012 A GLOBAL STUDY INDEXING CONSUMER CONFIDENCE IN MOBILITY The mobile ecosystem of devices, services and networks is at a critical inflection point. While the mobile

More information

WAIS Gifts, Benefits and Hospitality Policy

WAIS Gifts, Benefits and Hospitality Policy WAIS Gifts, Benefits and Hospitality Policy Owner: Finance and Operations Manager Version: 1.1 Approved by: WAIS Board Next review date: March 2019 CONTENTS Purpose... 3 Policy Statement... 3 Standards...

More information

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN? WHAT IS CORPORATE ACCOUNT TAKEOVER? Corporate Account Takeover (also referred to as CATO) is a type of fraud where criminals gain access to a business financial accounts to make unauthorized transactions.

More information

Evolution of Spear Phishing. White Paper

Evolution of Spear Phishing. White Paper Evolution of Spear Phishing White Paper Executive Summary Phishing is a well-known security threat, but few people understand the difference between phishing and spear phishing. Spear phishing is the latest

More information

Operator cooperation in South Korea has created a successful identity solution. SK Telecom South Korea

Operator cooperation in South Korea has created a successful identity solution. SK Telecom South Korea Operator cooperation in South Korea has created a successful identity solution SK Telecom South Korea SK Telecom Operator cooperation in South Korea has created a successful identity solution Operator

More information

Phishing Activity Trends Report August, 2005

Phishing Activity Trends Report August, 2005 Phishing Activity Trends Report August, 25 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial

More information

Phishing Activity Trends Report March, 2005

Phishing Activity Trends Report March, 2005 Phishing Activity Trends Report March, 2005 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent websites which attempt to trick them into divulging

More information

ACCESSING VERIZON CENTER

ACCESSING VERIZON CENTER ACCESSING VERIZON CENTER STEP 1: When you arrive at Verizon Center, go directly to any entry point. STEP 2: Present your MY HOYAS Ticket Card, credit/debit card, mobile ticket or paper ticket to the gate

More information

AUSTRALIA Building Digital Trust with Australian Healthcare Consumers

AUSTRALIA Building Digital Trust with Australian Healthcare Consumers AUSTRALIA Building Digital Trust with Australian Healthcare Consumers Accenture 2017 Consumer Survey on Healthcare Cybersecurity and Digital Trust 2 Consumers in Australia trust healthcare organisations

More information

Toolkit for March Fraud Prevention Month 2017 Senior Support. FRAUD Recognize It Reject It Report It.

Toolkit for March Fraud Prevention Month 2017 Senior Support. FRAUD Recognize It Reject It Report It. Toolkit for March Fraud Prevention Month 2017 Senior Support FRAUD Recognize It Reject It Report It. Table of Contents Introduction --- 3 RCMP Videos --- 4 OPP Fraud Prevention Videos --- 4 Competition

More information

An Introduction to the CFA Institute. All Rights Reserved

An Introduction to the CFA Institute. All Rights Reserved An Introduction to the 2015 CFA Institute. All Rights Reserved AGENDA 1. CFA INSTITUTE 2. BUILD UNDERSTANDING WITH THE CLARITAS PROGRAM 3. WHAT YOU WILL LEARN 4. THE CLARITAS EXPERIENCE 2 ABOUT CFA INSTITUTE

More information

CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL

CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL RAHUL GUPTA SENIOR DEPUTY DISTRICT ATTORNEY ORANGE COUNTY DISTRICT ATTORNEYS OFFICE CELL: 714-345-7722 EMAIL: rahul.gupta@da.ocgov.com DAVE WHITE INVESTIGATOR

More information

ITU Kaleidoscope 2015 Trust in the Information Society

ITU Kaleidoscope 2015 Trust in the Information Society ITU Kaleidoscope 2015 Trust in the Information Society Raising Trust in Security Products and Systems through Standardisation and Certification: the CRISP approach Irene Kamara Vrije Universiteit Brussel

More information

UNDERSTANDING LEED LEADERSHIP IN ENERGY & ENVIRONMENTAL DESIGN

UNDERSTANDING LEED LEADERSHIP IN ENERGY & ENVIRONMENTAL DESIGN UNDERSTANDING LEED LEADERSHIP IN ENERGY & ENVIRONMENTAL DESIGN LEED is a building certification program created by the U.S. Green Building Council (USGBC). LEED Rating Systems LEED Certification is achieved

More information

Prepaid visa bank of america

Prepaid visa bank of america Welcome to PrePaid-USA, your trusted With the Bank of America Cash Rewards you make $500 in purchases in. Bank of America CashPay Card benefits include: Added security no need to carry large amounts of

More information

Welcome! Today s program

Welcome! Today s program Game of Phones Mobile Consumer Survey 18 October 2016 Welcome! Today s program Hour Item 08.00-08.10 Introductory remarks by on behalf of the Aga Khan University, Graduate School of Media and Communications

