Perimeter

12/19/2018
02:55 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Harris Poll Reveals American Attitudes Towards Cybersecurity and Privacy

Harris Poll Reveals American Attitudes Towards Cybersecurity and Privacy

San Jose, California, Dec. 19, 2018 (GLOBE NEWSWIRE) -- SAN JOSE, Calif. — Dec. 19, 2018 ­— Dtex Systems, the leader in user behavior intelligence and insider threat detection, today published the Dtex 2018 Privacy & Cybersecurity Index. The index reveals that a majority of Americans believe it is acceptable for organizations spanning multiple industries to conduct user digital activity and behavior monitoring when it is done to provide defense against threats and breaches. It also shows that a vast majority of Americans would lose trust in organizations that conceal monitoring programs. To compile the index, Dtex commissioned The Harris Poll to conduct an online survey that polled more than 2,000 Americans.*

“Scandals are consuming Facebook and other companies that collect massive data volumes. These are causing a surge in privacy demands and regulations that security and risk professionals need to contend with,” said Rajan Koo, SVP of Customer Engineering, Dtex Systems. “They are now looking for new and innovative ways to monitor human behaviors and activities without violating privacy or trust. This report will help them to do both.”   

The survey revealed many key findings, including:    

  • Social Media: When asked if it is ever acceptable for social media companies to conduct digital activity monitoring over users to provide defense against threats and data breaches, 51 percent of Americans indicate it is.

 

  • Banks: When asked if it is ever acceptable for banks to conduct digital activity monitoring over customers to provide defense against threats and data breaches, 65 percent of Americans indicate it is.

 

  • Government: When asked if it is ever acceptable for government organizations to conduct digital activity monitoring over citizens to provide defense against threats and data breaches, 61 percent of Americans indicate it is.

 

  • Retail: When asked if it is ever acceptable for retail companies to conduct digital activity monitoring over shoppers to provide defense against threats and data breaches, 60 percent of Americans indicate it is.

 

  • Deception: 79 percent of Americans would trust a company less if they discovered that it was monitoring consumers’ digital activities without their knowledge.

 Access the full report: Dtex 2018 Privacy & Cybersecurity Index (https://www2.dtexsystems.com/2018-dtex-harris-privacy-security-index)

Earlier this year, Dtex released findings from the same poll. It revealed how American employees feel about employer digital activity monitoring programs. Those results are summarized at the end of the index. 

*Survey Methodology

This survey was conducted online within the United States by The Harris Poll on behalf of Dtex Systems from June 14 to 18, 2018 among 2,024 U.S. adults ages 18 and older, among whom 833 are employed full-time. This online survey is not based on a probability sample and therefore no estimate of theoretical sampling error can be calculated. For complete survey methodology, including weighting variables and subgroup sample sizes, please contact Joe Franscella.

Visit the new website: www.dtexsystems.com  
Follow Dtex on Twitter: https://twitter.com/DtexSystems
Join Dtex on LinkedIn: https://www.linkedin.com/company/dtex-systems
Like Dtex on Facebook: https://www.facebook.com/Dtex-Systems-297181017056254  

About Dtex Systems

Dtex turns employees, executives, contractors and partners into trusted insiders. The award-winning Dtex Advanced User Behavior Intelligence Platform reduces insider threat risk by providing intelligence about behaviors and activities across massive numbers of distributed users. Dtex combines the largest library of known malicious and negligent behaviors, machine learningand advanced analytics. This gives the platform the power to detect insider threats in near real time, reduce false positives, and free security and risk professionals from having to spend time analyzing overwhelming volumes of data and logs. Dtex is scalable and deploys quickly. It only collects light-weight data needed to identify risky behaviors, which never slows network, endpoint or user performance. Patented anonymization capabilities protect privacy and ensure compliance. Investors include Wing Venture Capital and Norwest Venture partners. Customers include the world’s leading banks, manufacturers, healthcare organizations, government agencies, and law firms. The Defense Information Systems Agency (DISA) and Williams Formula 1 Racing are among customers using Dtex to reduce insider threat risk. https://www.dtexsystems.com/

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
New Mirai Version Targets Business IoT Devices
Dark Reading Staff 3/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Reading Schneier's Friday Squid Blog again?
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6149
PUBLISHED: 2019-03-18
An unquoted search path vulnerability was identified in Lenovo Dynamic Power Reduction Utility prior to version 2.2.2.0 that could allow a malicious user with local access to execute code with administrative privileges.
CVE-2018-15509
PUBLISHED: 2019-03-18
Five9 Agent Desktop Plus 10.0.70 has Incorrect Access Control (issue 2 of 2).
CVE-2018-20806
PUBLISHED: 2019-03-17
Phamm (aka PHP LDAP Virtual Hosting Manager) 0.6.8 allows XSS via the login page (the /public/main.php action parameter).
CVE-2019-5616
PUBLISHED: 2019-03-15
CircuitWerkes Sicon-8, a hardware device used for managing electrical devices, ships with a web-based front-end controller and implements an authentication mechanism in JavaScript that is run in the context of a user's web browser.
CVE-2018-17882
PUBLISHED: 2019-03-15
An Integer overflow vulnerability exists in the batchTransfer function of a smart contract implementation for CryptoBotsBattle (CBTB), an Ethereum token. This vulnerability could be used by an attacker to create an arbitrary amount of tokens for any user.