Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Identity Theft

Below you will find reports with the tag of “Identity Theft”

image from TransUnion 2024 State of Omnichannel Fraud Report

TransUnion 2024 State of Omnichannel Fraud Report

In the 2024 State of Omnichannel Fraud Report, TransUnion brings together trends, benchmarks, and identity and fraud expertise from across our organization. It provides insight to those responsible for preventing fraud and streamlining customer experiences to deliver better business outcomes. Use this report to evaluate current fraud prevention programs in the context of the broader market.

(more available)
Added: March 25, 2024
image from Workplace Identity Security Trends and Challenges to Watch in 2024

Workplace Identity Security Trends and Challenges to Watch in 2024

The Workplace Identity Security Trends and Challenges report investigates the identity security landscape and challenges facing organizations today. The research finds that many struggle to build an integrated and comprehensive identity security strategy, relying on disconnected tools and practices that create inefficiencies and leave organizations seriously vulnerable to attacks and breaches.

(more available)
Added: February 26, 2024
image from The Annual Cybersecurity Attitudes and Behaviors Report 2023

The Annual Cybersecurity Attitudes and Behaviors Report 2023

In this report, CybSafe and The National Security Alliance surveyed over 6,000 people across the United States, Canada, the United Kingdom, Germany, France, and New Zealand to get a better understanding of the security behaviors and attitudes. They asked the people about their knowledge of cybersecurity risks, their security best practices, and challenges they face in staying safe online. Cybercriminals know if they want to target an organization, they need to target its people. They believe this report will help organizations to better protect themselves and their people.

(more available)
Added: November 29, 2023
image from 2022 Consumer Impact Report

2022 Consumer Impact Report

The 2022 Consumer Impact Report goes beyond the known financial implications of identity crimes and explores the lost opportunities, as well as the emotional, physical and psychological impacts experienced by victims resulting from the crimes.

(more available)
Added: January 4, 2023
image from 2022 Attack Surface Management Maturity Report

2022 Attack Surface Management Maturity Report

The 2022 Attack Surface Management Maturity Report has been produced by Cybersecurity Insiders, the 500,000 member online community of information security professionals, to explore the current state, exposures, and priorities that organizations need to consider to fortify their security posture.

(more available)
Added: July 5, 2022
image from The Annual Cybersecurity Behaviors and Attitudes Report 2021

The Annual Cybersecurity Behaviors and Attitudes Report 2021

This report examines cybersecurity attitudes and behaviors of the general public, shedding light on one of the most important aspects of cyber risk - the human factor. This research applies scientific rigor and robust data analysis to help academics, practitioners, and policy makers around the world better understand people-related security issues as they relate to enhancing awareness, influencing security behavior and improving security culture.

(more available)
Added: November 22, 2021
image from Phishing Activity Trends Report Q4 2020

Phishing Activity Trends Report Q4 2020

This report analyzes phishing attacks and other identity theft techniques used in Q4 2020.

Added: February 24, 2021
image from Fraud in the Wake of COVID-19: Benchmarking Report

Fraud in the Wake of COVID-19: Benchmarking Report

This report provides the results of the third study the ACFE has done on the fight against fraud in the wake of COVID-19. It aims to help educate organizational leadership and staff, as well as the general public, so that it is better understood where fraud is going in the wake of COVID-19.

(more available)
Added: January 21, 2021
image from Overstimulating: CARES Act Fraud On the Deep and Dark Web

Overstimulating: CARES Act Fraud On the Deep and Dark Web

After the CARES act was passed in March of 2020, fraudsters worked towards making money off of it. This report seeks to understand all of the components of fraud happening on the dark web in relation to the CARES act.

(more available)
Added: July 29, 2020
image from The C-Suite Report: The Current State and Future State of Cybersecurity

The C-Suite Report: The Current State and Future State of Cybersecurity

This report comes from a survey conducted by WSJ Intelligence and sponsored by Forcepoint. It explores the current state of cybersecurity as well as challenges that lie between current cybersecurity systems and risks going forward.

(more available)
Added: June 21, 2020
image from 2017 The Year of Internal Threats and Accidental Data Breaches

2017 The Year of Internal Threats and Accidental Data Breaches

Gemalto outlines changes to threats in 2017, including data from incidents in the year.

Added: February 18, 2020
image from Management Alert - FEMA Did Not Safeguard Disaster Survivors' Sensitive Personally Identifiable Information (REDACTED)

Management Alert - FEMA Did Not Safeguard Disaster Survivors' Sensitive Personally Identifiable Information (REDACTED)

This alert contains two recommendations directing actions Federal Emergency Management Agency (FEMA) should take to safeguard both Personally Identifiable Information (PII) and Sensitive Personally Identifiable Information (SPII) of disaster survivors and prevent additional privacy incidents similar to one we identified during our ongoing audit of FEMA’s Transitional Sheltering Assistance (TSA) program. FEMA concurred with both recommendations.

