DeviceSHIELD combats rising cyber fraud amid COVID-19 pandemic

SHIELD’s cyber security solution offers free, real-time risk intelligence to online businesses

Cyber criminal in a hoodie holding a laptop

SHIELD, a global cyber security provider and compliance solution, has launched a new cyber fraud solution to help small businesses safeguard their online business amid the COVID-19 pandemic. 

Dubbed DeviceSHIELD, this cyber security solution examines the authenticity of a digital device and offers real-time actionable intelligence so business owners can identify counterfeit mobile devices and avoid fraudulent transactions. 

SHIELD says DeviceSHIELD analyzes thousands of attributes to identify and flag a fake device and pinpoint exactly which malicious tools a device uses to commit the fraud. According to reports, hackers use many stealthy tools to infiltrate safety systems, including emulators, app cloners, virtual private networks (VPNs) and global positioning system (GPS) spoofers.

Another interesting DeviceSHIELD feature is continued risk profiling throughout a user session. Based on risk-level, DeviceSHIELD assigns a numerical value or risk score to each device interaction. Users can leverage DeviceSHIELD can act as a standalone solution or with existing cyber security systems. 

Related Resource

The essential cyber security toolkit for SMBs

Practical tips for cyber security training

Download now

"More online transactions means more vulnerabilities to cyber fraud, and the COVID-19 pandemic has made this more relevant than ever," said Justin Lie, CEO of SHIELD. 

"43% of online attacks are now aimed at small businesses, with only 14% actively prepared to defend themselves. We have created a technology to protect online industries we believe are worst affected by COVID-19. However, any businesses with less than 100,000 monthly active users will receive it for free, which equates to roughly 90% of all online businesses."

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

Global ransom DDoS extortionists are retargeting companies
distributed denial of service (DDOS)

Global ransom DDoS extortionists are retargeting companies

22 Jan 2021
Best ransomware removal tools
ransomware

Best ransomware removal tools

22 Jan 2021
Pixlr data breach exposes over 1.9 million user records
data breaches

Pixlr data breach exposes over 1.9 million user records

22 Jan 2021
Hackers publish over 4,000 files stolen from SEPA in ransomware attack
Security

Hackers publish over 4,000 files stolen from SEPA in ransomware attack

22 Jan 2021

Most Popular

School laptops sent by government arrive loaded with malware
malware

School laptops sent by government arrive loaded with malware

21 Jan 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
What is the Raspberry Pi Pico?
Hardware

What is the Raspberry Pi Pico?

21 Jan 2021