{"id":4664,"date":"2012-11-28T20:13:00","date_gmt":"2012-11-28T20:13:00","guid":{"rendered":"https:\/\/evssolutions.com\/mobile-security-trends-and-shopping\/"},"modified":"2012-11-28T20:13:00","modified_gmt":"2012-11-28T20:13:00","slug":"mobile-security-trends-and-shopping","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/mobile-security-trends-and-shopping\/","title":{"rendered":"Mobile Security Trends and Shopping"},"content":{"rendered":"
Mobile
With mobile being a major aspect of business now, it has
As authentication becomes more mainstream, it will also
[Contributed by EVS Marketing]<\/p>\n <\/p>\n","protected":false},"excerpt":{"rendered":" Mobile trends have suggested that at least 50 percent of users will access the Internet via a mobile device by the end of the year. With the increased use of mobile devices on the rise, that means consumers are putting<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[33],"tags":[],"class_list":["post-4664","post","type-post","status-publish","format-standard","hentry","category-phone-verification"],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4664"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4664\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4664"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
\ntrends<\/a> have suggested that at least 50 percent of users will access the
\nInternet via a mobile device by the end of the year. With the increased use of
\nmobile devices on the rise, that means consumers are putting their personal
\ninformation at an increased risk as well. Users are eager to use their devices
\nfor everyday use and especially during the holiday shopping season. This Cyber
\nMonday, PayPal<\/a>
\ntripled their mobile payment volume from last year. Other retail giants like
\nPriceGrabber saw a significant change in traffic and sales due to mobile
\ntechnology. They had a 3,230% increase of smartphone traffic and a 775%
\nincrease of traffic coming from tablets. There is no doubting that mobile
\ntechnology is changing how consumers interact with businesses and vice versa.<\/p>\n
\nchanged the security landscape as well. Some experts have even described the
\nconsumer data scope as a triangular relationship among cloud computing, mobile
\ndevices, and security. With more mobile data than ever, that puts the consumer
\nand businesses reputations right in the middle of that triangle. With more
\nmobile devices in use and more applications and mobile
\npayment<\/a> platforms available, its to no wonder than the security landscape
\nhas changed. One of the five mobile security trends outlined by govtech.com is
\nthat mobile authentication is becoming more complex. While users value
\nsecurity, they also (sometimes more) value convenience. Many consumers prefer a
\nsingle-sign on option that offers little to no real verification that the user
\nis who they claim to be. More companies and enterprises are pushing for more
\nin-depth authentication to secure their name and consumers.<\/p>\n
\nbecome more generic. As EVS touched on in a recent
\nblog<\/a>, many authentication measures are becoming obsolete as social media
\nhas opened the door to the answers of many standard questions
\n(i.e. What is your pets name? What is the name of your high school?). Ensure
\nyour consumers and business are secure by implementing more complex
\nauthentication measures that will prevent fraud<\/a>
\nin smarter, not harder, way.<\/p>\n<\/p>\n