Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

11/5/2020
11:25 AM
50%
50%

Online Users Feel Safe, But Risky Behavior Abounds

New research also shows a divide between younger and older users in their security practices, including use of two-factor authentication and how often software updates are performed.

Most home users and workers consider their devices "sufficiently secure," but more than a third never check for updates to their security software and more than half regularly connect to unprotected Wi-Fi networks, according to a new report from the National Cyber Security Alliance (NCSA).

The research also shows a divide between younger users and older users of technology. A bit more than a third of people were working from home due to the coronavirus pandemic, but far more younger people — 47% of 18- to 34-year-olds — make up the remote-working population. Most remote employees, however, did not take additional steps to secure their devices, such as by using two-factor authentication (2FA) and updating security software.

Related Content:

Zero-Trust Efforts Rise with the Tide of Remote Working

The Changing Face of Threat Intelligence

New on The Edge: 9 Cyber Disaster-Recovery Planning Tips for a Disaster-Prone Time

The report, based on a survey of 1,000 Americans, suggests workers and home users have too much confidence in how well they have secured their devices against online threats, says Sylvia Layton, chief operating officer at the NCSA, adding that the older demographic seemed to be more cautious and more vigilant with their data when they use connected devices.

"People tend to feel more confident in their security practices than they are," she says. "We often assume that the younger generation will take more action to protect their data, but it turns out that older people seem to be a little bit more cautious than the [overall] population."

The survey, which comes at the end of October's annual National Cybersecurity Awareness month, found about eight in 10 people felt moderately to highly confident in the security of their data and devices. Companies have made securing their remote workers a priority, with more than three-quarters of firms embarking on improving remote working and more than half of security teams worried about the level of visibility they have into the security state of their company's distributed workforce, a separate July survey found.

For the most part, 18- to 34-year-olds tend to have better security practices than 50- to 75-year-olds — with 89% of the younger group at least somewhat likely to use 2FA compared with 70% of older people, the NCSA reports. In addition, 83% of younger people check their software updates at least every two to three weeks compared with 63% of older people.

Yet much of the shortfalls in security came with work-from-home habits, with only 39% of all workers using 2FA on all their devices and 38% regularly updating their antivirus, anti-malware, and firewall software, the survey found.

"There is room for additional training, and it needs to be consistent, and it needs to be on a regular basis. It's not a one-and-done type of thing," Layton says. "In a sense, everyone is their own IT guy at home. We cannot call the IT guy at work anymore and say, 'My computer is having problems.'" 

Those work-from-home habits also show older and younger people focus on different types of security. More younger users (46%) enable 2FA on their devices, for example. Yet only a third of them update their anti-malware and firewall software compared with almost half of users aged 50 to 75 years old. And younger users are almost twice as likely to use public Wi-Fi hotspots compared with older users.

The responses support the idea that younger users are just more likely to use new technology, be it the latest devices, new security measures, or ubiquitous wireless, says Layton.

"The younger generation grew up in the digital age, and they have a higher level of comfort in using technology that that older generation might not."

For organizations, the survey could inform training content for different generations of employees. Older workers may need to be introduced to the latest technologies, while younger workers will likely have to be taught to be more cognizant of the risks.

In addition, companies should make sure they are focused on creating a secure infrastructure for their distributed workforce, Layton says. 

"Always investing in the right technology upfront is always better than waiting until you have an incident, or a hack, or a ransomware attack down the road, which will cost you more money than if you had invested in the best solutions," she says.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29129
PUBLISHED: 2020-11-26
ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
CVE-2020-29130
PUBLISHED: 2020-11-26
slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
CVE-2020-26936
PUBLISHED: 2020-11-26
Cloudera Data Engineering (CDE) before 1.1 was vulnerable to a CSRF attack.
CVE-2020-29042
PUBLISHED: 2020-11-26
An issue was discovered in BigBlueButton through 2.2.29. A brute-force attack may occur because an unlimited number of codes can be entered for a meeting that is protected by an access code.
CVE-2020-29043
PUBLISHED: 2020-11-26
An issue was discovered in BigBlueButton through 2.2.29. When at attacker is able to view an account_activations/edit?token= URI, the attacker can create an approved user account associated with an email address that has an arbitrary domain name.