Mobile E-Commerce: Friend or Foe?

Research
February 2015
Commerce: Friend or Foe?
Foe
Mobile E-Commerce:
A Cyber Security Study
A J.Gold Associates Research Report
“Many
any consumers now interact with the Internet primarily
through mobile devices, avoiding traditional PC devices and
browsers as not fitting into their always connected, on
on-the
themove lifestyles. For organizations with an on
on-line
line presence,
this shift has a profound impact, including an impact on
website security, loss prevention and fraud. Assessing the
impact of this shift on an organization’s cyber security is the
focus of this research study.
study.”
Research Sponsored By
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
Contents
Executive Summary ................................
................................................................................................
................................. 3
Mobile Revenues ................................
................................................................................................
...................................... 3
The Friend:................................
........................................................................................................................
........................ 3
The Foe: ................................
...........................................................................................................................
........................... 3
Protecting Against Fraud ................................
........................................................................................
........................ 3
Averaging the Mobile Losses ..................................................................................
.................. 4
Average revenue, mobile revenue, losses, and growth rate indicated by respondents ................ 4
Are You Investing Enough? Probably Not! ............................................................
............................ 4
The Study Results ................................
................................................................................................
.................................... 5
Revenue Channels ................................
................................................................................................
................................... 5
Figure 1: Percentage of revenues from Internet channels .................................................
................................
6
Figure 2: Percentage of revenue from a Mobile App .........................................................
......................... 7
Analysis: ................................................................
................................................................................................
........................................ 7
Figure 3: Expected growth of Mobile App revenue in next 5 years ....................................
................................ 8
Analysis: ................................................................
................................................................................................
........................................ 8
Revenue Loss Due to Fraud ....................................................................................
.................... 8
Figure 4:: What percentage of revenues were lost to Internet and/or Mobile fraud in past
12 months ................................
.........................................................................................................................
......................... 9
Measuring Attitudes and Expectations ................................................................
................................ 10
Figure 5: Internet and Mobile fraud represent a significant risk........................................
................................
10
Analysis: ................................................................
................................................................................................
...................................... 10
Counting Fraud Incidents ................................
......................................................................................
...................... 11
Figure 6: How many Internet Fraud incidents in past 12 months .....................................
................................ 11
Figure 7: What percentage of fraud incidents were Mobile ..............................................
................................
12
Analysis ................................................................
................................................................................................
....................................... 12
How Big are the Risks................................
............................................................................................
............................ 13
Figure 8: How big a risk is – Average of Responses .......................................................
....................... 13
Copyright © 2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign. No other parties are authorized to copy, post or
redistribute without the permission of J.Gold Associates, LLC.
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
Analysis ................................................................
................................................................................................
....................................... 13
Login Requirements for Mobile Users................................................................
.................................. 14
Figure 9: What type of Mobile login credentials Currently required ..................................
................................ 14
Figure 10: What type of Mobile login credentials required In Future ................................ 15
Verifying user account changes ................................................................
........................................... 16
Figure 11: Security measures used to verify Internet account changes ........................... 16
Figure 12: Security measures used to verify Mobile account changes............................. 17
Use of Advanced Analytical Tools ................................................................
........................................ 17
Figure 13: Using Advanced Analytical tools to detect fraud .............................................
................................
18
Mobile E-Commerce:
Commerce: Friend or Foe ................................................................
...................................... 18
Figure 14: Revenues by Company Size ................................................................
.......................................... 19
Figure 15: Lost Revenues due to Internet Fraud in past 12 months, by Company Size
(Average Percentage) ................................
................................................................................................
..................................... 19
Figure 16: Lost revenues as percentage of total in past 12 months due to Mobile Fraud,
by Company size (Average Percentage) ................................................................
......................................... 19
Analysis ................................................................
................................................................................................
....................................... 19
Conclusions ................................
................................................................................................
............................................ 20
Copyright © 2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign. No other parties are authorized to copy, post or
redistribute without the permission of J.Gold Associates, LLC.
