'TeleSign embeds trust at every touchpoint,' assures Joseph Burton

Media 7 | December 8, 2021

Joseph Burton, Chief Executive Officer at TeleSign elaborates on Promotion Abuse, Communication Fraud, and Buy Now Pay Later Fraud. Read on to know about the biggest online financial threat for consumers and much more.

In 2022, Buy Now Pay Later (BNPL) will continue to be a top retail priority. As BNPL growth continues to surge – so will the opportunities for fraudsters.


MEDIA 7: Thank you so much for doing this with us! It’s the holiday season, shopping and online transactions are happening on a large scale. What is the biggest online financial threat for consumers?
JOSEPH BURTON:
When it comes to cybercrime, essentially every person has been a victim – 9 out of 10 people have been subject to credit card fraud, identity theft, or a data breach. Millions of usernames and passwords, physical addresses, credit card numbers, and social security numbers are breached every week and are made available on the dark web. With all of that Personable Identifiable Information (PII) online, synthetic identity theft has become the fastest-growing type of financial fraud in the United States. Unlike traditional identity theft where criminals steal a specific person’s identity, synthetic identity theft involves creating a new, fictitious identity. Fraudsters use a mix of real and fake information – social security numbers, phone numbers, addresses, and birth dates – to create a fake identity.

Fraudsters use these synthetic identities to apply for credit cards and loans, illegally purchase goods online, and create fake product reviews. Synthetic identity fraud creates financial and reputational consequences for consumers, retailers, and financial institutions. For consumers, they are at risk of unauthorized purchases on their credit or debit cards and negative marks on their credit score. And their purchase decisions can be influenced by fake, positively inflated product reviews. Synthetic identity fraud is made possible by elaborate phishing and social engineering schemes. Fraudsters use deceitful emails, text messages, phone calls, and web pages to coerce PII from unsuspecting consumers. Phishing attacks are Pandora’s box to consumer fraud.





M7: Online retailers are now required to improve their security measures given the rise in threats to data privacy. How is TeleSign contributing to the fight against fraud?
JB:
Fraud is increasingly common, costly, and complex. With billions of targets and trillions of dollars at stake, fraudsters have found their groove. 2021 was the first time that successful fraud attempts outnumbered those prevented. In the last 24 months, half – 47% – of companies experienced fraud. Fraudulent losses are significant. On average, businesses lose 5% of their annual revenue to fraud. In addition to the financial risk, fraud introduces a lack of customer satisfaction, as well as reputational & legal damages. Faced with an array of sophisticated attacks, TeleSign helps security teams create a multilayered fraud prevention framework using digital identity signals, machine learning algorithms, and behavioral risk assessments to stay one step ahead of bad actors.

Throughout every stage of the customer journey, TeleSign helps to detect and defend against fraud. When onboarding new customers, businesses can layer in digital identity signals to flag risky users, block fake users, while giving legitimate users a fast and frictionless sign-up experience. For active accounts, TeleSign embeds trust at every touchpoint, ensuring every log-in is secure and every transaction is safe. TeleSign's zero-trust approach assesses the risk of every interaction to maintain the integrity of every account.



Read More: Gartner’s Akhil Gopinath advises, ‘To pivot your business model and grow out of the pandemic phase’


When consumers can use their preferred communication channels, more than half are more likely to recommend, buy more, or make a first-time purchase.



M7: TeleSign focuses on Promotion Abuse, Communication Fraud, and Buy Now Pay Later Fraud. These terms are relatively new, could you please elaborate on these for our readers?
JB: Communications Fraud/IRSF (G)


Despite plaguing the telecom industry for more than two decades, International Revenue Share Fraud (IRSF) is a relatively unknown type of attack and it’s experiencing a digital resurgence. IRSF is caused by the artificial inflation of call traffic to premium-rate numbers across the world. Generally, the fraudster leases expensive phone numbers – like psychic or dating hotlines – from an International Premium Rate Number Providers (IPRN) and both parties receive a share of the revenue for every call that’s placed. Over the last couple of years, we have seen fraudsters deploy new, sophisticated tactics to generate a higher volume of calls. For example, using bots and automated scripts, fraudsters can create millions of fake account creations or password reset requests. They nefariously attack web and mobile applications knowing that a voice call – to the premium number they profit on– is a component of account registration or password reset flow. IRSF is sneaky and happens behind the scenes. It is responsible for a $4-6 billion loss each year.

