Europe Is A Cybercrime Hub

As attacks patterns morph across the region, European digital businesses were hit with 80 million fraud attempts, as they experienced more pronounced spikes of peak attack periods throughout Q1 2018 compared to previous years.  There has been an evolution from short, isolated peaks of fraud attacks to more sustained, high-volume attacks across a number of days or even weeks. 

As a result, the onus is upon European digital businesses to invest in innovative, real-time security capabilities that are robust enough to withstand these intense periods of attack. 

Identity spoofing is seeing a significant uptick across the region, resulting from the vast swathes of stolen personal data now available on the dark web. In Germany, for example, identity spoofing attacks have more than doubled compared to Q1 2017. The high volume of attacks originating from Germany across the board led to the country featuring in the list of the top five perpetrators of attacks globally, alongside the UK.

The downstream effect of identity abuse in the wake of major data breaches is particularly felt within the European eCommerce market, the industry that is being hit the hardest with regards to sheer volume of attacks. 60 million eCommerce transactions were rejected as fraudulent in Q1, which is a 47% increase over the previous year. There is a particular focus on identity testing activities targeting this sector, with fraudsters looking to capitalise upon the low-friction approach taken by many merchants aimed at increasing online revenues and encouraging customer loyalty in a fiercely competitive market.

“As European digital businesses face intense onslaughts of identity abuse and fraud attacks they need to prioritise investments in new technologies that give insight into true identity of their users in a way that is invisible to the consumer. This enables them to provide the low-friction experience they need to grow their business, without compromising on security,” commented Alisdair Faulkner, Chief Products Officer at ThreatMetrix.

Europe turns toward mobile, as the secure digital channel
Europe is truly at the forefront of the mobile-first revolution, with 58 percent of all transactions coming from mobile devices. This is higher than the global average of 51 percent and this trend is particularly pronounced in the UK which sees 67% of transactions coming from mobile. 

Key mobile growth regions include France and Central and Eastern Europe, where mobile transactions grew 96 percent and 63 percent respectively.

The banking sector is helping to drive this uptick in mobile transactions, for example in the UK 73% of all banking transactions were from mobile. Not only does mobile banking suit the on-the-go modern consumer, and encourage loyalty due to increased user engagement, it is also proving to be the more secure channel.

Across all industries, mobile transactions are attacked half as much of cyberattacks proportionally, compared with desktop transactions. Although the volume of attacks on mobile transactions is rising, this will remain the more secure way to transact online for the foreseeable future.

“When employing the correct technology, the mobile channel offers a wealth of opportunities to effectively identify consumers in a way that is persistent and reliable, but totally invisible to the user,” concluded Faulkner. 

“Mobile users have zero tolerance for being slowed down by clunky security steps, but the future of this channel relies on the continued ability of digital businesses to offer consumers peace of mind that their identity and financial information is secure.”

HelpNetSecurity

You Might Also Read: 

The Impact Of Cybercrime On UK Business:

AI Will Boost Cybercrime & Security Threats:
 

« Ecuador Spied On Assange
Business Cyber Security Strategy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

Venable

Venable

Venable is an American Lawyer 100 law firm with nine offices across the USA, Practice areas include Cybersecurity.

Data Security Council of India (DSCI)

Data Security Council of India (DSCI)

DSCI is a premier industry body on cyber security and data protection in India, committed to making the cyberspace safe, secure and trusted.

Digital Infrastructure Association (DINL)

Digital Infrastructure Association (DINL)

DINL is the leading representative for companies and organisations which are active within the Dutch digital infrastructure sector.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

Private Internet Access

Private Internet Access

Private Internet Access is a Virtual Private Network services provider offering secure encrypted access to the internet.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

Macomb-OU Incubator

Macomb-OU Incubator

Macomb-Oakland University Incubator supports startup and emerging companies in the niche industries of defense, homeland security, advanced manufacturing and technology.

Torq

Torq

Torq's no-code automation modernizes how security & operations teams work with easy workflow building, limitless integrations and numerous pre-built templates.

Surefire Cyber

Surefire Cyber

Surefire Cyber delivers swift, strong response to cyber incidents such as ransomware, email compromise, malware, data theft, and other threats with end-to-end response capabilities.

Ministry of Electronics & Information Technology (MeitY)

Ministry of Electronics & Information Technology (MeitY)

The Ministry of Electronics & Information Technology is an executive agency responsible for IT policy, strategy and development of the electronics industry.

S2W

S2W

S2W is a data intelligence company specialized in cyber threat intelligence, brand/digital abuse, and blockchain.

Queen Consulting & Technologies

Queen Consulting & Technologies

Queen Consulting & Technologies specialize in providing IT support, management, and Security to Gov’t Contractors, CPAs, and Nonprofits.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.