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
Executive Summary
Mobile E-Commerce:
Commerce: Friend or Foe? That’s the question many
organizations need to ask themselves as they attempt to take
advantage
e of the dramatic growth in users with mobile devices.
Indeed, many consumers now interact with the Internet primarily
through mobile devices, avoiding traditional PC devices and
browsers as not fitting into their always connected, on
on-the-move
lifestyles. For organizations with an on
on-line presence, this shift
has a profound impact, including an impact on website security,
loss prevention and fraud. Assessing the impact of this shift on
an organization’s cyber security is the focus of this research
study. We conducted a web-based
based survey of 250 organizations
to find out whether Mobile E-commerce
commerce is a friend or a foe.
TREND:
TREND In the next 2-3
years, we expect ecommerce interactions
attributable to mobile
devices and mobile apps
to surpass those from
standard browsers. As a
result, companies not
properly securing their
mobile transactions face
a significant risk of fraud
incidents overwhelming
their businesses
J.Gold Associates LLC.
Mobile Revenues
The Friend:
The average revenue of the organizations responding was $2.54B. Fully one third of
organizations indicated they gen
generated
erated revenues from the Internet in the 26%-50%
26%
range.
Further, 25% indicated that 11%
11%-25%
25% of that revenue came from a mobile app. These
figures indicate the importance of Internet and Mobile revenue generation. Further, more
than 50% of organizations bel
believe that mobile revenues will grow 11%-50%
50% over the next 3
years, and 30% believe it will grow 51%
51%-100%.This
100%.This expected growth in mobile app revenues
reflects both the market reality of more mobile users, as well as the realization that to remain
competitive,
e, companies must offer mobile apps on smartphones and tablets despite a
significant security risk in potential fraud
fraud.
The Foe:
But there is also a dark side to this reliance on mobile revenues. Only 8% of companies
indicated that they had no losses due tto fraudulent activity in the past 12 months. And 34%
indicated they had lost as much as 5% of revenues, 14% indicated they lost as much as
10% of revenues, and 15% indicated they lost as much as 25% of revenues. This is a
staggering level of fraud induced losses. It also indicates that a very serious problem exists,
one which is not being adequately addressed by current systems and processes.
Protecting Against Fraud
About 2/3 of respondents believe that they can quickly detect and remediate Internet and
Mobile fraud on their sites. Yet a large number of fraud incidents causing significant revenue
losses are occurring. It seems clear that while many companies believe they are adequately
protected, their level of security is lacking. We expect the growth of mobile interactions to
significantly increase the percentage of mobile incidents, with 19% of companies already
indicating that 25%-49%
49% of their fraud incidents are due to mobile. We expect these rates to
at least double over the next 2
2-3 years as mobile revenue contributions increase,
increase unless
significant remedial actions are implemented quickly.
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
3
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
Averaging the Mobile Losses
The average mobile loss across all the organizations responding was $92.3M per year.
year On
average, organizations indicated that losses of approximately 3% of total revenues occur
each year due to mobile fraud. Further they expect an average 47% growth of mobile
transactions over the next five years (which we believe to be too conservative). Assuming
loss ratios remain the same, the losses a
attributable
ttributable to mobile will also increase by at least
47% over the same time period
period.
Average revenue, mobile revenue, losses, and growth rate indicated by respondents
Average Total
Revenue
Average % of
Total Revenue
Due to Mobile
Average % of
Total Rev Lost
Due to Mobile
Average $ Loss
per year due to
Mobile
Average 5 Year
Mobile Growth
Rate
$2.54B
4.53%
3.04%
$92.3M
47%
Copyright 2014 J.Gold Associates, LLC.
The
he total losses present a large amount of potential revenue if fraud were eliminated. It
indicates that although many companies believe they are spending sufficiently
sufficient on security,
given the losses they are report
reporting,, it’s clear that most aren’t. Companies must increase the
level of expenditure on remediation of these losses. Investing an amou
amount
nt equal to as little as
10%-20%
20% of the yearly losses in enhanced security systems would provide a significant
boost to an organization’s ability to limit or eliminate the losses resulting from fraud.
