Click here to close now.

Welcome!

Search Authors: Elizabeth White, Carmen Gonzalez, Cloud Best Practices Network, AppDynamics Blog, Liz McMillan

News Feed Item

Survey: Web and Mobile Shoppers Should Take Extra Measures to Stay Safe Online this Holiday Season

WASHINGTON, Nov. 14, 2012 /PRNewswire-USNewswire/ -- As the holiday season kicks-off and Cyber Monday approaches, a new survey released by National Cyber Security Alliance (NCSA) and McAfee reveals that online shoppers should take extra measures to secure their purchases on the Web.  While Americans are increasingly relying on Internet connected devices to browse online stores, research products and goods, and make purchases, the survey shows that a majority (90%) do not feel completely safe online. (The full survey is available at: http://www.staysafeonline.org/stay-safe-online/resources/.)

(Logo: http://photos.prnewswire.com/prnh/20120911/DC71739LOGO)

(Logo: http://photos.prnewswire.com/prnh/20101004/DC76016LOGO)

Americans' concern about being safe and secure on the Internet is based on experience. In the past year, over one in four (26 percent) Americans received notification by a business, online service provider or organization that their personally identifiable information (e.g. password, credit card number, email address, etc.) was lost or compromised because of a data breach.

Forester Research, Inc. predicts that this year's online retail shopping will show a fifteen percent increase from 2011 sales figures to over 68 billion– which is all the more reason for consumers to improve their online safety posture. While those using PCs and mobile devices for shopping and online commerce do exhibit good instincts, the NCSA/McAfee Online Safety Study found that there are also some vulnerabilities in their online safety preparedness and behavior.

  • In the last six months, thirty-percent of Americans have researched potential purchases using a smartphone; 33 percent conducted mobile banking; 27 percent shopped; 25 percent made online payments; and seven percent purchased goods from an auction site.
  • While nearly 30 percent of smartphone owners shopped online in the last six months, 63 percent have never installed security software/apps to make their device more secure from viruses or malware.
  • Twenty-eight percent of respondents say they stopped or abandoned a purchase on a website because of a safety or security concern.
  • Of those who abandoned their transaction, 57 percent were unsure if the website was secure; 42 percent say the website requested more information than was necessary and 34 percent were unsure about the legitimacy of the website.

"Holiday shoppers can expect cybercriminals to be out in force this season," said Michael Kaiser, executive director of the National Cyber Security Alliance. "Shoppers should be alert to scams and other attempts to lure them to provide personal and financial information that could lead to data loss or the infection of an Internet connected device. We encourage everyone to STOP. THINK. CONNECT. and make sure they have taken security precautions, understand the consequences of actions and behavior and enjoy the benefits of holiday shopping online."

"It will be even easier this holiday season to save money and take advantage of good deals with the convenient access to shop on the plethora of Internet connected gadgets," says Gary Davis, vice president of Global Consumer Marketing. "However, McAfee Labs expects that there will be more scams targeted at social media deals, ads, posts and 'likes' related to holiday shopping. As shoppers try to save money and time by using their mobile devices they may also be getting scammed in the process. Mobile threats are also growing, and this new survey illustrates the need for consumers to protect all of their devices—including smartphones and tablets."

McAfee also recently released a list of the most popular scams on the Internet during the holiday season. Consumers can find them here: https://blogs.mcafee.com/consumer/12-scams-of-christmas-2012.

Every year more and more people turn to the Internet as a way to find bargains and conveniently fulfill their shopping list. As shoppers prepare for Cyber Monday and a holiday season of increased online shopping, consumers should take steps to increase their safety, security and confidence online with these simple tips.

