Click here to close now.

Welcome!

Open Web Authors: Liz McMillan, Lori MacVittie, Gilad Parann-Nissany, Carmen Gonzalez, Mark R. Hinkle

News Feed Item

Risky Business: New Data from Webroot Uncovers Disconnects, Parallels Between Online and Offline Security Risks

Adults Feel Safer Meeting a Stranger in Person than Opening an Email Attachment from One

BROOMFIELD, Colo., April 10, 2012 /PRNewswire/ -- Using a computer without security is riskier than leaving your home or car unlocked, according to a new study from Webroot, a leader in delivering Internet security as a service. In a survey of 1,637 Internet users aged 18 and older, Webroot asked respondents to gauge the perceived threat level of dangerous offline behaviors, such as driving without a seatbelt or automobile insurance, versus risky online behaviors like sharing an online password or using an unsecured WiFi connection.

With reliance on the Internet continuing to rise, the majority of respondents view many online risks to be just as dangerous – and in some cases more risky – when compared with offline behaviors that could lead to bodily harm, theft or financial damage.

Findings include:

  • Using a computer without security software is seen as riskier than leaving the door to one's home or car unlocked. 85 percent say using a computer with security is high-risk, while 82 and 83 percent think leaving one's car or front door unlocked (respectively) is high-risk.
  • Sharing a password is nearly as risky as driving without a seatbelt or driving without automobile insurance. 85 percent feel sharing a password is high-risk, versus 87 and 88 percent for driving without a seatbelt and driving without insurance (respectively).
  • Making a credit card purchase from an unknown website is riskier than sharing personal information over the phone. 75 percent perceive the online purchase as high-risk, but only 65 percent feel the same amount of risk when disclosing information over the phone.
  • Adults feel more threatened opening an email attachment from an unknown person than arranging an in-person meeting with someone they've met online. 81 percent viewed the email attachment as high-risk, but only 72 percent feel the same level of risk about an in-person meeting.

"It is encouraging to see that people are aware of the risks posed by online threats," said Jacques Erasmus, chief information security officer, Webroot. "Today's Internet users share an increasing amount of personal information online, and cybercriminals target security loopholes and careless practices to carry out everything from credit fraud to identity theft. Our findings show that people are cognizant of these risks, and savvier about the importance of practicing safe online behaviors."

The study also revealed that in today's digital world, consumers place significant importance on their devices:

  • 61 percent of respondents say that a lost laptop, tablet or netbook is about the same or worse as having your wallet or purse stolen.
  • 46 percent say a lost or stolen mobile phone or smartphone is about the same or worse.

Several disconnects emerged as well:

  • 18- to 29-year-olds are more mobile, yet they are less concerned about mobile security risks. 82 percent of respondents under 30 own a smartphone, but only 36 percent think it's very or extremely risky to use a mobile device without security.
  • When it comes to identity theft, 94 percent of respondents feel that online threats pose an equal or greater risk than offline threats, yet one in 20 (five percent) aren't using any security software and one in four (25 percent) are using free software exclusively.  
  • The majority of respondents (70 percent) feel there's limited risk in using public WiFi connections.

Other scenarios reveal that respondents are nearly as scared of social embarrassment as they are of bodily harm or theft:

  • Texting while drinking alcohol poses about the same risk as riding a bicycle without a helmet (50 percent versus 52 percent view it as high-risk). Respondents in the United States believe texting while drinking is even more risky than riding a bicycle without a helmet (62 percent versus 49 percent).
  • More than half of respondents (59 percent) believe it would be just as bad or worse to have someone view their browsing history without their permission as to have someone steal documents or mail from their trash.
  • Men are significantly more concerned with their online privacy than women; nearly twice as many males think someone viewing their browsing history would be worse than document theft (16 percent versus nine percent).

What Can Users Do?
To help consumers understand online risks and practice safe behaviors, Webroot security experts recommend the following:

  • Phone home safely - Mobile malware is on the rise, especially on Android devices, so take a moment to swing by the marketplace or app store to install a mobile security application that will safeguard your device against attacks. Many security apps can also help you locate your phone if it is lost or stolen.
  • Be wary of WiFi - It can be tempting to take advantage of free WiFi access points in airports, hotels or cafes, but resist the urge to use those connections to do anything other than browse. Unsecured wireless connections can leave you vulnerable to a variety of risks, from data-stealing malware to wireless snooping of your logins or email messages by other travelers and guests.
  • Be strict about passwords - Use a different password for each site on which you have an account; do not allow your browser to store passwords for you; and use a password manager instead of writing down passwords or storing them in a Word document in order to remember them. Incorporating numbers, letters and special characters like !, $, and * into your password makes it stronger. Webroot also recommends changing your password at regular intervals, and never use the same password at more than one site.
  • Keep your guard up - Social networks, instant messengers, and email are all rife with social engineering – a technique used by cybercriminals to trick you into divulging confidential information or infecting your own PC. When in doubt don't click on unknown links from people even if the sender is a friend or relative. To further protect yourself, only accept friend requests from people you know.
  • Wear a bike helmet - Use your head and practice safe behaviors, whether you're online or on the road. It's a risky world out there. Stay safe.

