Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Replacement Cost

Below you will find reports with the tag of “Replacement Cost”

image from How Much Is the Data on Your Mobile Device Worth?

How Much Is the Data on Your Mobile Device Worth?

The purpose of this research, sponsored by Lookout, is to understand the value of the data we access and store on our mobile devices and if we are doing enough to protect that data.

(more available)
Added: October 26, 2018
image from Cybercrime against Businesses, 2005

Cybercrime against Businesses, 2005

This article, edited in 2008, compiles a list of cyber crimes that impacted business in 2005.

Added: October 25, 2018
image from Stacking The Odds Against The Fraud

Stacking The Odds Against The Fraud

This paper provides answers for how marketing and fraud can work together to help online gambling operators to win.

Added: October 23, 2018
image from Not If But When: Why Community Banks and Credit Unions Should Invest In Fraud Protection

Not If But When: Why Community Banks and Credit Unions Should Invest In Fraud Protection

From the Report, “A common refrain from community banks and credit unions is that since they are not experiencing a fraud attack at the moment, they don’t see any need to invest in fraud protection. Now apply the same logic elsewhere – it follows then, that purchasing home insurance doesn’t make sense, as my house isn’t currently on fire. This kind of reasoning is short-sighted and leaves banks and their customers vulnerable to fraud–related financial losses. It also ignores a growing, if unfortunate, precedent – that losses from cyberattacks number in the billions of dollars annually (one report put it as high as $445 billion), and it continues to rise every year.”

(more available)
Added: October 22, 2018
image from Fine Determination

Fine Determination

This paper provides insight into specific fines that will occurr due to the GDPR.

Added: October 21, 2018
image from How To Stop Fraud With The Resources You Have

How To Stop Fraud With The Resources You Have

This is a handy guide to fraud protection management.

Added: October 21, 2018
image from Cyber Value at Risk

Cyber Value at Risk

This paper was written to help Enterprises prioritize cyber security activities in real time based on potential financial loss.

Added: October 20, 2018
image from Lloyds City Risk Index 2015-2025

Lloyds City Risk Index 2015-2025

Lloyd’s City Risk Index 2015-2025, shows that trillions of dollars are at risk from manmade and natural disasters – disasters that have occurred in the past and are likely to do so again in the future. The nature of these threats is changing too. Certain extreme weather events linked to climate change are increasing in severity and frequency. Manmade threats, such as cyber attack and market crash, are increasingly significant as companies expand into new markets and territories.

(more available)
Added: October 19, 2018
image from Post-Soviet Bank Heists

Post-Soviet Bank Heists

This report takes a look at recent bank heists that originated from Post-Soviet states.

Added: October 19, 2018
image from World Economic Situations And Prospects: Update as of mid-2018

World Economic Situations And Prospects: Update as of mid-2018

The present document updates World Economic Situation and Prospects 2018 (United Nations publication, Sales No. E.18.II.C.2), released in December 2017.

(more available)
Added: October 19, 2018
image from The National Computer Security Survey (NCSS)

The National Computer Security Survey (NCSS)

The Bureau of Justice Statistics (BJS) within the U.S. Department of Justice (DOJ), along with the U.S. Department of Homeland Security (DHS), conducted the National Computer Security Survey (NCSS), a nationally representative sample of businesses across 36 industry sectors. This report will be of interest to researchers and analysts who are interested in under- standing the methodology underlying the NCSS, including questionnaire design, survey field- ing, sampling, and weighting methodologies for this large-scale survey. The report will also be informative for scholars who are interested in analyzing the NCSS public-use data file.

(more available)
Added: October 17, 2018
image from Estimating The Global Cost Of Cyber Risk: Methodology And Examples

Estimating The Global Cost Of Cyber Risk: Methodology And Examples

The goal of this research was to produce a transparent methodology for estimating present and future global costs of cyber risk, acknowledging the considerable uncertainty in the frequencies and costs of cyber incidents.

(more available)
Added: October 16, 2018
image from 2017 Call Center Fraud Report

2017 Call Center Fraud Report

This report will provide insights about the depth and breadth of fraud activity across a variety of industries from a data set of more than half a billion calls.

(more available)
Added: October 15, 2018
image from 2017 North America Online Fraud Benchamark Report

2017 North America Online Fraud Benchamark Report

Based on the results of a survey, this paper looks at key trends and challenges facing North American businesses seeking to find the right balance and discusses some of the approaches and tools that are available to help you deal with cyber-based fraud management.

(more available)
Added: October 14, 2018
image from Annual Fraud Benchmarking Report:

Annual Fraud Benchmarking Report:

Based on the results of a survey, this paper looks at key trends and challenges facing North American businesses seeking to find the right balance and discusses some of the approaches and tools that are available to help you deal with cyber-based fraud management.

(more available)
Added: October 13, 2018
image from EMV Issuance Trajectory And Impact On Account Takeover And CNP

EMV Issuance Trajectory And Impact On Account Takeover And CNP

This report is sponsored by iovation, which wanted to investigate the state of the U.S. EMV migration and the associated account takeover, CNP fraud, and application fraud trends. The research will help FI executives benchmark their EMV progress against their peers’ and better understand the rapidly shifting fraud landscape.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 24, 2025 12:08 UTC (build b1d7be4)