Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

11/1/2016
09:30 AM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
100%
0%

7 Reasons Consumers Dont Take Action on Cybersecurity

Security awareness is high but it's hard to turn personal knowledge into effective practices.
Previous
1 of 8
Next

One of the more important lessons of this year’s National Cyber Security Awareness Month is that awareness of cyber issues among consumers is very high, but translating that knowledge into action continues to lag.

This trend was underscored once again by two new studies that were released last month.

One issued by Arbor Networks reported a broad anxiety among Americans about their personal online safety, with at least 75% of consumers concerned about their security, privacy, malware or websites tracking them.

“The big takeaway from this survey is that the relentless headlines about cyber attacks have led to anxiety among a vast majority of Americans,” said Christopher Gaebler, chief marketing officer at Arbor Networks in a press release, adding that this anxiety has not led Americans to protect themselves more.

In another survey by MarkMonitor, 71% of consumers agree that a breach compromises an organization’s reputation and another 65% said an incident decreased trust in the brand.

While MarkMonitor pointed out that 54% of consumers say they limit the number of personal details they provide websites and another 50% check the padlock symbol on the web address bar, the study also pointed out that 37% of consumers still don’t understand what the Dark Web is or how it operates.

Using data points from both studies, here are seven reasons why consumers don’t take more aggressive action to protect themselves online.

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio
 

Recommended Reading:

Previous
1 of 8
Next
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Page 1 / 2   >   >>
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
11/3/2016 | 9:55:31 AM
Cyber security
Nice informatve article. The main reason why the generl everyday using public does not care much about their cyber security is because they do not think that they'd also can become the victim of online hacks. Privacy to everyone is very important and it is important also to take that freedom and privacy seriously. Therefore it is essential to secure our connections with vpn services. I use PureVPN US servers to mask my IP from snoopers and hackers. 
Shantaram
50%
50%
Shantaram,
User Rank: Ninja
11/5/2016 | 7:21:36 AM
Re: 192.168.0.1
Nice article, thanks a lot for your kind sharing!
kasstri
50%
50%
kasstri,
User Rank: Strategist
11/5/2016 | 8:09:01 AM
Re: key
He received great pleasure from this article. The guys did a good job. I want to continue to read the news of this resource!
securityartist
50%
50%
securityartist,
User Rank: Apprentice
11/6/2016 | 5:33:56 PM
cyber resilience is possible with awareness, appreciation, and action
There are a few fundamental problems with expeting action from awareness.

 

Awareness is simply knowledge. I know that the moon has one sixth the gravity of the Earth, but I do not appreciate what that feels like because I have not experienced it.

Appeciation or understanding requires some experience. 

Action can not occur until we have an aprpeciation or understanidng, but to make matters worse, a large percentage of the cybersecurity industry isn;t able to articulate what actiosn should be taken. They are great at talking about the problem - whining about it even, but ask for a solution and they bolt leavinga  cloud of dust.

 

The solution here is to make awareness interactive and engaging.Let people know exaclty what a breach looks like rather than just talk about it. Let them look at the problem through their own lens. All of us have either family or funds (or both) that we want to protect from the wrath of cybercrime; so start with engaging and interactive dialog aroudn these.

 

Once understanding ahs been achieved, then practical solutiosn are key around not just threat prevention but all aspects of the cybercrie lifecycle:

(1) asset management: discovery and classification fo assets

(2) vulnerbaility management: discovery and remediation of vulnerbailities in those assets

(3) threat mangement: prediction and preveniton of threats that those vulnerbailties are exposed to

(4) incident management: detectiona dn response to attacks that were not able to be predicted and prevented when threats

(5) continuity management: confirmation and recovery of breaches that were not able to be detected and responded to when attacks

(6) crisis management: acceptance, avoidance, transfer, or mitigiation of impacts that have manifested because breaches were not confirmed and recovered from quickly enough

 

Awareess, appreciation and action can achieve cyber resilience.
kasstri
100%
0%
kasstri,
User Rank: Strategist
11/8/2016 | 6:51:01 AM
Re: keydown
I'm not that much of a online reader to be honest but your blogs really nice, keep it up! I'll go ahead and bookmark your website to come back down the road.
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
11/9/2016 | 9:13:38 AM
Identity theft
Great and nice informative article on the importance of cyber security and how it can be maintained. However, one important thing is missing, and that is the deployment of vpn server to protect our IP. It is important to anonymize your IP with a genuine vpn server like PureVPN and that is reliable because it offers encrypted online connection so that's a big plus. 
kasstri
50%
50%
kasstri,
User Rank: Strategist
11/11/2016 | 8:17:45 AM
Re: keydown
I'm not that much of a online reader to be honest but your blogs really nice, keep it up! I'll go ahead and bookmark your website to come back down the road.
Lily652
50%
50%
Lily652,
User Rank: Moderator
11/12/2016 | 5:13:05 AM
prayer times

It was a very good post indeed. I thoroughly enjoyed reading it in my lunch time. Will surely come and visit this blog more often. Thanks for sharing

kasstri
50%
50%
kasstri,
User Rank: Strategist
11/12/2016 | 7:40:48 AM
Re: keydown
Nice article, thanks a lot for your kind sharing!
Benefiter
50%
50%
Benefiter,
User Rank: Apprentice
11/12/2016 | 10:07:41 AM
Re:
interesting information, I also agree with all
Page 1 / 2   >   >>
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24847
PUBLISHED: 2020-10-23
A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticat...
CVE-2020-24848
PUBLISHED: 2020-10-23
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.
CVE-2020-5990
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure.
CVE-2020-25483
PUBLISHED: 2020-10-23
An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.
CVE-2020-5977
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.