Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

11/1/2016
09:30 AM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
100%
0%

7 Reasons Consumers Dont Take Action on Cybersecurity

Security awareness is high but it's hard to turn personal knowledge into effective practices.
Previous
1 of 8
Next

One of the more important lessons of this year’s National Cyber Security Awareness Month is that awareness of cyber issues among consumers is very high, but translating that knowledge into action continues to lag.

This trend was underscored once again by two new studies that were released last month.

One issued by Arbor Networks reported a broad anxiety among Americans about their personal online safety, with at least 75% of consumers concerned about their security, privacy, malware or websites tracking them.

“The big takeaway from this survey is that the relentless headlines about cyber attacks have led to anxiety among a vast majority of Americans,” said Christopher Gaebler, chief marketing officer at Arbor Networks in a press release, adding that this anxiety has not led Americans to protect themselves more.

In another survey by MarkMonitor, 71% of consumers agree that a breach compromises an organization’s reputation and another 65% said an incident decreased trust in the brand.

While MarkMonitor pointed out that 54% of consumers say they limit the number of personal details they provide websites and another 50% check the padlock symbol on the web address bar, the study also pointed out that 37% of consumers still don’t understand what the Dark Web is or how it operates.

Using data points from both studies, here are seven reasons why consumers don’t take more aggressive action to protect themselves online.

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio
 

Recommended Reading:

Previous
1 of 8
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Lily652
50%
50%
Lily652,
User Rank: Moderator
11/12/2016 | 5:13:05 AM
prayer times

It was a very good post indeed. I thoroughly enjoyed reading it in my lunch time. Will surely come and visit this blog more often. Thanks for sharing

kasstri
50%
50%
kasstri,
User Rank: Strategist
11/11/2016 | 8:17:45 AM
Re: keydown
I'm not that much of a online reader to be honest but your blogs really nice, keep it up! I'll go ahead and bookmark your website to come back down the road.
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
11/9/2016 | 9:13:38 AM
Identity theft
Great and nice informative article on the importance of cyber security and how it can be maintained. However, one important thing is missing, and that is the deployment of vpn server to protect our IP. It is important to anonymize your IP with a genuine vpn server like PureVPN and that is reliable because it offers encrypted online connection so that's a big plus. 
kasstri
100%
0%
kasstri,
User Rank: Strategist
11/8/2016 | 6:51:01 AM
Re: keydown
I'm not that much of a online reader to be honest but your blogs really nice, keep it up! I'll go ahead and bookmark your website to come back down the road.
securityartist
50%
50%
securityartist,
User Rank: Apprentice
11/6/2016 | 5:33:56 PM
cyber resilience is possible with awareness, appreciation, and action
There are a few fundamental problems with expeting action from awareness.

 

Awareness is simply knowledge. I know that the moon has one sixth the gravity of the Earth, but I do not appreciate what that feels like because I have not experienced it.

Appeciation or understanding requires some experience. 

Action can not occur until we have an aprpeciation or understanidng, but to make matters worse, a large percentage of the cybersecurity industry isn;t able to articulate what actiosn should be taken. They are great at talking about the problem - whining about it even, but ask for a solution and they bolt leavinga  cloud of dust.

 

The solution here is to make awareness interactive and engaging.Let people know exaclty what a breach looks like rather than just talk about it. Let them look at the problem through their own lens. All of us have either family or funds (or both) that we want to protect from the wrath of cybercrime; so start with engaging and interactive dialog aroudn these.

 

Once understanding ahs been achieved, then practical solutiosn are key around not just threat prevention but all aspects of the cybercrie lifecycle:

(1) asset management: discovery and classification fo assets

(2) vulnerbaility management: discovery and remediation of vulnerbailities in those assets

(3) threat mangement: prediction and preveniton of threats that those vulnerbailties are exposed to

(4) incident management: detectiona dn response to attacks that were not able to be predicted and prevented when threats

(5) continuity management: confirmation and recovery of breaches that were not able to be detected and responded to when attacks

(6) crisis management: acceptance, avoidance, transfer, or mitigiation of impacts that have manifested because breaches were not confirmed and recovered from quickly enough

 

Awareess, appreciation and action can achieve cyber resilience.
kasstri
50%
50%
kasstri,
User Rank: Strategist
11/5/2016 | 8:09:01 AM
Re: key
He received great pleasure from this article. The guys did a good job. I want to continue to read the news of this resource!
Shantaram
50%
50%
Shantaram,
User Rank: Ninja
11/5/2016 | 7:21:36 AM
Re: 192.168.0.1
Nice article, thanks a lot for your kind sharing!
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
11/3/2016 | 9:55:31 AM
Cyber security
Nice informatve article. The main reason why the generl everyday using public does not care much about their cyber security is because they do not think that they'd also can become the victim of online hacks. Privacy to everyone is very important and it is important also to take that freedom and privacy seriously. Therefore it is essential to secure our connections with vpn services. I use PureVPN US servers to mask my IP from snoopers and hackers. 
<<   <   Page 2 / 2
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27605
PUBLISHED: 2020-10-21
BigBlueButton through 2.2.8 uses Ghostscript for processing of uploaded EPS documents, and consequently may be subject to attacks related to a &quot;schwache Sandbox.&quot;
CVE-2020-27606
PUBLISHED: 2020-10-21
BigBlueButton before 2.2.8 (or earlier) does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
CVE-2020-27607
PUBLISHED: 2020-10-21
In BigBlueButton before 2.2.8 (or earlier), the client-side Mute button only signifies that the server should stop accepting audio data from the client. It does not directly configure the client to stop sending audio data to the server, and thus a modified server could store the audio data and/or tr...
CVE-2020-27608
PUBLISHED: 2020-10-21
In BigBlueButton before 2.2.8 (or earlier), uploaded presentations are sent to clients without a Content-Type header, which allows XSS, as demonstrated by a .png file extension for an HTML document.
CVE-2020-27609
PUBLISHED: 2020-10-21
BigBlueButton through 2.2.8 records a video meeting despite the deactivation of video recording in the user interface. This may result in data storage beyond what is authorized for a specific meeting topic or participant.