Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

6/17/2011
06:03 PM
Graham Cluley
Graham Cluley
Products and Releases
50%
50%

GFI Software Releases 2011 Parent-Teen Internet Safety Report

Study examines online behavior of U.S. parents and their teenage children

Clearwater, Fla. – June 15, 2011 – GFI' Software today announced it has published a scientific study of home Internet use by parents and their teenage children to better understand how they behave online. Designed and implemented by a noted polling expert, the nationally-representative 2011 Parent-Teen Internet Safety Report identifies online behaviors of parents and their teenagers related to content, communications and malware exposure. The study finds that while parents and their teens are engaged in a game of “cat-and-mouse” when it comes to controlling home Internet access, both populations regularly engage in online behavior that puts them and the parents’ employers at risk.

In a statistically-valid survey with a 5% margin of error fielded by Knowledge Networks between March 22 and April 5, 2011, 535 pairs of adults and teenagers (1,070 respondents in total) living in households with Internet access were polled on such subjects as cyber-bullying, teens’ online interactions with strangers, Internet security technology, Internet safety education, visiting adult websites, using work-issued computers at home, and Facebook use.

Key findings from the report include:

Only 28% of parents who have antivirus software say they update their virus definitions daily, and 24% are unsure if they are updating these definitions at all.

90% of parents who have work computers at home say they’ve used them for non-work related purposes and 37% of these say they let their teens use them as well. Meanwhile, 47% of teens say they have been infected by a virus while using a computer at home.

65% of parents say a virus has infected at least one of their home computers, and 62% of these have been either “somewhat” or “very” serious problems.

36% of parents use web monitoring or web filtering software to keep tabs on their teens’ activities online and to block inappropriate content.

15% of all teenage girls surveyed have been bullied online or via text message.

31% of teens admit they have communicated something to someone online that they would not have said face-to-face.

31% of teenage boys admit to visiting a web site intended for adults, and 53% of all teenagers who have done so say they lied about their age to gain access.

34% of teens say they have created online accounts that their parents do not know about.

Nearly one third (29%) of teens have been contacted online by a stranger, and 23% of those say they have responded in some way.

“The Parent-Teen Internet Safety Report is a real eye-opener as to how modern computing introduces families to a host of new dangers that reflect our evolving online lives,” said Alex Eckelberry, general manager of GFI Software’s Security Business Unit. “It is not surprising to see teenagers engage in risky online behavior – just as they will often engage in risky behavior in the physical world. It is surprising, however, to see that parents are often compounding this problem with highly insecure computing practices like letting their children use their work computers, or being lax in updating their virus definitions. As a result, home Internet use is a source of significant risk not only to families but also to employers.”

The full report and a document with the full survey questionnaire and responses are available from GFI Software by visiting http://www.gfi.com/parent-teen-internet-safety-report. Also available by request is the complete survey dataset (SPSS format) and detailed methodology disclosure statement from Knowledge Networks.

About GFI

GFI Software provides web and mail security, archiving and fax, networking and security software and hosted IT solutions for small to medium-sized enterprises (SME) via an extensive global partner community. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both delivery models. With award-winning technology, a competitive pricing strategy, and a strong focus on the unique requirements of SMEs, GFI satisfies the IT needs of organizations on a global scale. The company has offices in the United States, UK, Austria, Australia, Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a Microsoft Gold Certified Partner.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5641
PUBLISHED: 2020-11-24
Cross-site request forgery (CSRF) vulnerability in GS108Ev3 firmware version 2.06.10 and earlier allows remote attackers to hijack the authentication of administrators and the product's settings may be changed without the user's intention or consent via unspecified vectors.
CVE-2020-5674
PUBLISHED: 2020-11-24
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2020-29002
PUBLISHED: 2020-11-24
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
CVE-2020-29003
PUBLISHED: 2020-11-24
The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.
CVE-2020-26890
PUBLISHED: 2020-11-24
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the r...