Are You Investing Enough? Probably Not!
All organizations with a mobile presence are experiencing loss
Conclusion:
Conclusion Companies
due to inadequate security. It is imperative that organizations of
not
making the required
all sizes invest in technology solutions that limit and/or eliminate
investment
now in
Mobile induced fraud if the company is to thrive in an
enhanced mobile
increasingly competitive marketplace. Mobile security has a
security will have
huge potential payback, likely returning 10
10-20 times or more of
sharply reduced revenue,
the investment. Clearly security is a long term challenge that
as well as much higher
needs continuous intervention. But it mus
must be on every
costs of operations, and
organization’s high priority list for the next 1
1-2 years as the need
a dissatisfied customer
to get a handle on this challenge will only grow in the future with
base that may be
increased reliance on mobile commerce. Waiting until the
exposed to fraudulent
activities which will
problem is aggravated by increased numbers of us
users and
drive
them to other more
higher losses are not in the best interest of the organization and
secure sites.
will make remediation even more difficult. Companies not
making the required investment now in enhanced mobile security
will have sharply reduced revenue, as well as much higher cos
costs
ts of operations, and a
dissatisfied customer base that may be exposed to fraudulent activities which will drive them
to other more secure sites.
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
4
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
The Study Results
Mobile E-Commerce:
Commerce: Friend or Foe? That’s the question many on
on-line
line organizations need to
ask themselves as they attempt to take advantage of the dramatic growth in users with
mobile devices. Indeed, many consumers now interact with the Internet primarily through
mobile devices, avoiding traditional PC devices and browsers as not fitting into their
thei always
connected, on-the-move
move lifestyles. For organizations with an on
on-line
line presence, this shift has
a profound impact,, including an impact on website security, loss prevention and fraud.
fraud
Assessing the impact of this shift on an organization’s cyber secu
security is the focus of this
research study.
To discover the impact of mobile commerce we created a survey that was completed by 250
organizations in North America. The average organizational revenue of the respondents was
$2.54B. The survey was intended to study attitudes and the economic impact of fraud on
web-based
based Internet and mobile applications for companies engaged in interactions with
consumers and business customers through PC and/or mobile application based EE
commerce. The questions focus
focused on obtaining the companies’ views on threats, recent
breaches,
ches, economic impacts, and solutions to securing web and mobile based customer
interactions. For this study, users were considered mobile if they interacted with web sites
through either a smartphone or tablet device. For each section below, we’ll define what
questions we asked, and then furnish an analysis of the results obtained.
Revenue Channels
We asked the respondents to identify the amount of revenues generated from various
Internet channels (e.g., PC browser, mobile) and also to estimate the amount of revenues
expected to be generated in the future. The intent was to discover the amount of revenues
rev
coming from the Mobile channel, and then be able to identify the risks associated with that
revenue stream.
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
5
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
Figure 1:: Percentage of revenues from Internet channels
Percent of Revenues from Internet
Don’t know
0.8%
4.8%
76%-100%
24.4%
51%-75%
33.2%
26%-50%
27.2%
11%-25%
9.2%
1%-10%
0%
0.4%
Copyright 2014 J.Gold Associates, LLC.
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
6
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
Figure 2:: Percentage of revenue from a M
Mobile App
What Percentage of Revenue comes from
Mobile App
4.4%
We don’t have a mobile app
Don’t know
76%-100%
1.6%
4.8%
22.8%
51%-75%
26%-50%
23.6%
11%-25%
24.4%
18.4%
0%-10%
Copyright 2014 J.Gold Associates, LLC.
Analysis: Fully one third of those responding indicated their organization generated
Internet revenues in the 26%--50%
50% range. Further, 25% indicated that 11%-25%
11%
of that
revenue came from a mobile app
app. These figures are higher than we expected, but clearly it
indicates the importance of Internet and Mobile revenue generation which constitutes a
major revenue stream.. At such a high percentage, companies must find ways to protect
those revenues from fraud. And we expect these revenues to continue to grow making it
even more imperative to secure these transactions.