Promotion Abuse

As the retail season kicks into high gear, retailers must create compelling offers, discounts, and promotions to attract customers. But for many retailers, promotions are a double-edged sword. While they keep customers loyal and increase conversion rates, the inevitable abuse of promotions is costly. Promotion abuse occurs when one consumer uses multiple accounts to take advantage of rewards, sales, or other discounts. From sign-up bonuses to coupon codes, three out of four retailers (73%) have experienced promotion abuse in the last 12 months, which equates to an approximate 1.2% loss of revenue. To cut down on promotion abuse, retailers need to close their loopholes and prevent consumers from creating multiple accounts with fake email addresses and/or phone numbers.

Buy Now Pay Later Fraud

Convenience, useability, and affordability: a recipe for consumer success. It is those benefits that have made Buy Now, Pay Later (BNPL) platforms a ubiquitous success. A modern ‘payment plan’ and reimagined ‘layaway,’ BNPL is short-term financing that allows consumers to make a purchase and receive it immediately, but pay for it at a later time, usually over a series of installments. In 2022, BNPL will continue to be a top retail priority and I expect to see retailers extend BNPL payment options in their physical retail stores. As BNPL growth continues to surge – so will the opportunities for fraudsters.



2021 was the first time that successful fraud attempts outnumbered those prevented.



M7: TeleSign connects and protects online experiences with its engagement solutions. What are the different ways TeleSign helps ensure secure and reliable customer communication?
JB:
Communication across the customer journey is dynamic. Eighty-two percent of B2B buyers and 72% of B2C customers use multiple communication channels throughout their path to purchase. In fact, the availability of multichannel communication increases the bottom line. According to Forrester, when consumers can use their preferred communication channels, more than half are more likely to recommend, buy more, or make a first-time purchase. To excel in today’s competitive markets, it’s critical to make your customer communication fast, easy, and secure. From account verification to purchase confirmation, TeleSign delivers reliable communication across the customer journey.

As the pioneer of SMS verification, TeleSign helps connect the world’s most trusted brands to their customers. Our programmable engagement solution empowers businesses to embed messaging, voice, and authentication capabilities into their product and applications via developer-friendly APIs. TeleSign is at the forefront of keeping the digital economy secure, with an established presence on nearly every communications channel. Our customers can create tailored, omnichannel user experiences. And with a global footprint, more than seven hundred direct-to-carrier routes, and constant network traffic monitoring, TeleSign’s dependability is unmatched.



Read More: IDC’s Ritu Jyoti believes ‘Technology investments like AI are critical enablers to business agility’

M7: You have had an exemplary professional journey of over 30 years. Seeing the rapid change in technology and digitalization what future do you predict for this industry?
JB:
Today we’re protecting humans, tomorrow we’re protecting devices and machines – bringing the digital identity business to twenty-five billion devices.


ABOUT TELESIGN

TeleSign provides continuous trust to leading global enterprises by connecting, protecting, and defending their digital identities. TeleSign verifies over five billion unique phone numbers a month, representing half of the world’s mobile users, and provides critical insight into the remaining billions. The company’s powerful AI and extensive data science deliver identity with a unique combination of speed, accuracy, and global reach. TeleSign solutions prevent fraud, secure communications, and enable the digital economy by allowing companies and customers to engage with confidence. Learn more at www.telesign.com and follow us on Twitter at @TeleSign.

More C-Suite on deck

Panzura's Glen Shok explains why file security and military-grade encryption should be applied to all data stored in the cloud

Media 7 | March 11, 2022

Glen Shok, CTO and VP Cloud Architects at Panzura, looks into his crystal ball and shares with us his predictions of the developments in the cybersecurity space. In this interview, we had the opportunity to explore novel malware tactics like ransomware and data wiper exploits, and the different solutions Panzura offers enterprises to improve their security measures. Read on to learn more about upticks in this cybersecurity landscape, and how Panzura can get businesses battle-ready against these attacks.

