DeviceSHIELD combats rising cyber fraud amid COVID-19 pandemic

SHIELD’s cyber security solution offers free, real-time risk intelligence to online businesses

Cyber criminal in a hoodie holding a laptop

SHIELD, a global cyber security provider and compliance solution, has launched a new cyber fraud solution to help small businesses safeguard their online business amid the COVID-19 pandemic. 

Dubbed DeviceSHIELD, this cyber security solution examines the authenticity of a digital device and offers real-time actionable intelligence so business owners can identify counterfeit mobile devices and avoid fraudulent transactions. 

SHIELD says DeviceSHIELD analyzes thousands of attributes to identify and flag a fake device and pinpoint exactly which malicious tools a device uses to commit the fraud. According to reports, hackers use many stealthy tools to infiltrate safety systems, including emulators, app cloners, virtual private networks (VPNs) and global positioning system (GPS) spoofers.

Another interesting DeviceSHIELD feature is continued risk profiling throughout a user session. Based on risk-level, DeviceSHIELD assigns a numerical value or risk score to each device interaction. Users can leverage DeviceSHIELD can act as a standalone solution or with existing cyber security systems. 

Related Resource

The essential cyber security toolkit for SMBs

Practical tips for cyber security training

a guide to cyber security for SMBs - Datto whitepaperDownload now

"More online transactions means more vulnerabilities to cyber fraud, and the COVID-19 pandemic has made this more relevant than ever," said Justin Lie, CEO of SHIELD. 

"43% of online attacks are now aimed at small businesses, with only 14% actively prepared to defend themselves. We have created a technology to protect online industries we believe are worst affected by COVID-19. However, any businesses with less than 100,000 monthly active users will receive it for free, which equates to roughly 90% of all online businesses."

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Security best practices for PostgreSQL

Securing data with PostgreSQL

Download now

Transform your MSP business into a money-making machine

Benefits and challenges of a recurring revenue model

Download now

The care and feeding of cloud

How to support cloud infrastructure post-migration

Watch now

Recommended

Hackers leak data from dark web marketplace
cyber security

Hackers leak data from dark web marketplace

9 Apr 2021
How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack
ransomware

Evidence suggests REvil behind Harris Federation ransomware attack

9 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Data belonging to 500 million LinkedIn users found for sale on hacker marketplace
hacking

Data belonging to 500 million LinkedIn users found for sale on hacker marketplace

8 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021