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
7
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
Figure 3:: Expected growth of Mobile App revenue in next 5 years
How much do you expect Mobile App
Revenue to grow over next 5 years
Don’t know
Greater than 200%
151%-200%
2.4%
1.6%
0.8%
4.0%
101%-150%
11.2%
76%-100%
17.2%
51%-75%
30.4%
26%-50%
21.2%
11%-25%
9.6%
6%-10%
0%-5%
1.6%
Copyright 2014 J.Gold Associates, LLC.
Analysis: More than 50% of respondents believe that mobile
revenues will grow 11%-50%
50% over the next 3 years, and 30%
believe it will grow 51%-100%.
100%.This expected significant growth in
mobile app revenues reflects market reality of more mobile users,
as well as the realization that to remain competitive, companies
must continue to invest in their mobile capabilities. However, this
represents a significant security risk in potential fraud, as we shall
see.
More than 50% of
respondents believe
mobile revenues will
grow 11%-50%
11%
over
next 3 years, 30% believe
it will grow 51%-100%.
51%
Revenue Loss Due to Fraud
Most
ost companies expect mobile interactions to increase dramatically and generate significant
revenues. However, there is also a significant potential for increased fraudulent activity from
mobile devices, as they may be harder to protect and sec
secure
ure than traditional PC devices.
devices
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
8
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
Figure 4:: What percentage of revenues were lost to Internet and/or
Mobile fraud in past 12 months
Revenue lost due to Internet and Mobile
Fraud in past 12 months
2.8%
Don’t know
66%-100%
0.0%
51%-65%
0.0%
11.6%
36%-50%
14.4%
26%-35%
15.2%
11%-25%
13.6%
6%-10%
34.0%
1%-5%
0%
8.4%
Copyright 2014 J.Gold Associates, LLC.
Analysis: Only 8% of companies indicated that they had no
There is a staggering
fraudulent activity associated
ted losses over the past 12 months. And
level of fraudulent
34% indicated they had lost as much as 5% of revenues, 14%
activity losses.
losses It
indicated they lost as much as 10% of revenues, and 15% indicated
indicates a very serious
they lost as much as 25% of revenues. Many respondents indicated
problem exists that is not
even greater losses, although
ugh the higher amounts may be
being adequately
overestimations. Nevertheless, this is a staggering level of
addressed by today’s
fraudulent activity losses and explains why many organizations have
systems and processes.
processes
been cautious about moving to a greater presence in E
E-commerce.
It also indicates that a very ser
serious
ious problem exists that is not being adequately addressed by
today’s systems and processes. Improvements in loss prevention must be implemented
quickly to stem these losses.
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
9
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
Measuring Attitudes and Expectations
We asked a series of questions to gauge the attitudes and expectations on threats that are
posed to their organizations. We asked them to answer on a scale of 1 to 5, with 1 being
strongly disagree and 5 being strongly agree, how they feel about the following
follow
statements.
Figure 5 shows the average level of agreement and priorities for each statement.
Figure 5:: Internet and Mobile fraud represent a significant risk
Severity of Fraud - Average of responses
1=Strongly Disagree, 5=Strongly Agree
Fraud on our web site is quickly detected and remediated
4.04
Have sufficient systems/processes for fraud detection on mobile platform
4.01
Fraud on our Mobile App is quickly detected and remediated
4.00
Company security budget is sufficient for minimizing Internet/Mobile fraud
3.85
We are able to eliminate Internet and/or Mobile fraud
3.82
Internet and Mobile fraud represent a significant risk
3.78
The frequency and severity of fraud is on the rise
We have not seen any Mobile App fraud on on E-commerce
E
offering
We have not seen any Fraud on our Internet E-Commerce
E
offerings
3.58
3.47
3.30
Copyright 2014 J.Gold Associates, LLC.
