{"id":4727,"date":"2012-04-02T15:22:00","date_gmt":"2012-04-02T15:22:00","guid":{"rendered":"https:\/\/evssolutions.com\/smartphones-mobile-banking-and-id-theft-risks\/"},"modified":"2012-04-02T15:22:00","modified_gmt":"2012-04-02T15:22:00","slug":"smartphones-mobile-banking-and-id-theft-risks","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/smartphones-mobile-banking-and-id-theft-risks\/","title":{"rendered":"Smartphones, Mobile Banking and ID Theft Risks"},"content":{"rendered":"
In todays modern world, most consumers would agree that <\/p>\n There are many risks that open up the opportunity for <\/p>\n [Contributed by, EVS Marketing]<\/p>\n <\/p>\n <\/p>\n","protected":false},"excerpt":{"rendered":" In todays modern world, most consumers would agree that they could not survive a day without their smartphone. In many cases, a persons smartphone is their best friend, but what many consumers fail to see are the dangers that lie<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36],"tags":[42],"class_list":["post-4727","post","type-post","status-publish","format-standard","hentry","category-identity-theft","tag-phone-verification"],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4727"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4727\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
\nthey could not survive a day without their smartphone. In many cases, a
\npersons smartphone is their best friend, but what many consumers fail to see
\nare the dangers that lie within that device. According to an article in the
\nWall Street Journal, roughly 12 million people were victims of identity
\nfraud<\/a> in 2011, which was a 13% increase from 2010. A report from Javelin Strategy & Research<\/a>,
\nattribute this increase to the use of social media and smartphones. A large
\nmajority of this identity theft is due to the fact that most users store
\npersonal information on their phone and their phones are physically stolen or
\nmisplaced. The thieves then can use this information to hack into bank or
\nshopping accounts. This form of theft is not the only threat that smartphone
\nusers should be aware of though.<\/p>\n
\nidentity theft even with the smartphone in the users possession. In an
\ninterview with Julie McNelley, she discusses the threats that mobile
\nbanking applications<\/a> pose. Cross channel fraud continues to be an issue
\nwhen consumers are using mobile banking and shopping functions. It is important
\nto monitor all cross channel activity and ensure that there is some type of
\ngate between the flow of information from one point to the next. Id
\nverification<\/a> and authentication can act as these gates. Platforms that use
\nthird party vendors as a part of their security measures<\/a>
\ncan help detect when fraudulent activity is going on. By helping prove that the
\nuser is who they claim to be, each checkpoint in the security process can be
\napproved for further travel.<\/p>\n