Read More

Arkose Labs's Vanita Pandey believes ‘Online account is going to be the currency that people will trade on’

Media 7 | December 13, 2021

Vanita Pandey, CMO - Arkose Labs, speaks about the role that Innovative Payment Models play in the changing dynamics of purchase and shopping. Read on to know her thoughts about how necessary is content for attracting consumers in this age and much more.

Read More

Cryptix AG’s Alexandre Horvath wants users to adopt a Zero Trust policy to secure their digital footprint

Media 7 | November 12, 2021

Alexandre Horvath, Chief Information Security & Data Protection Officer at Cryptix AG sheds light on the importance of cybersecurity in the ever-growing landscape of DLT and blockchain. Read on as he elaborates the importance of Zero Trust for data privacy and the struggle of keeping pace with GDPR compliance.

Read More

Panzura's Glen Shok explains why file security and military-grade encryption should be applied to all data stored in the cloud

Media 7 | March 11, 2022

Glen Shok, CTO and VP Cloud Architects at Panzura, looks into his crystal ball and shares with us his predictions of the developments in the cybersecurity space. In this interview, we had the opportunity to explore novel malware tactics like ransomware and data wiper exploits, and the different solutions Panzura offers enterprises to improve their security measures. Read on to learn more about upticks in this cybersecurity landscape, and how Panzura can get businesses battle-ready against these attacks.

Read More

Arkose Labs's Vanita Pandey believes ‘Online account is going to be the currency that people will trade on’

Media 7 | December 13, 2021

Vanita Pandey, CMO - Arkose Labs, speaks about the role that Innovative Payment Models play in the changing dynamics of purchase and shopping. Read on to know her thoughts about how necessary is content for attracting consumers in this age and much more.

Read More

Cryptix AG’s Alexandre Horvath wants users to adopt a Zero Trust policy to secure their digital footprint

Media 7 | November 12, 2021

Alexandre Horvath, Chief Information Security & Data Protection Officer at Cryptix AG sheds light on the importance of cybersecurity in the ever-growing landscape of DLT and blockchain. Read on as he elaborates the importance of Zero Trust for data privacy and the struggle of keeping pace with GDPR compliance.

Read More

Related News

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Absolute Software to Expand Application Resilience Ecosystem with New Product

Absolute Software | March 14, 2023

Absolute SoftwareTM, the only provider of self-healing, intelligent security solutions, recently announced the continued addition to the Absolute Application Resilience ecosystem with the introduction of the latest product. Joint clients can now utilize Absolute's proprietary Persistence® technology and unbreakable device connection to improve the resiliency and health of over 70 mission-critical security and business solutions, such as eClinicalWorks, HCL BigFix, IMTLazarus, UNOWHY, Forescout® SecureConnector, Pixart® MDM, Plurilock CloudCodes, and XM Cyber HaXy. In today's work-from-anywhere scenarios, the need for resilient security policies able to secure remote devices and sensitive data has never been more critical. Absolute's analysis reveals that non-resilient applications may function effectively on lesser than 80% of the devices on which they have been installed, and in some cases as low as 35%, whereas over 95% of devices with Application Resilience functionalities facilitated reported healthy security applications. As a result of increasing demand, Absolute has witnessed a 26% year-over-year rise in the number of customer devices utilizing Application Resilience to monitor app behavior and health, as well as a 42% increase in the number of devices monitoring application health and autonomously reinstalling and repairing them when required. John Herrema, EVP of Product and Strategy at Absolute Software, said, "It is abundantly clear that in order to deliver both maximum protection and returns on security investments, critical controls must be constantly monitored and maintained." He added, "Our unique intelligence repeatedly shows that complex device environments have put endpoint agents at constant risk of collision, decay, or being disabled by malicious or negligent users. By making the investments to continuously grow our Application Resilience ecosystem, we are enabling our customers to harden their defenses against malicious attackers and strengthen overall security posture." About Absolute Software Headquartered in Vancouver, Canada, Absolute Software is the exclusive provider of intelligent, self-healing security systems. Integrated into over 600 million devices, Absolute is the only platform that provides a permanent digital connection that dynamically and intelligently applies visibility, control, and self-healing capabilities to applications, endpoints, and network connections - enabling companies to improve cyber resilience against the rising danger of ransomware and malicious assaults.