Analysis: While most respondents say they have experienced
significant losses from
om fraud, the majority also claim they have
About 2/3 of
sufficient systems and processes in place to minimize such
respondents believe that
fraud. This seems to be a clear disconnect between reality and
they can
c quickly detect
and remediate Internet
perception. Further, while most believe the incidents of fraud are
and Mobile fraud on
on the rise, they likewise believe they have significant budgets
their sites. Yet a large
and systems in place to deal with them. About 2/3 of
number of fraud
respondents believe that they can quickly detect and remediate
incidents causing
Internet and Mobile fraud on their sites. Yet a large number of
significant revenue
fraud incidents causing significant revenue losses are
losses are nevertheless
nevertheless occurring. On average, organizations indicated
occurring.
occurring
they lost $92M
M per year in mobile fraud related incidents. It
seems clear that while many of the respondents believe they are
adequately protected, the level of security for both Internet and Mobile app interactions is
lacking. The level of fraud and the average losses per organization indicate that few
organizations have invested enough to keep their losses to an acceptable level. What is
needed is a realistic assessment of the level of fraud losses which must drive the level of
investment made in security systems to rremediate those losses. For most companies it is
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
10
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
imperative that the level of investment in security systems and processes be increased
significantly.
Counting Fraud Incidents
We asked how many fraud incidents they have had in the past year and how many were
we as
a result of using a Mobile app accessing their E
E-commerce sites.
Figure 6:: How many Internet Fraud incidents in past 12 months
How many Internet Fraud incidents in past 12
months
Don't Know
10,000+
5000-9999
1000-4999
500-999
250-499
100-249
50-99
25-49
10-24
1-9
0
Total
0
1-9
11%
30%
10-24 25-49
25
50-99
16%
9%
7%
100249
7%
250499
6%
500999
5%
1000- 5000- 10,000 Don't
+
Know
4999 9999
4%
1%
0%
0%
Copyright 2014 J.Gold Associates, LLC.
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
11
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
Figure 7:: What percentage of fraud incidents were Mobile
Percentage of Fraud Incidents Due to Mobile
75%-100%
50%-74%
2%
7%
19%
25%-49%
29%
10%-24%
28%
1-9%
0%
14%
Copyright 2014 J.Gold Associates, LLC.
Analysis: 48% of respondents indicated they experienced between
48% indicated they
1-24
24 overall fraud incidents in the past year, while 25% indicated
experienced between 11
they experienced between 25
25-250 incidents. The small number of
24
fraud
incidents
in
the
incidents reported either indicates organizations that have a small
past year, while 25%
scale presence on the web, or more likely ones that are somewhat
indicated between 25oblivious to what is actually happening. Interestingly 28% of
250 incidents. 19% of
respondents indicated that 1%
1%-9% of the total fraud incidents were
companies indicated
mobile based, while 29% indicated that mobile caused 10%
10%-24% of
that 25%-49% of their
fraud incidents. We expect the growth of mobile interactions to
fraud incidents are due
significantly increase the percentage of incidents caused by the
to the mobile channel.
mobile channels, with 19% of companies already iindicating that
Clearly mobile is a
25%-49%
49% of their fraud incidents are due to the mobile channel.
growing risk that’s not
being adequately
Even if the number of incidents is underreported, the amount of
addressed
loss as we shall see is quite high. Much more work needs to take
place in securing mobile interactions and mobile applications before
organizations can feel confident that mobile fraud is being controlled
controlled,, or will not spin out of
control with the expected growth in interactions
interactions. Clearly mobile is a growing risk that’s not
being adequately addressed.
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
12
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
How Big are the Risks
We asked about the risk that various technologies and processes pose by having
respondents indicate on a scale of 1
1-5,
5, with 1 being strongly disagree and 5 being strongly
agree, what they thought of a particular risk. Figure 8 indicates the average score for each
risk, and reflects what users thought were the most serious threats. Malware, as is to be
expected, ranked quite high on the overall list. But increasingly, App Store Fraud (i.e.,
unauthorized or illegitimate app stores) and Fake Mobile Apps (i.e., apps masquerading as
something else or embedded with malware), are increasingly being recognized.
