{"id":1984,"date":"2013-02-13T00:00:00","date_gmt":"2013-02-13T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/13\/retailers-were-favorite-target-of-cyber-crime-in-2012-dubai-chronicle\/"},"modified":"2021-12-30T11:40:24","modified_gmt":"2021-12-30T11:40:24","slug":"retailers-were-favorite-target-of-cyber-crime-in-2012-dubai-chronicle","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/13\/retailers-were-favorite-target-of-cyber-crime-in-2012-dubai-chronicle\/","title":{"rendered":"Retailers were favorite target of cyber crime in 2012 Dubai Chronicle"},"content":{"rendered":"<p>In 2012, the retail industry was the most preferred target of cyber crimes.   But it must be clear that the main target is not exactly the retail. The statistic goes on with food and beverage industry registering 24% interest from cyber criminals.  Yet, they are the favorite target of cyber criminals. 96% of all cyber frauds are payment data targeted.   These include customer records like credit and debit cards data, e-mail addresses and personal identifiable information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Until a certain change is applied the retail sector will remain main target of cyber fraud. But if the cloud company is serious, it can provide a solution even in these cases. <\/p>\n<p>In 2012, the time to recognize such activity was on average 210 days.  About 64% of all retail firms need approximately 90 days to spot a fraud.   At the same time 5% of companies need 3 year to identify criminal intrusion.<\/p>\n<p>Link: http:\/\/www.dubaichronicle.com\/2013\/02\/13\/e-retailers-cybercrime\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1984","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1984"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1984\/revisions"}],"predecessor-version":[{"id":4471,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1984\/revisions\/4471"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}