  • Keep a Clean Machine: All the devices you use for shopping - including smartphones and tablets - should have up-to-date software including security software, operating systems and other key programs and apps.
  • When in Doubt, Throw it Out: Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it's best to delete it.
  • Think Before you Act: Be wary of communications that offer amazing deals that sound too good to be true, implore you to act immediately - including indicating a problem with an order or payment—or ask you to view the website or an account via a provided link.
  • Protect your Personal Information: Be alert to the kinds and amount of information being collected during transactions. Information requested should only be enough to complete the transaction. Only fill out required fields on checkout forms. Check the website's privacy policy.
  • Use Safe Payment Options: Credit cards are generally the safest option. They allow buyers to seek a credit from the issuer if the product isn't delivered or isn't what was ordered. Credit cards may limit the monetary amount you will be responsible for if your account is compromised. Never send cash through the mail or use a money-wiring service.
  • Make Sure the Site is Legitimate: This includes a closed padlock on your web browser's address bar or a URL address that begins with shttp or https. Check reviews of sites you have never used before.
  • Keep a Paper Trail: Save records of your online transactions, including the product description, price, online receipt, terms of the sale, and copies of any email exchange with the seller.

The full survey along with a holiday shopping tips sheet is available at the NCSA Web portal: http://staysafeonline.org/stay-safe-online/resources/top-tips-for-safe-online-holiday-shopping/. NCSA supporters can get the latest news and updates on Facebook at www.facebook.com/staysafeonline and on Twitter at @StaySafeOnline.

Survey Methodology

JZ Analytics conducted the online safety survey. The survey firm, founded by John Zogby, surveyed 1,000 adults nationwide from August 31, 2012 to September 3, 2012. The margin of error is +/- 3.2 percentage points and margins of error are higher in sub-groups.

About The National Cyber Security Alliance
The National Cyber Security Alliance is a non-profit organization. Through collaboration with the government, corporate, non-profit and academic sectors, the mission of the NCSA is to educate and empower a digital citizenry to use the Internet securely and safely protecting themselves and the technology they use and the digital assets we all share. NCSA board members include: ADP, AT&T, Bank of America, EMC Corporation, ESET, Facebook, Google, Intel, McAfee, Microsoft, PayPal, Science Applications International Corporation (SAIC), Symantec, Trend Micro, Verizon and Visa. Visit www.staysafeonline.org for more information and join us on Facebook at www.facebook.com/staysafeonline

About  STOP. THINK. CONNECT.
The campaign was developed by the STOP. THINK. CONNECT. Messaging Convention, a public-private partnership established in 2009 and led by The Anti-Phishing Working Group (APWG) and National Cyber Security Alliance (NCSA) to develop and support a national cybersecurity awareness campaign.  The Department of Homeland Security provides the Federal Government's leadership for the campaign. Industry, government, non-profits and education institutions participate in STOP. THINK. CONNECT. Learn how to get involved at the STOP. THINK. CONNECT. Facebook page at https://www.facebook.com/STOPTHINKCONNECT, on Twitter at @STOPTHNKCONNECT, and the campaign website at www.stopthinkconnect.org.