Figure 8:: How big a risk is – Average of Responses
How Big a Risk is: (Average of Responses)
3.81
PC/Web Browser Malware
3.64
Mobile Device Malware
E-Wallet Fraud
3.36
App Store Fraud
3.29
Fake Mobile Apps
3.28
Account Takeover
3.26
Password Guessing
3.14
Copyright 2014 J.Gold Associates, LLC.
Analysis: There was a fairly even distribution of what the respondents thought were risk
factors, with no one risk vector being dramatically more than the others. However, PC/Web
Browser Malware, followed by Mobile Device Malware are the most visible and likely easiest
to identify. This is likely a legacy
acy of past experiences with PC
PC-based
based systems, extended into
the mobile realm. Yet these are very real risks, and it would make sense to exert reasonable
efforts in protecting against these two security threats through updated practices and
technology solutions (e.g., two factor authentication, malware protection, encrypted storage,
secured “vaults”). There is also a realization that mobile apps, via a “fake” app store or via
malicious code embedded in an app, represent a growing risk tha
thatt must be dealt with.
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
13
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
Login Requirements for Mobile Users
Login methods for mobile users are migrating ffrom traditional user
We expect a major
name and password to more advanced biometrics and multi
multi-factor
transition in mobile
authentication. This will be enabled by more devices enhanced with
authentication
to take
advanced technology as well as a proliferation of easier to use
place over the next 3-4
systems allowing more secure ID methods. We expect the majority
years, with aggressive
of the transition to be completed in the next 3
3-4 years, with some
organizations doing so
aggressive organizations deploying systems in the next 1
1-2 years.
in 1-2 years.
We also expect the mobile channel to lead in this transition. What’s
shocking is the percentage of ccompanies
ompanies that fail to enforce basic credentials we have all
grown accustomed to (e.g., 23% don’t require user name and password to log in).
Figure 9:: What type of Mobile login credentials Currently required
What type of log in authentication required from
Mobile users Currently?
Yes
No
51.6%
Device ID
48.4%
44.0%
Challenge based questions
56.0%
40.8%
IP Recorgnition
59.2%
28.0%
Phone based authentication (SMS & voice)
19.6%
Soft tokens
Biometrics
23.2%
76.8%
User name and password
17.2%
72.0%
80.4%
82.8%
Not applicable 3.2%
96.8%
None of above 1.6%
98.4%
Don't know 0.4%
99.6%
Copyright 2014 J.Gold Associates, LLC.
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
14
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
Figure 10:: What type of Mobile login credentials required In Future
What type of log in authentication required from
Mobile users in the Future?
Yes
No
47.2%
Biometrics
52.8%
38.4%
Phone based authentication (SMS and Voice)
61.6%
Soft Tokens
32.0%
68.0%
IP Recognition
30.4%
69.6%
Challenge based questions
26.4%
73.6%
Device ID
25.6%
74.4%
User name and password
9.6%
90.4%
Don't know 5.6%
94.4%
Not applicable 4.0%
96.0%
None of above 2.4%
97.6%
Copyright 2014 J.Gold Associates, LLC.
Analysis:: There will be a significant shift in required Mobile login
credentials taking place over the next 2
2-3 years as the primary focus
shifts from user name and password to more advanced mechanisms
like biometric, phone based authentication and soft tokens for two
factor authentication. This upgrad
upgrading of login techniques will improve
the security of transactions by more positively determining wh
who and
what device is being used, and should significantly reduce the threat
levels and consequent fraud on mobile transactions.
There will be a
significant shift in
required Mobile login
credentials over the next
2-3 years as focus shifts
from name and
password to advanced
mechanisms like
biometric, phone based
authentication and soft
tokens for two factor
authentication.
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
15
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
Verifying user account changes
We asked which types of verification techniques are employed to confirm that account
changes are being made by the designated account owner, both for IInternet
nternet connections
and Mobile connections.
Figure 11: Security measures used to verify Internet account
changes
Security measures used to verify account
changes for Internet users
Yes
No
74.4%
Challenge based questions
63.2%
Email verification
Phone based authentication
Nothing beyond user name and password 5.2%
Don't know 2.0%
25.6%
36.8%
36.8%
63.2%
94.8%
98.0%
Copyright 2014 J.Gold Associates, LLC.
