Welcome!

Release Management Authors: Liz McMillan, Jnan Dash, Lori MacVittie, Gilad Parann-Nissany, Carmen Gonzalez

News Feed Item

Risky Business: New Data from Webroot Uncovers Disconnects, Parallels Between Online and Offline Security Risks

Adults Feel Safer Meeting a Stranger in Person than Opening an Email Attachment from One

BROOMFIELD, Colo., April 10, 2012 /PRNewswire/ -- Using a computer without security is riskier than leaving your home or car unlocked, according to a new study from Webroot, a leader in delivering Internet security as a service. In a survey of 1,637 Internet users aged 18 and older, Webroot asked respondents to gauge the perceived threat level of dangerous offline behaviors, such as driving without a seatbelt or automobile insurance, versus risky online behaviors like sharing an online password or using an unsecured WiFi connection.

With reliance on the Internet continuing to rise, the majority of respondents view many online risks to be just as dangerous – and in some cases more risky – when compared with offline behaviors that could lead to bodily harm, theft or financial damage.

Findings include:

  • Using a computer without security software is seen as riskier than leaving the door to one's home or car unlocked. 85 percent say using a computer with security is high-risk, while 82 and 83 percent think leaving one's car or front door unlocked (respectively) is high-risk.
  • Sharing a password is nearly as risky as driving without a seatbelt or driving without automobile insurance. 85 percent feel sharing a password is high-risk, versus 87 and 88 percent for driving without a seatbelt and driving without insurance (respectively).
  • Making a credit card purchase from an unknown website is riskier than sharing personal information over the phone. 75 percent perceive the online purchase as high-risk, but only 65 percent feel the same amount of risk when disclosing information over the phone.
  • Adults feel more threatened opening an email attachment from an unknown person than arranging an in-person meeting with someone they've met online. 81 percent viewed the email attachment as high-risk, but only 72 percent feel the same level of risk about an in-person meeting.

"It is encouraging to see that people are aware of the risks posed by online threats," said Jacques Erasmus, chief information security officer, Webroot. "Today's Internet users share an increasing amount of personal information online, and cybercriminals target security loopholes and careless practices to carry out everything from credit fraud to identity theft. Our findings show that people are cognizant of these risks, and savvier about the importance of practicing safe online behaviors."

The study also revealed that in today's digital world, consumers place significant importance on their devices:

  • 61 percent of respondents say that a lost laptop, tablet or netbook is about the same or worse as having your wallet or purse stolen.
  • 46 percent say a lost or stolen mobile phone or smartphone is about the same or worse.

Several disconnects emerged as well:

  • 18- to 29-year-olds are more mobile, yet they are less concerned about mobile security risks. 82 percent of respondents under 30 own a smartphone, but only 36 percent think it's very or extremely risky to use a mobile device without security.
  • When it comes to identity theft, 94 percent of respondents feel that online threats pose an equal or greater risk than offline threats, yet one in 20 (five percent) aren't using any security software and one in four (25 percent) are using free software exclusively.  
  • The majority of respondents (70 percent) feel there's limited risk in using public WiFi connections.

Other scenarios reveal that respondents are nearly as scared of social embarrassment as they are of bodily harm or theft:

  • Texting while drinking alcohol poses about the same risk as riding a bicycle without a helmet (50 percent versus 52 percent view it as high-risk). Respondents in the United States believe texting while drinking is even more risky than riding a bicycle without a helmet (62 percent versus 49 percent).
  • More than half of respondents (59 percent) believe it would be just as bad or worse to have someone view their browsing history without their permission as to have someone steal documents or mail from their trash.
  • Men are significantly more concerned with their online privacy than women; nearly twice as many males think someone viewing their browsing history would be worse than document theft (16 percent versus nine percent).

What Can Users Do?
To help consumers understand online risks and practice safe behaviors, Webroot security experts recommend the following:

  • Phone home safely - Mobile malware is on the rise, especially on Android devices, so take a moment to swing by the marketplace or app store to install a mobile security application that will safeguard your device against attacks. Many security apps can also help you locate your phone if it is lost or stolen.
  • Be wary of WiFi - It can be tempting to take advantage of free WiFi access points in airports, hotels or cafes, but resist the urge to use those connections to do anything other than browse. Unsecured wireless connections can leave you vulnerable to a variety of risks, from data-stealing malware to wireless snooping of your logins or email messages by other travelers and guests.
  • Be strict about passwords - Use a different password for each site on which you have an account; do not allow your browser to store passwords for you; and use a password manager instead of writing down passwords or storing them in a Word document in order to remember them. Incorporating numbers, letters and special characters like !, $, and * into your password makes it stronger. Webroot also recommends changing your password at regular intervals, and never use the same password at more than one site.
  • Keep your guard up - Social networks, instant messengers, and email are all rife with social engineering – a technique used by cybercriminals to trick you into divulging confidential information or infecting your own PC. When in doubt don't click on unknown links from people even if the sender is a friend or relative. To further protect yourself, only accept friend requests from people you know.
  • Wear a bike helmet - Use your head and practice safe behaviors, whether you're online or on the road. It's a risky world out there. Stay safe.

About the Research
An online survey was fielded March 8 through March 13, 2012 using Qualtrics survey software. Research Now invited panel members in Australia, Singapore, the United Kingdom, and the United States to complete a 10-minute survey. Participants qualified if they were 18 or older, had at least one Internet-connected device, and spent an average of one or more hours online each day outside of work or school. The margin of error at the 95 percent level of confidence is +/-2.4 percentage points for the total sample of 1,637 and +/- 4.0 points for the 609 US respondents.

About Webroot
Webroot is committed to taking the misery out of Internet security with its suite of Webroot® SecureAnywhere™ offerings for consumers and businesses. Founded in 1997, privately held Webroot is headquartered in Colorado and has operations across North America, Europe and the Asia Pacific region. For more information, visit http://www.webroot.com or call 800.772.9383. Read the Webroot Threat Blog: http://blog.webroot.com. Follow Webroot on Twitter: http://twitter.com/webroot.

© 2012 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, and Webroot SecureAnywhere are registered trademarks of Webroot Inc. in the United States and other countries. All other trademarks are properties of their respective owners.

SOURCE Webroot

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
SYS-CON Events announced today that Pulzze Systems will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Pulzze Systems, Inc. provides infrastructure products for the Internet of Things to enable any connected device and system to carry out matched operations without programming. For more information, visit http://www.pulzzesystems.com.
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
SYS-CON Events announced today that China Unicom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE F...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself. Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, will discuss how VPaaS enables you to move fast, creating scalable video experiences that reach your...
Big Data has been changing the world. IoT fuels the further transformation recently. How are Big Data and IoT related? In his session at @BigDataExpo, Tony Shan, a renowned visionary and thought leader, will explore the interplay of Big Data and IoT. He will anatomize Big Data and IoT separately in terms of what, which, why, where, when, who, how and how much. He will then analyze the relationship between IoT and Big Data, specifically the drilldown of how the 4Vs of Big Data (Volume, Variety,...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...