Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:25 AM

Online Users Feel Safe, But Risky Behavior Abounds

New research also shows a divide between younger and older users in their security practices, including use of two-factor authentication and how often software updates are performed.

Most home users and workers consider their devices "sufficiently secure," but more than a third never check for updates to their security software and more than half regularly connect to unprotected Wi-Fi networks, according to a new report from the National Cyber Security Alliance (NCSA).

The research also shows a divide between younger users and older users of technology. A bit more than a third of people were working from home due to the coronavirus pandemic, but far more younger people — 47% of 18- to 34-year-olds — make up the remote-working population. Most remote employees, however, did not take additional steps to secure their devices, such as by using two-factor authentication (2FA) and updating security software.

Related Content:

Zero-Trust Efforts Rise with the Tide of Remote Working

The Changing Face of Threat Intelligence

New on The Edge: 9 Cyber Disaster-Recovery Planning Tips for a Disaster-Prone Time

The report, based on a survey of 1,000 Americans, suggests workers and home users have too much confidence in how well they have secured their devices against online threats, says Sylvia Layton, chief operating officer at the NCSA, adding that the older demographic seemed to be more cautious and more vigilant with their data when they use connected devices.

"People tend to feel more confident in their security practices than they are," she says. "We often assume that the younger generation will take more action to protect their data, but it turns out that older people seem to be a little bit more cautious than the [overall] population."

The survey, which comes at the end of October's annual National Cybersecurity Awareness month, found about eight in 10 people felt moderately to highly confident in the security of their data and devices. Companies have made securing their remote workers a priority, with more than three-quarters of firms embarking on improving remote working and more than half of security teams worried about the level of visibility they have into the security state of their company's distributed workforce, a separate July survey found.

For the most part, 18- to 34-year-olds tend to have better security practices than 50- to 75-year-olds — with 89% of the younger group at least somewhat likely to use 2FA compared with 70% of older people, the NCSA reports. In addition, 83% of younger people check their software updates at least every two to three weeks compared with 63% of older people.

Yet much of the shortfalls in security came with work-from-home habits, with only 39% of all workers using 2FA on all their devices and 38% regularly updating their antivirus, anti-malware, and firewall software, the survey found.

"There is room for additional training, and it needs to be consistent, and it needs to be on a regular basis. It's not a one-and-done type of thing," Layton says. "In a sense, everyone is their own IT guy at home. We cannot call the IT guy at work anymore and say, 'My computer is having problems.'" 

Those work-from-home habits also show older and younger people focus on different types of security. More younger users (46%) enable 2FA on their devices, for example. Yet only a third of them update their anti-malware and firewall software compared with almost half of users aged 50 to 75 years old. And younger users are almost twice as likely to use public Wi-Fi hotspots compared with older users.

The responses support the idea that younger users are just more likely to use new technology, be it the latest devices, new security measures, or ubiquitous wireless, says Layton.

"The younger generation grew up in the digital age, and they have a higher level of comfort in using technology that that older generation might not."

For organizations, the survey could inform training content for different generations of employees. Older workers may need to be introduced to the latest technologies, while younger workers will likely have to be taught to be more cognizant of the risks.

In addition, companies should make sure they are focused on creating a secure infrastructure for their distributed workforce, Layton says. 

"Always investing in the right technology upfront is always better than waiting until you have an incident, or a hack, or a ransomware attack down the road, which will cost you more money than if you had invested in the best solutions," she says.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-08
Dell iDRAC8 versions prior to contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary ‘Host’ header values to poison a web-cache or trigger redirections.
PUBLISHED: 2021-03-08
Maxum Rumpus 8.2.13 and 8.2.14 is affected by a command injection vulnerability. The web administration contains functionality in which administrators are able to manage users. The edit users form contains a parameter vulnerable to command injection due to insufficient validation.
PUBLISHED: 2021-03-08
Maxum Rumpus 8.2.13 and 8.2.14 is affected by cross-site scripting (XSS). Users are able to create folders in the web application. The folder name is insufficiently validated resulting in a stored cross-site scripting vulnerability.
PUBLISHED: 2021-03-08
A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulner...
PUBLISHED: 2021-03-08
PowerScale OneFS 8.1.2,8.2.2 and 9.1.0 contains an improper input sanitization issue in a command. The Compadmin user could potentially exploit this vulnerability, leading to potential privileges escalation.