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
16
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
Figure 12: Security measures used to verify Mobile account changes
Security measures used to verify account changes for
Mobile users
Yes
No
54.4%
Email verification
45.6%
Phone based authentication
46.4%
53.6%
Challenge based questions
44.8%
55.2%
Nothing beyond user name and password
11.6%
Don't know 3.6%
88.4%
96.4%
Copyright 2014 J.Gold Associates, LLC.
Analysis:: The disparity between primary methods for Internet users
(challenge based questions) versus Mobile used (Email verification)
is primarily one of perception, assuming that mobile devices are
harderr to use for data entry and will therefore being more difficult to
require challenge-based
based question inputs. This is generally no longer
the case with larger and higher definition screens, and better, faster
connections. We expect to see higher levels of au
authentication
required in the near future for mobile users, a least on a par with
those of Internet users who are accustomed to multi
multi-factor
authentications and multi-step
step logins/confirmations.
It’s no longer the case
that mobile logins
present more of a
challenge than on
Internet browsers. The
result is higher levels of
authentication for
mobile users.
Use of Advanced Analytical Tools
We asked if they used any advanced analytics tools such as behavior tracking and analysis,
to implement a more secure interaction by detecting likely fraudulent activity.
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
17
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
Figure 13:: Using Advanced Analytical tools to detect fraud
Use of Advanced Analytical Tools to detect
Web and Mobile Fraud
Yes
Don't know
73.6%
Future
Currently
No
19.2%
39.6%
56.8%
7.2%
3.6%
Copyright 2014 J.Gold Associates, LLC.
Analysis: The use of advanced analytical tools will increase by
We expect an increase of
approximately 50% in the next few years as companies search for
at least 50% in use of
compelling ways to fight the increasing level of fraud. Our
analytical prediction
respondents indicated that the use of advanced analytics tools to
tools over the next 2-3
2
track behavior
or and mitigate fraud will grow by nearly 50%. This is
years for Internet and
a direct result of the maturity of these tools and the ability to make
Mobile fraud detection.
detection
use of them with less required resources, including through cloud
based service offerings,, as well as the reduced cost of employin
employing
the technology.. We expect that this trend will continue to gain momentum over the next 2-3
2
years.
Mobile E-Commerce:
Commerce: Friend or Foe
Mobile interactions have both a positive and negative effect. On the positive side they allow
users to access websites mor
more
e often when they are truly mobile. Indeed, most of the
respondents indicated a significant expected increase in revenues by allowing mobile
interactions with their sales or service on
on-line
line presence. But mobile also has a negative
effect. Most respondents expect mobile to represent a significant portion of fraudulent
interactions and provide significant loss of revenue.
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
18
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
Below is an evaluation of the potential losses from Internet and Mobile Fraud. Figure 14
shows the average revenues generated by organiz
organizations
ations of various sizes,
sizes based on the
survey data provided by the respondents
respondents,, indicating Internet revenues were 26%-50%
26%
of
total revenue. The company sizes were Very Small (($100M),
$100M), Small ($100M-$500M),
($100M
Medium ($500M-$1B)
$1B) and Large ($1B+).
Figure 14: Revenues
nues by Company Size
Total
Revenues
Internet
Revenues
Very Small
Small
Medium
Large
<$100M
$100M-$499M
$500M-$999M
$1B-$20B+
$1B
$26M-$50M
$26M-$250M
$125M-$500M
$250M-$10B
$250M
Copyright 2014 J.Gold Associates, LLC.
Figure 14 is a compilation of the average amount of loss in the past 12 months due to
Internet fraud based on the responses obtained from various size companies.
Figure 15: Lost Revenues due to Internet Fraud in past 12 months,
months
by Company Size (Average Percentage)
%
$
Very Small
6%-10%
$1.5M-$5M
Small
6%
6%-10%
$1.5
$1.5M-$25M
Medium
11%-20%
$13M-$100M
Large
6%-10%
10%
$150M-$1B
$150M
Copyright 2014 J.Gold Associates, LLC.
