{"id":4665,"date":"2012-11-20T14:30:00","date_gmt":"2012-11-20T14:30:00","guid":{"rendered":"https:\/\/evssolutions.com\/holiday-threats-social-media-and-mobile-risks\/"},"modified":"2012-11-20T14:30:00","modified_gmt":"2012-11-20T14:30:00","slug":"holiday-threats-social-media-and-mobile-risks","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/holiday-threats-social-media-and-mobile-risks\/","title":{"rendered":"Holiday Threats – Social Media and Mobile Risks"},"content":{"rendered":"


<\/p>\n

Holiday season is in full swing and that means consumers and
\nbusinesses are more vulnerable than ever for identity
\nfraud<\/a>. Between sharing wish lists and downloading apps for easy shopping,
\nsocial media and mobile technology pose huge holiday threats. Not only do
\nconsumers need to protect themselves from identity theft, but companies need to
\ntake the extra initiative to guard their reputation to ensure that consumers
\nwill be return buyers.
<\/p>\n

Social Media<\/em>
<\/p>\n

The world is no longer round since the upcoming of social
\nmedia, it has become flat and interconnected with a the click of a mouse. People
\nare able to connect with each other in a faster, easier way. Perhaps the most
\nconvenient part of social media is also the most dangerous. Users are able to,
\nand often do, share every aspect of their lives via social media. This leaves
\nlittle to no information private for only the user to know. Things such as full
\nbirthday, high school name, pet name, and even parents names are easily found
\non a social media profiles. Sound familiar? These are very traditional security
\nquestions asked when verifying an account or identity on most online platforms.
\nSocial media has
\nmade these questions not so secure when asking for proof of identification. In
\nadditional to sharing personal information, social media also poses a threat
\nbecause many accounts have integrated logins with social profiles such as
\nFacebook. So that means if you sign up for an account on xyz.com and log in
\nusing your Facebook and then link your credit card on your xyz.om account,
\nsomeone with your Facebook credentials could access your bank account.
<\/p>\n

Mobile<\/em>
<\/p>\n

Mobile poses very similar threats as social media.
\nWhile its easy and convenient to link your credit card account to mobile apps and log ins, it turns mobile phones into walking keys into consumers bank
\naccounts.
Mobile
\nsecurity<\/a> is still a hurdle for many companies as it is still fairly new to
\nsome industries. Even though banks have adopted mobile technology fairly
\nquickly, mobile banking still is a threat to companies and consumers alike. As
\nMcNelley stated last year, 90% of bank risk executives say mobile
\nbanking will create the next big wave of financial fraud. The Mobile Threat
\nReport for Q3 of 2012, also illustrates that mobile fraud is still an on
\ngoing issues. It states that 71.5% of mobile fraud is in the form of a Trojan.
\nThese Trojans can attack apps that store personal account information and
\ncontract lists and then forwards the information to a remote address.
<\/p>\n


<\/p>\n

Whether its shopping the old fashioned way, or looking into
\n
fraud
\nprevention measures<\/a>, do your part this holiday season to protect yourself
\nand company.
<\/p>\n


<\/p>\n

[Contributed by EVS Marketing]
<\/p>\n

<\/p>\n


<\/p>\n","protected":false},"excerpt":{"rendered":"

Holiday season is in full swing and that means consumers and businesses are more vulnerable than ever for identity fraud. Between sharing wish lists and downloading apps for easy shopping, social media and mobile technology pose huge holiday threats. Not<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[39],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4665"}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4665"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4665\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}