SOURCE National Cyber Security Alliance

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core of our infrastructures. At the same time, we have old approaches made new again like micro-services...
Every innovation or invention was originally a daydream. You like to imagine a “what-if” scenario. And with all the attention being paid to the so-called Internet of Things (IoT) you don’t have to stretch the imagination too much to see how this may impact commercial and homeowners insurance. We’re beyond the point of accepting this as a leap of faith. The groundwork is laid. Now it’s just a matter of time. We can thank the inventors of smart thermostats for developing a practical business application that everyone can relate to. Gone are the salad days of smart home apps, the early chalkb...
Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing and analyzing streaming data is the Lambda Architecture, representing a model of how to analyze rea...
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile devices as well as laptops and desktops using a visual drag-and-drop application – and eForms-buildi...
SYS-CON Events announced today that Vitria Technology, Inc. will exhibit at SYS-CON’s @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Vitria will showcase the company’s new IoT Analytics Platform through live demonstrations at booth #330. Vitria’s IoT Analytics Platform, fully integrated and powered by an operational intelligence engine, enables customers to rapidly build and operationalize advanced analytics to deliver timely business outcomes for use cases across the industrial, enterprise, and consumer segments.
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures traffic gets delivered faster, safer, and more reliably than ever.
Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch of Docker's initial release in March of 2013, interest was revved up several notches. Then late last...
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial Cloud.
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In his General Session at 15th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, discussed how to take advantage of a multitude of compute options and platform features to make cloud the cornerstone of your online presence.
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @ThingsExpo, Michael Sick, a Senior Manager and Big Data Architect within Ernst and Young's Financial Servi...
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along with a steady stream of well-publicized data breaches, only add to the uncertainty
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @ThingsExpo, Michael Sick, a Senior Manager and Big Data Architect within Ernst and Young's Financial Servi...
PubNub on Monday has announced that it is partnering with IBM to bring its sophisticated real-time data streaming and messaging capabilities to Bluemix, IBM’s cloud development platform. “Today’s app and connected devices require an always-on connection, but building a secure, scalable solution from the ground up is time consuming, resource intensive, and error-prone,” said Todd Greene, CEO of PubNub. “PubNub enables web, mobile and IoT developers building apps on IBM Bluemix to quickly add scalable realtime functionality with minimal effort and cost.”
Docker is an excellent platform for organizations interested in running microservices. It offers portability and consistency between development and production environments, quick provisioning times, and a simple way to isolate services. In his session at DevOps Summit at 16th Cloud Expo, Shannon Williams, co-founder of Rancher Labs, will walk through these and other benefits of using Docker to run microservices, and provide an overview of RancherOS, a minimalist distribution of Linux designed expressly to run Docker. He will also discuss Rancher, an orchestration and service discovery platf...
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, including what it is today, what it might ultimately be, the role of wearable tech, and technology gaps stil...
CommVault has announced that top industry technology visionaries have joined its leadership team. The addition of leaders from companies such as Oracle, SAP, Microsoft, Cisco, PwC and EMC signals the continuation of CommVault Next, the company's business transformation for sales, go-to-market strategies, pricing and packaging and technology innovation. The company also announced that it had realigned its structure to create business units to more directly match how customers evaluate, deploy, operate, and purchase technology.
In the consumer IoT, everything is new, and the IT world of bits and bytes holds sway. But industrial and commercial realms encompass operational technology (OT) that has been around for 25 or 50 years. This grittier, pre-IP, more hands-on world has much to gain from Industrial IoT (IIoT) applications and principles. But adding sensors and wireless connectivity won’t work in environments that demand unwavering reliability and performance. In his session at @ThingsExpo, Ron Sege, CEO of Echelon, will discuss how as enterprise IT embraces other IoT-related technology trends, enterprises with i...
When it comes to the Internet of Things, hooking up will get you only so far. If you want customers to commit, you need to go beyond simply connecting products. You need to use the devices themselves to transform how you engage with every customer and how you manage the entire product lifecycle. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, will show how “product relationship management” can help you leverage your connected devices and the data they generate about customer usage and product performance to deliver extremely compelling and reliabl...
The Internet of Things (IoT) is causing data centers to become radically decentralized and atomized within a new paradigm known as “fog computing.” To support IoT applications, such as connected cars and smart grids, data centers' core functions will be decentralized out to the network's edges and endpoints (aka “fogs”). As this trend takes hold, Big Data analytics platforms will focus on high-volume log analysis (aka “logs”) and rely heavily on cognitive-computing algorithms (aka “cogs”) to make sense of it all.
With several hundred implementations of IoT-enabled solutions in the past 12 months alone, this session will focus on experience over the art of the possible. Many can only imagine the most advanced telematics platform ever deployed, supporting millions of customers, producing tens of thousands events or GBs per trip, and hundreds of TBs per month. With the ability to support a billion sensor events per second, over 30PB of warm data for analytics, and hundreds of PBs for an data analytics archive, in his session at @ThingsExpo, Jim Kaskade, Vice President and General Manager, Big Data & Ana...