Figure 15 represents losses incurred within the past 12 months that organizations indicated
were due to Mobile fraud (as part of overall Internet related fraudulent losses).
Figure 16:: Lost revenues as percentage of total in past 12 months
due to Mobile Fraud, by Company size (Average Percentage)
%
$
Very Small
Small
Medium
Large
1%-9%
$150K-$450K
10%
10%-24%
$150K
$150K-$6M
10%-24%
$1.3M-$24M
10%-24%
24%
$15M-$240M
$240M
Copyright 2014 J.Gold Associates, LLC.
Analysis:: The above figures show the average amount of revenue organizations indicated
they lost due to Internet and Mobile channel fraud over the past 12 months. It’s apparent that
taking additional steps to reduce the amount of fraud in the on
on-line
line channel has a potentially
huge payback, particularly for larger organizations that obtain significant revenues
revenue from e-
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
19
Mobile E-Commerce:
Commerce: Friend or Foe?
Cyber Security Study
commerce and mobile app solutions. Losses of $15M - $240M
Taking additional steps
step
in fraudulent interactions are compelling reasons to invest in
to
reduce
the
amount
of
better fraud reduction systems. Further, it’s important to
fraud
on-line
on
has
a
understand that the losses above are within a 12 month period
potentially huge
and therefore
herefore available to recover annually. This makes it even
payback, particularly for
more imperative that companies invest in better security for
larger organizations
their mobile applications and transactions. We also expect the
that obtain significant
amount of Internet revenues generated, and hence the amount
revenues from ee
of Fraudulent losses,
es, to increase over the next 2-3 years. It is
commerce and mobile
therefore imperative that organizations of all size
sizes invest in
app solutions.
reducing and as much as possible in eliminating all Internet and
Mobile
obile induced fraud if the company is to thrive in an increasingly competitive
competit
marketplace.
Conclusions
As can be seen from the results of this study, many companies
Those companies that do
are
e relying on the Internet as a major contributor to their
not make the required
revenues. Further, the role of Mobile interactions is increasing,
investment in enhanced
both through mobile web and mobile apps. Yet there seem
seems to
mobile
security will have
be a major disconnect between the contributions from mobile esharply reduced revenue,
commerce, and the steps being taken to protect those
as well as much higher
interactions. Despite many companies indicating they believe
costs of operations, and
they are protected,, it is clear that the current level of investment
a dissatisfied customer
in mobile security is not up to the task. It is imperative that
base.
organizations reassess
ess their mobile strategies in light of the
growth in fraudulent transactions and the resulting loss of revenues. Mobile security has a
huge potential payback,, likely returning 10
10-20 times or more of the investment. It must be on
every organization’s high priority list for the coming 1
1-2 years to get things started now,
now and
then continuously updated and enhanced for the foreseeable future
future.. Those companies that
do not make the required investment in enhanced mobile security will have sharply reduced
revenue, as well as much higher costs of operations, and a dissatisfied customer base.
The research contained in this study has been licensed to RSA and
TeleSign. No other parties are authorized to copy, post and/or redistribute
this research without the express written permission of the copyright holder,
J.Gold Associates, LLC.
Copyright © 201
2015 J.Gold Associates, LLC. All rights reserved.
www.jgoldassociates.com
This research is licensed to RSA and TeleSign
TeleSign. No other parties are authorized to copy, post or
redistribute this research without the permission of J.Gold Associates, LLC.
20
About J.Gold Associates
J.Gold Associates provides insightful, meaningful and actionable analysis of trends and
opportunities in the computer and technology industries. We offer a broad based knowledge of the
technology landscape, and bring that expertise to bear in our work. J.Gold Associates provides
strategic consulting, syndicated research and advisory services, and in-context
context analysis to help its
clients make important technology choices and to enable improved product deployment decisions
and go to market strategies.
J.Gold Associates, LLC
6 Valentine Road
Northborough, MA 01532 USA
+1 508 393 5294
www.jgoldassociates.com