Read More

DATA SECURITY, SOFTWARE SECURITY, WEB SECURITY TOOLS

Interos Enhances Industry-First Operational Resilience Score

Interos Inc | March 10, 2023

On March 9, 2023, Interos, one of the leading operational resilience companies creating the world's strongest, safest, and most secure supply chains, announced the introduction of its upgraded cyber risk factor, a part of its i-ScoreTM measurement of operational resilience. The Interos i-Score is the first of its kind resilience score that assesses the health of extended supply chains against multiple risk factors, such as restriction, financial, geopolitical, operations/catastrophe, ESG, and cyber. The i-Score update includes an innovative cyber behavior model to detect potentially harmful cyber activity irrespective of public disclosure, commercial cyber ratings, threat assessment (Mitre ATT&CK®), vulnerability information (CVEs), regulatory compliance, cyber events, and operating country issues into a single score. This advancement directs cyber risk and procurement managers to their multi-tiered vendors most exposed to ransomware, breaches, data leakage, and other cyber-attacks carried out by malicious attackers who target suppliers concealed in the extended global supply chain. Interos's 2022 Resilience study of 1,500 cybersecurity and procurement leaders found that cyber incidents cause supply chain disruptions that cost businesses $37M each year. Andrea Little Limbago, SVP, Research & Analysis, Interos, said, "This is another crucial step forward in helping organizations achieve operational resilience." She further mentioned, "We've added new, proprietary models that integrate and assess data on cloud-based risk exposure, evaluate anomalous cyber behavior, measure regulatory compliance risks and more. It's designed to deliver better and faster information to CPOs partnering with CISOs — who are increasingly being held accountable for collective cyber resilience — to respond to more frequent and severe supply chain cyberattacks, with enhanced monitoring of vendors and third-party service providers." (Source – Cision PR Newswire) About Interos Inc Founded in 2005, Interos is one of the leading operational resilience companies. The company's first-of-its-kind scoring and relationship discovery technologies automate evaluation, detection, and response to risks. As the only operational resilience platform in the world, it protects customers from unethical labor, regulatory violations, cyberattacks, disasters, bankruptcy, and other supplier vulnerabilities. Interos is based in Washington, DC, and has clients all over the world, including NASA, the U.S. Department of Defense, and a number of Global Fortune 500 companies.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Tenable Enhances Tenable OT Security to Provide the Broadest Coverage

Tenable | March 13, 2023

Tenable®, the Exposure Management company, announced unveiling new features within Tenable OT Security, delivering greater protection for operational technology (OT), industrial control systems and critical infrastructure, regardless of deployment size or environment configuration. The new feature keeps the CISO's organization front and center, making it easier to protect and maintain governance of the whole attack surface using the same tools and processes throughout their infrastructure, whether IT, OT, IoT, the cloud, or other platforms. Tenable is ideally positioned to assist its customers in meeting their security needs by offering an all-encompassing solution for securing mixed environments. This latest update enhances Tenable OT Security's vulnerability detection capabilities with an improvement to the OT active scanner and a tighter integration with Tenable's Nessus, the market-leading vulnerability scanning solution. Tenable OT Security now provides companies with unparalleled scanning capabilities by leveraging the technology relied upon by over 40,000 security teams worldwide. Key new capabilities include: Increased Asset Discovery and Visibility Advanced Vulnerability and Threat Detection Enhanced Dashboards and Reporting Amir Hirsh, General Manager of OT Security, Tenable, said, "We consistently hear from CISOs that they have been tasked with security for mixed environments that include both OT and IT technologies, but they don't have the requisite visibility to secure either well. The new capabilities added to Tenable OT Security provide our customers with full visibility, security and control of all their environments and assets, in one consolidated view." He added, "Now, our customers can leverage the full strength of Tenable OT active scanning, tightly integrated with embedded Nessus scans for IT assets, to create a clear view of all assets, their vulnerabilities, risk score, attack path analysis and more." (Source – Globe Newswire) This most recent upgrade also includes product localization abilities for Japanese, Chinese, French, and German, reducing training and support expenses for businesses operating in non-English speaking regions. About Tenable Headquartered in Columbia, MD, Tenable® is a leading company for Exposure Management. Tenable is relied upon by about 43,000 enterprises worldwide to comprehend and mitigate cyber risk. As the originator of Nessus®, Tenable leveraged its experience in vulnerabilities to provide the world's first platform capable of identifying and securing any digital asset on any computer platform. Over sixty percent of the Fortune 500, forty percent of the Global 2000, and significant government bodies are prospective clients of Tenable.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Absolute Software to Expand Application Resilience Ecosystem with New Product