(more available)
Added: March 26, 2019
image from Healthcare Breach Report 2019

Healthcare Breach Report 2019

Bitglass’ fifth annual Healthcare Breach Report analyzes the data from the US Department of Health and Human Services’ “Wall of Shame.” The database contains information about breaches of PHI that affected more than 500 individuals.

(more available)
Added: March 26, 2019
image from Insider Hacks: How To Catch And Prosecute Fraudsters

Insider Hacks: How To Catch And Prosecute Fraudsters

From the report, “Partnering with retailers for over a decade to detect and prevent online fraud has unearthed many insights about eCommerce criminals. One insight is that while detecting and preventing fraudster attacks is good, it is even better to catch and prosecute. But gathering evidence and building a case can be complex. Kount asked Skip Myers and Chad Evans to share best practices and firsthand success stories with building, submitting cases and engaging with law enforcement to not only catch fraudsters, but to bring them to justice.”

(more available)
Added: February 16, 2019
image from The Tech Needed to Power Payments and Combat Criminals

The Tech Needed to Power Payments and Combat Criminals

Retailers can’t get paid if their payment processing doesn’t work. And if a transaction proves fraudulent, a retailer not only loses the value of the sale and the merchandise, but also risks losing the loyalty of a customer who was billed incorrectly for the purchase. Here’s a look at the essential components of payment processing that every online retailer should consider—no matter their size— in order to provide both a positive customer experience and to successfully collect payment.

(more available)
Added: February 16, 2019
image from Global Fraud Attack Index: Third Quarter 2016

Global Fraud Attack Index: Third Quarter 2016

From the report, “Forter and PYMNTS.com have partnered to track, analyze and report on the important trends happening in the world of fraud as it relates to payments and commerce online. Every quarter, we are monitoring fraud attempts, reflected as a percent of U.S. sales transactions , on U.S. merchant websites. How big is the storm? Where is it? How is it changing? Read on to find out. For each of the Index editions in 2016, we are using the fraud rates observed in 2015 as a benchmark for comparing the state of fraud each quarter.” Read on to find out more.

(more available)
Added: February 13, 2019
image from Global Fraud Attack Index: Second Quarter 2016

Global Fraud Attack Index: Second Quarter 2016

Forter and PYMNTS.com partnered together to track, analyze and report on the important trends happening in the world of fraud as it relates to payments and commerce online. Every quarter we will monitor how fraud attempts, reflected as a percent of U.S. sales transactions, on U.S. merchant websites are trending. Up? Down? Stable? Time to panic? Hopefully not.

(more available)
Added: February 13, 2019
image from The Black Report: Decoding The Minds Of Hackers

The Black Report: Decoding The Minds Of Hackers

This unique report offers insight into the world of hackers. It seeks to stand apart from other annuals and quarterlies by presenting information other reports are not discussing.

(more available)
Added: February 9, 2019
image from Changing Data Breach Notification Laws: Regulatory Trends

Changing Data Breach Notification Laws: Regulatory Trends

From the report, “Analyzing this flurry of legislative activity in 2018, we have identified a number of continuing trends. In general, the overarching trend is increasing stringency and growing complexity in breach notification obligations. In the following pages, we’ll break down this overarching trend into separate and distinct trends. We’ll also look at what these trends mean for how privacy and security professionals work today.”

(more available)
Added: February 9, 2019
image from The Changing Face of Online Banking and Financial Fraud

The Changing Face of Online Banking and Financial Fraud

This report seeks to review the dramatic changes that took place in the banking industry in 2018, and lay out a strategy for those institutions in 2019.

(more available)
Added: January 31, 2019
image from Unmasking Synthetic Identites: Exposing the Real Fraudster Behind the Fabricated Persona

Unmasking Synthetic Identites: Exposing the Real Fraudster Behind the Fabricated Persona

From the report, “Widespread data breaches, the EMV migration, and efforts to extend the longevity of the SSN, have created an ideal environment in which synthetic identity fraud is flourishing. Furthermore, consumers’ physical and digital footprints are becoming more complicated, meandering across locations, devices, and geographies. This makes it more difficult than ever to differentiate legitimate user behavior from fraudsters. Businesses need to prevent synthetic identities from entering their ecosystems by understanding anomalies to individual user behavior and helping to correlate the seemingly disconnected events and security incidents in real time. Combining historical and real-time data and leveraging machine learning to analyze individual behavior across channels can reveal complex patterns to help detect and block synthetic identities without causing friction for real customers.”

(more available)
Added: January 30, 2019
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 13, 2025 04:08 UTC (build b1d7be4)