About the Research
An online survey was fielded March 8 through March 13, 2012 using Qualtrics survey software. Research Now invited panel members in Australia, Singapore, the United Kingdom, and the United States to complete a 10-minute survey. Participants qualified if they were 18 or older, had at least one Internet-connected device, and spent an average of one or more hours online each day outside of work or school. The margin of error at the 95 percent level of confidence is +/-2.4 percentage points for the total sample of 1,637 and +/- 4.0 points for the 609 US respondents.

About Webroot
Webroot is committed to taking the misery out of Internet security with its suite of Webroot® SecureAnywhere™ offerings for consumers and businesses. Founded in 1997, privately held Webroot is headquartered in Colorado and has operations across North America, Europe and the Asia Pacific region. For more information, visit http://www.webroot.com or call 800.772.9383. Read the Webroot Threat Blog: http://blog.webroot.com. Follow Webroot on Twitter: http://twitter.com/webroot.

© 2012 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, and Webroot SecureAnywhere are registered trademarks of Webroot Inc. in the United States and other countries. All other trademarks are properties of their respective owners.

SOURCE Webroot

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impact.
Every day we read jaw-dropping stats on the explosion of data. We allocate significant resources to harness and better understand it. We build businesses around it. But we’ve only just begun. For big payoffs in Big Data, CIOs are turning to cognitive computing. Cognitive computing’s ability to securely extract insights, understand natural language, and get smarter each time it’s used is the next, logical step for Big Data.
The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
There's no doubt that the Internet of Things is driving the next wave of innovation. Google has spent billions over the past few months vacuuming up companies that specialize in smart appliances and machine learning. Already, Philips light bulbs, Audi automobiles, and Samsung washers and dryers can communicate with and be controlled from mobile devices. To take advantage of the opportunities the Internet of Things brings to your business, you'll want to start preparing now.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal an...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect at Hookflash, will walk through the shifting landscape of traditional telephone and voice services ...
The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal today!
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Architect for the Internet of Things and Intelligent Systems at Red Hat, described how to revolutioniz...
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, June 9-11, 2015, at the Javits Center in New York City. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, and physical persons. In the IoT vision, every new "thing" - sensor, actuator, data source, data con...
Container frameworks, such as Docker, provide a variety of benefits, including density of deployment across infrastructure, convenience for application developers to push updates with low operational hand-holding, and a fairly well-defined deployment workflow that can be orchestrated. Container frameworks also enable a DevOps approach to application development by cleanly separating concerns between operations and development teams. But running multi-container, multi-server apps with containers is very hard. You have to learn five new and different technologies and best practices (libswarm, sy...
SYS-CON Events announced today that DragonGlass, an enterprise search platform, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. After eleven years of designing and building custom applications, OpenCrowd has launched DragonGlass, a cloud-based platform that enables the development of search-based applications. These are a new breed of applications that utilize a search index as their backbone for data retrieval. They can easily adapt to new data sets and provide access to both structured and unstruc...
There's Big Data, then there's really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at Big Data Expo®, Hannah Smalltree, Director at Treasure Data, discussed how IoT, Big Data and deployments are processing massive data volumes from wearables, utilities and other machines...
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists will peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you'll have no problem fil...
SYS-CON Events announced today that MetraTech, now part of Ericsson, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Ericsson is the driving force behind the Networked Society- a world leader in communications infrastructure, software and services. Some 40% of the world’s mobile traffic runs through networks Ericsson has supplied, serving more than 2.5 billion subscribers.
The worldwide cellular network will be the backbone of the future IoT, and the telecom industry is clamoring to get on board as more than just a data pipe. In his session at @ThingsExpo, Evan McGee, CTO of Ring Plus, Inc., discussed what service operators can offer that would benefit IoT entrepreneurs, inventors, and consumers. Evan McGee is the CTO of RingPlus, a leading innovative U.S. MVNO and wireless enabler. His focus is on combining web technologies with traditional telecom to create a new breed of unified communication that is easily accessible to the general consumer. With over a de...
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize supplier management. Learn about enterprise architecture strategies for designing connected systems tha...
Cloud is not a commodity. And no matter what you call it, computing doesn’t come out of the sky. It comes from physical hardware inside brick and mortar facilities connected by hundreds of miles of networking cable. And no two clouds are built the same way. SoftLayer gives you the highest performing cloud infrastructure available. One platform that takes data centers around the world that are full of the widest range of cloud computing options, and then integrates and automates everything. Join SoftLayer on June 9 at 16th Cloud Expo to learn about IBM Cloud's SoftLayer platform, explore se...
SYS-CON Media announced today that 9 out of 10 " most read" DevOps articles are published by @DevOpsSummit Blog. Launched in October 2014, @DevOpsSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce softw...
15th Cloud Expo, which took place Nov. 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA, expanded the conference content of @ThingsExpo, Big Data Expo, and DevOps Summit to include two developer events. IBM held a Bluemix Developer Playground on November 5 and ElasticBox held a Hackathon on November 6. Both events took place on the expo floor. The Bluemix Developer Playground, for developers of all levels, highlighted the ease of use of Bluemix, its services and functionality and provide short-term introductory projects that developers can complete between sessions.