Absolute Software | March 14, 2023

Absolute SoftwareTM, the only provider of self-healing, intelligent security solutions, recently announced the continued addition to the Absolute Application Resilience ecosystem with the introduction of the latest product. Joint clients can now utilize Absolute's proprietary Persistence® technology and unbreakable device connection to improve the resiliency and health of over 70 mission-critical security and business solutions, such as eClinicalWorks, HCL BigFix, IMTLazarus, UNOWHY, Forescout® SecureConnector, Pixart® MDM, Plurilock CloudCodes, and XM Cyber HaXy. In today's work-from-anywhere scenarios, the need for resilient security policies able to secure remote devices and sensitive data has never been more critical. Absolute's analysis reveals that non-resilient applications may function effectively on lesser than 80% of the devices on which they have been installed, and in some cases as low as 35%, whereas over 95% of devices with Application Resilience functionalities facilitated reported healthy security applications. As a result of increasing demand, Absolute has witnessed a 26% year-over-year rise in the number of customer devices utilizing Application Resilience to monitor app behavior and health, as well as a 42% increase in the number of devices monitoring application health and autonomously reinstalling and repairing them when required. John Herrema, EVP of Product and Strategy at Absolute Software, said, "It is abundantly clear that in order to deliver both maximum protection and returns on security investments, critical controls must be constantly monitored and maintained." He added, "Our unique intelligence repeatedly shows that complex device environments have put endpoint agents at constant risk of collision, decay, or being disabled by malicious or negligent users. By making the investments to continuously grow our Application Resilience ecosystem, we are enabling our customers to harden their defenses against malicious attackers and strengthen overall security posture." About Absolute Software Headquartered in Vancouver, Canada, Absolute Software is the exclusive provider of intelligent, self-healing security systems. Integrated into over 600 million devices, Absolute is the only platform that provides a permanent digital connection that dynamically and intelligently applies visibility, control, and self-healing capabilities to applications, endpoints, and network connections - enabling companies to improve cyber resilience against the rising danger of ransomware and malicious assaults.

Read More

DATA SECURITY, SOFTWARE SECURITY, WEB SECURITY TOOLS

Interos Enhances Industry-First Operational Resilience Score

Interos Inc | March 10, 2023

On March 9, 2023, Interos, one of the leading operational resilience companies creating the world's strongest, safest, and most secure supply chains, announced the introduction of its upgraded cyber risk factor, a part of its i-ScoreTM measurement of operational resilience. The Interos i-Score is the first of its kind resilience score that assesses the health of extended supply chains against multiple risk factors, such as restriction, financial, geopolitical, operations/catastrophe, ESG, and cyber. The i-Score update includes an innovative cyber behavior model to detect potentially harmful cyber activity irrespective of public disclosure, commercial cyber ratings, threat assessment (Mitre ATT&CK®), vulnerability information (CVEs), regulatory compliance, cyber events, and operating country issues into a single score. This advancement directs cyber risk and procurement managers to their multi-tiered vendors most exposed to ransomware, breaches, data leakage, and other cyber-attacks carried out by malicious attackers who target suppliers concealed in the extended global supply chain. Interos's 2022 Resilience study of 1,500 cybersecurity and procurement leaders found that cyber incidents cause supply chain disruptions that cost businesses $37M each year. Andrea Little Limbago, SVP, Research & Analysis, Interos, said, "This is another crucial step forward in helping organizations achieve operational resilience." She further mentioned, "We've added new, proprietary models that integrate and assess data on cloud-based risk exposure, evaluate anomalous cyber behavior, measure regulatory compliance risks and more. It's designed to deliver better and faster information to CPOs partnering with CISOs — who are increasingly being held accountable for collective cyber resilience — to respond to more frequent and severe supply chain cyberattacks, with enhanced monitoring of vendors and third-party service providers." (Source – Cision PR Newswire) About Interos Inc Founded in 2005, Interos is one of the leading operational resilience companies. The company's first-of-its-kind scoring and relationship discovery technologies automate evaluation, detection, and response to risks. As the only operational resilience platform in the world, it protects customers from unethical labor, regulatory violations, cyberattacks, disasters, bankruptcy, and other supplier vulnerabilities. Interos is based in Washington, DC, and has clients all over the world, including NASA, the U.S. Department of Defense, and a number of Global Fortune 500 companies.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Tenable Enhances Tenable OT Security to Provide the Broadest Coverage

