SHARE
Facebook X Pinterest WhatsApp

The Key to Battling Cyber-Crime Begins With Users

Aug 18, 2015

The Key to Battling Cyber-Crime Begins With Users

The Key to Battling Cyber-Crime Begins With UsersThe Key to Battling Cyber-Crime Begins With Users

Businesses must do a better job of educating consumers and employees about proper cyber-security precautions as a first line of defense against cyber-criminals.

Insecurities RuleInsecurities Rule

84% of surveyed Americans believe their personal information is more vulnerable than it was a year ago.

Out of ControlOut of Control

69% of those surveyed Americans think having their personal information stolen in their lifetime is inevitable.

No ControlsNo Controls

70% have not installed security software on their smartphone or tablet, 62% have not strengthened their Wi-Fi password, and 51% do not change passwords frequently.

No PlansNo Plans

89% feel that dealing with a theft or loss of their personal information would be more difficult to deal with than doing their taxes. 61% of Americans lack a response plan for a data breach.

Private MattersPrivate Matters

38% have a “private folder” on their PC or mobile device that they wouldn’t want anyone else to see. Among Millennials, the figure is 57%.

Working DangersWorking Dangers

88% of employed Americans use work devices without trusted company security software.

A Matter of TrustA Matter of Trust

88% of Americans believe that companies often say their data is more secure than it actually is. More than 1 in 3 people feel that companies spend more on a social media strategy than on a data protection strategy.

Socially SecureSocially Secure

70% think it would be riskier to trust a company with their Social Security number than to carry their social security card in a wallet.

Risky BusinessRisky Business

84% do not frequently dispose of work information that is no longer needed by deleting and shredding documents.

Key TakeawaysKey Takeaways

Educate customers and employees about risks and appropriate actions. Use encryption, virtualization and enterprise mobility management to reduce risks. Develop a deeper understanding of employee needs and behaviors in order to build a better security framework.

Final ThoughtsFinal Thoughts

“The public is aware of increasing security threats but people do not fully understand the risks and what to do if data is compromised.”—Alicia Rey, Citrix Security Solutions

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.