Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

6/28/2013
04:24 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Impermium Study Unearths Consumer Attitudes Toward Internet Security

Study explored Americans' limited adoption of two-factor authentication

June 27, 2013 - SAN FRANCISCO, CA – Impermium, the leading defender against account hijacking and account compromise, today released the results of a nationwide survey, analyzing sentiments towards cyber-security threats and prevention. The June study, conducted online by Harris Interactive on behalf of Impermium, explored Americans' limited adoption of two-factor authentication, levels of worry related to account compromise, and preference for sites to offer less-disruptive forms of protection.

The current state of cyber-security has left US Internet users anxious about hacks and password theft. Despite constant victimization, the majority are not using two-factor authentication and are left without a widely accepted or deployed method of protection.

When asked about the overall concern related to account compromise, 79% indicated at least some level of worry around email account compromise, 55% around social media compromise, and 71% around bank account compromise. Despite the recent hype, consumers remain reluctant to adopt two-factor authentication, with 16% of Americans saying they have not signed in with this process in the past because it was inconvenient.

Impermium uncovered that while a majority of Americans have never signed into a website using two-factor authentication (75 percent), 77% of those who have not yet been a victim of account compromise are at least somewhat unlikely to continue using a site if their account were compromised. Additionally, while 65% of Americans have been victims of viruses, malware, and/or phishing attacks, only 25% have ever signed in with two-factor authentication as a preventive security measure. Further key findings include:

· 75% of Americans have not used two-factor authentication in the past

o 27% decided against signing onto a website with two-factor authentication because they did not want to disclose their mobile number and/or because they found it inconvenient

o 30% say that they have never needed to do this

o 20% did not want to disclose their mobile phone number

· Respondents were split in terms of determining who is primarily to blame for account compromises

o 39% believe websites are to blame by not offering or maintaining sufficient security features

o 37% believe the consumer is to blame due to weak passwords or falling for scams like phishing

· When asked which types of accounts they are most worried about getting hacked, Impermium learned email account compromise results in the most anxiety.

o 79% are at least somewhat worried about having their email account compromised

o 71% are at least somewhat worried about having their online bank accounts compromised

o 55% of consumers are at least somewhat worried about having their social media accounts compromised

When asked how worried they are about cloud data compromise, 43% of Americans responded they are at least somewhat worried

· A majority of consumers have been a victim of a listed online threat:

o 56% of consumers have been a victim of a virus or malware infection on a computer

o 37% have been a victim of a phishing attack

o 26% have been a victim of account compromise (e.g., hacked, broken into, password theft)

o 20% have been a victim of a social media phishing attack

o 5% had a phone lost or stole that resulted in unwanted access to sensitive information

"Despite heightened awareness of cyber threats and a clear demand for account protection, Americans are still hesitant to adopt new prevention techniques," said Mark Risher, CEO of Impermium. "Two-factor authentication has been held aloft as a 'silver bullet,' but a security system that isn't turned on provides no security. Only with intelligent, risk-based authentication mechanisms can service providers effectively protect users from account hijacking. Consumers and websites need an intelligent solution that is secure yet simple."

Survey Methodology

This survey was conducted online within the United States by Harris Interactive on behalf of Impermium from June 7-11, 2013 among 2,046 adults ages 18 and older. This online survey is not based on a probability sample and therefore no estimate of theoretical sampling error can be calculated.

About Impermium

Impermium provides Internet security for the Cloud, defending against account hacking, account compromise, and other threats. Our system uses patented statistical and machine learning models and proprietary threat intelligence from more than 1,500,000 worldwide sites to provide real-time protection for top enterprises around the globe. Founded in 2010, the company is backed by investors including Accel Partners, Greylock Partners, Highland Capital Partners, and The Social+Capital Partnership.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-37759
PUBLISHED: 2021-07-31
A Session ID leak in the DEBUG log file in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
CVE-2021-37760
PUBLISHED: 2021-07-31
A Session ID leak in the audit log in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
CVE-2020-26564
PUBLISHED: 2021-07-31
ObjectPlanet Opinio before 7.15 allows XXE attacks via three steps: modify a .css file to have <!ENTITY content, create a .xml file for a generic survey template (containing a link to this .css file), and import this .xml file at the survey/admin/folderSurvey.do?action=viewImportSurvey['importFil...
CVE-2020-26565
PUBLISHED: 2021-07-31
ObjectPlanet Opinio before 7.14 allows Expression Language Injection via the admin/permissionList.do from parameter. This can be used to retrieve possibly sensitive serverInfo data.
CVE-2020-26806
PUBLISHED: 2021-07-31
admin/file.do in ObjectPlanet Opinio before 7.15 allows Unrestricted File Upload of executable JSP files, resulting in remote code execution, because filePath can have directory traversal and fileContent can be valid JSP code.