{{ searchResult.published_at | date:'d MMMM yyyy' }}

Loading ...
Loading ...

Enter a search term such as “mobile analytics” or browse our content using the filters above.

No_results

That’s not only a poor Scrabble score but we also couldn’t find any results matching “”.
Check your spelling or try broadening your search.

Logo_distressed

Sorry about this, there is a problem with our search at the moment.
Please try again later.

Posts tagged with Security

Data can be toxic, here's how companies should handle it

Data is the lifeblood of the digital economy and represents one of the most valuable assets a company can develop today.

But according to leading security expert Bruce Schneier, "data is a toxic asset and saving it is dangerous."

Why? Saving data is dangerous because lots of people – including those with nefarious intentions – want it, it's hard to secure, and once it falls into the wrong hands, the damage can be significant. 

0 comments

What brands can learn from the Ashley Madison hack

Ashley Madison, which proudly bills itself as "the most famous name in infidelity and married dating" is at the center of what might become one of the most talked-about hacking incidents ever.

The hack and subsequent release of the identities and personal information of tens of millions of people seeking extramarital affairs online has brought embarrassment to outed celebrities and politicians, and is already being blamed for at least two suicides.

0 comments

It's time for Flash to die, but advertisers aren't quite ready

"It is time for Adobe to announce the end-of-life date for Flash and to ask the browsers to set killbits on the same day."

1 comment

What are internet consumers most concerned about online?

The latest update to our Internet Statistics Compendium contains another comprehensive collection of key data from across the digital landscape, including primary research from ourselves and partners, as well as third party trends from a wealth of sources.

In recent months, there have been some fascinating stats published concerning security and privacy online from analysts as diverse as Statista, Global Web Index and Center for the Digital Future.

0 comments

11 of the world's best ecommerce checkouts

What makes an excellent checkout process on an ecommerce site? 

Here, with the help of suggestions from Twitter, I've compiled a list of 11 checkouts which constitute examples of best practice in this area. 

29 comments

Which ecommerce security logos do users trust? Do they matter?

Third party trust logos are used on most ecommerce sites, with the intention of reassuring potential customers that they can shop safely with the retailer in question. 

There are a lot to choose from, and a recent Baynard has looked into which logos are most trusted by US shoppers. 

In this post, I'll take a look at the test and the results, as well as whether we need trustmarks on ecommerce sites at all... 

11 comments

Stats: internet privacy and responsibility among consumers

This month the latest edition of our Internet Statistics Compendium includes the usual updates across its 12 data documents – including mobile, ecommerce, online advertising and all areas of digital marketing.

Our Demographics and Technology Adoption report has seen some particularly interesting data added to the internet security sections, thanks to freely available research from TRUSTe.

2 comments
Internet of Things

The Internet of Things: 10 things consumers should expect

Microsoft recently announced its newly branded Lab of Things. It describes this as ‘a flexible platform for experimental research that uses connected devices in homes.’

I thought I’d use this opportunity to look again at the rise of the connected device, and the future of the so-called internet of things, or IoT. Below you’ll see 10 things that you, the consumer, should expect over the next few years.

3 comments
m-commerce

Screen size and security concerns among main barriers to mobile commerce: report

We’ve seen a number of research projects and studies which show that mobile traffic and search volumes are likely to overtake desktop in the next 12 months, however the same can’t be said for sales and conversions through mobile devices.

Instead consumers are increasingly using smartphones for research and price checking, before ultimately making a purchase on desktop or tablet.

We investigated the reasons behind this disparity as part of our new Mobile Commerce Compendium, with the data showing that two-thirds (64%) of smartphone owners who don’t use mobile commerce simply prefer shopping online using a desktop or tablet.

The second most-common reason proved to be difficulties with the small screen size (41%), while 39% said they are concerned about security on their phone.

8 comments

My iPhone is the least valuable thing I carry. I like it that way

My iPhone is the least valuable thing I carry. But I didn’t realise that until my iPhone was stolen (pick-pocketed in Barcelona).

The thief didn’t get my keys, passport or wallet. If he had taken any of those items then I would have been unable to start my car, unable to leave Spain, or unable to pay my hotel bill.

Instead, he stole my iPhone4, which basically meant I couldn’t call, email or tweet. Within three days of the theft I was using a replacement iPhone5 (free upgrade from O2), and all my family photos & apps were restored from an iTunes back-up.

5 comments

Company taunts ICO: sue us over cookie law

The ICO's cookie law has been, for many companies, a major headache. After being given an extra year to find compliance solutions -- an acknowledgment that complying wouldn't necessarily be painless -- companies were finally forced to implement them.

Those that don't could find themselves facing steep fines, and in an effort to show that it's serious about enforcement, the ICO earlier this year indicated that it would be contacting 50 high-traffic UK websites about their compliance.

5 comments

Five things every online retailer can learn from Tesco's website security fail

UK retailer Tesco came under fire earlier this week for website security practices that may be leaving customer data vulnerable to hackers.

The incident started when software architect Troy Hunt noticed a tweet indicating that Tesco must be storing customer passwords in a manner that doesn't adhere to best practices because the retail giant emails customers their passwords in plain text.

4 comments