Tenable | March 13, 2023

Tenable®, the Exposure Management company, announced unveiling new features within Tenable OT Security, delivering greater protection for operational technology (OT), industrial control systems and critical infrastructure, regardless of deployment size or environment configuration. The new feature keeps the CISO's organization front and center, making it easier to protect and maintain governance of the whole attack surface using the same tools and processes throughout their infrastructure, whether IT, OT, IoT, the cloud, or other platforms. Tenable is ideally positioned to assist its customers in meeting their security needs by offering an all-encompassing solution for securing mixed environments. This latest update enhances Tenable OT Security's vulnerability detection capabilities with an improvement to the OT active scanner and a tighter integration with Tenable's Nessus, the market-leading vulnerability scanning solution. Tenable OT Security now provides companies with unparalleled scanning capabilities by leveraging the technology relied upon by over 40,000 security teams worldwide. Key new capabilities include: Increased Asset Discovery and Visibility Advanced Vulnerability and Threat Detection Enhanced Dashboards and Reporting Amir Hirsh, General Manager of OT Security, Tenable, said, "We consistently hear from CISOs that they have been tasked with security for mixed environments that include both OT and IT technologies, but they don't have the requisite visibility to secure either well. The new capabilities added to Tenable OT Security provide our customers with full visibility, security and control of all their environments and assets, in one consolidated view." He added, "Now, our customers can leverage the full strength of Tenable OT active scanning, tightly integrated with embedded Nessus scans for IT assets, to create a clear view of all assets, their vulnerabilities, risk score, attack path analysis and more." (Source – Globe Newswire) This most recent upgrade also includes product localization abilities for Japanese, Chinese, French, and German, reducing training and support expenses for businesses operating in non-English speaking regions. About Tenable Headquartered in Columbia, MD, Tenable® is a leading company for Exposure Management. Tenable is relied upon by about 43,000 enterprises worldwide to comprehend and mitigate cyber risk. As the originator of Nessus®, Tenable leveraged its experience in vulnerabilities to provide the world's first platform capable of identifying and securing any digital asset on any computer platform. Over sixty percent of the Fortune 500, forty percent of the Global 2000, and significant government bodies are prospective clients of Tenable.

Read More

Spotlight

TeleSign

TeleSign

TeleSign provides continuous trust to leading global enterprises by connecting, protecting, and defending their digital identities. TeleSign verifies over five billion unique phone numbers a month, representing half of the world’s mobile users, and provides critical insight into the remaining billio...

Events

Resources

resource image

DATA SECURITY, NETWORK THREAT DETECTION, PLATFORM SECURITY

How to protect yourself from cyber attacks

Video

resource image

DATA SECURITY, NETWORK THREAT DETECTION, PLATFORM SECURITY

SlashNext Email Protection for Microsoft 365

Video

resource image

DATA SECURITY, NETWORK THREAT DETECTION, PLATFORM SECURITY

How to protect yourself from cyber attacks

Video

resource image

DATA SECURITY, NETWORK THREAT DETECTION, PLATFORM SECURITY

SlashNext Email Protection for Microsoft 365

Video

Events