More information

9 Steps to Protect Against Ransomware

9 Steps to Protect Against Ransomware 9 Steps to Protect Against Ransomware IT Support Analyst Task Overview Security Manager Security Dashboard Self Service log Secur Devices With Vulnerabilities Critical Important/High Moderate/Medium 40

More information

6 Ways Office 365 Keeps Your and Business Secure

6 Ways Office 365 Keeps Your  and Business Secure 6 Ways Office 365 Keeps Your Email and Business Secure Acora House, Albert Drive, Burgess Hill, West Sussex, RH15 9TN T: +44 (0) 844 264 2222 W: acora.com E: sales@acora.com Introduction Microsoft have

More information

IT Security Protecting Ourselves From Phishing Attempts. Ray Copeland Chief Information Officer (CIO)

IT Security Protecting Ourselves From Phishing Attempts. Ray Copeland Chief Information Officer (CIO) IT Security Protecting Ourselves From Phishing Attempts Ray Copeland Chief Information Officer (CIO) Phishing Defined The fraudulent practice of sending emails claiming to be from reputable people or companies

More information

JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN

JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN 1. Why did ESET undertake this survey? 2. Survey methodology 3. Key highlights 4. User confidence in protecting

More information

MARKETING VOL. 4. TITLE: Tips For Designing A Perfect Marketing Message. Author: Iris Carter-Collins

MARKETING VOL. 4. TITLE: Tips For Designing A Perfect  Marketing Message. Author: Iris Carter-Collins TITLE: Tips For Designing A Perfect E-mail Marketing Message Author: Iris Carter-Collins Table Of Contents 1 Tips For Designing A Perfect E-mail Marketing Message 4 Are You Here To Learn About E-mail Marketing?

More information

Online Security and Safety Protect Your Computer - and Yourself!

Online Security and Safety Protect Your Computer - and Yourself! Online Security and Safety Protect Your Computer - and Yourself! www.scscu.com Fraud comes in many shapes and sizes, but the outcome is simple: the loss of both money and time. That s why protecting your

More information

Marketing 101. Mellissa Lee

Marketing 101. Mellissa Lee Email Marketing 101 Mellissa Lee Introduction to GetResponse video Building a List An average email list degrades about 23% every year. Tip #1 Search Engine Optimization (SEO) One of the most effective

More information

2017 RIMS CYBER SURVEY

2017 RIMS CYBER SURVEY 2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the

More information

Be Prepared For Emergencies

Be Prepared For Emergencies Be Prepared For Emergencies You re never ready for a crisis, but you can be prepared. Emergency Checklist Inside G16205-C (03/16) Are you and your family prepared in the event of an unforeseen situation?

More information

,000+ What is the BCI Corporate Partnership? What are the benefits of becoming a Corporate Partner? Levels of Partnership

,000+ What is the BCI Corporate Partnership? What are the benefits of becoming a Corporate Partner? Levels of Partnership www.thebci.org 1 What is the? The enables organizations to work more closely with the BCI to help raise the profile of the discipline, and to promote the highest standards of professional competence in

More information

August 2009 Report #32

August 2009 Report #32 August 2009 Report #32 While overall spam volumes averaged 89 percent of all email messages in July 2009, spam volumes continue to fluctuate. During July 2009, image spam continued to have an impact reaching

More information

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO The BUSINESS of Fraud. Don t let it put you out of business. Veenindra J. Singh, First Vice President, Treasury Management Consultant California Bank & Trust 300 Lakeside Drive, Suite 800 Oakland, Ca 94612

More information

Results, 2 nd Quarter Data Security. HIMSS Analytics ehealth TRENDBAROMETER Q2/2017

Results, 2 nd Quarter Data Security.   HIMSS Analytics ehealth TRENDBAROMETER Q2/2017 Results, 2 nd Quarter 2017 Data Security www.himss.eu/analytics 1 TABLE OF CONTENT Survey methodology page 3 Survey overview page 4 Results Overall page 5 Protection of medical data by government page

More information

Security Now. Howard Verne. Is My Private Information Safe?

Security Now. Howard Verne. Is My Private Information Safe? Security Now Howard Verne Is My Private Information Safe? NO!! Millions of people s Information has been stolen to date Target, Home Depot Even Albertsons have been some of the largest/well known break-ins

More information

The Role of the Data Protection Officer

The Role of the Data Protection Officer The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services

More information

Change is easy. Personal New Account Kit. Your Success is Our Mission.

Change is easy. Personal New Account Kit. Your Success is Our Mission. Change is easy. Personal New Account Kit Your Success is Our Mission. Change is easy Personal Account Information Kit How would you like the Account Titled? What type of account(s) would you like us to

More information

Security & Phishing

Security & Phishing Email Security & Phishing Best Practices In Cybersecurity Presenters Bill Shieh Guest Speaker Staff Engineer Information Security Ellie Mae Supervisory Special Agent Cyber Crime FBI 2 What Is Phishing?

More information

Standard Chartered Success Story

Standard Chartered Success Story Standard Chartered Success Story January 2019 The Key to Social Banking Shifting into truly digital banking Standard Chartered is a global banking group, serving 1.6 Billion customers in 60 countries.

More information