2015 Advertising Opportunities - Find Out More!
How Hackers Are Getting Inside Help
There are more people today aware of the security risks they expose themselves and their companies during their regular internet activities than there have ever been before. The media has made it clear to all internet users just how often and easily their online privacy is threatened and each time some of the best and most common security measures have been detailed. And yet many of the same users that do feel threatened will ignore the most basic security features just to enjoy the fun of online shopping.
According to a survey by ISACA, non-profit IT association, 90% of the people who need to use a PC, laptop or tablet for their work are aware of the dangers that an online persona poses but they and more than half believe that the biggest threat comes from corporations that are desperate to get at their personal, product interest data. With that being the case you would expect that most people would at least try to respect their company’s security settings but that is not the case.
They study looked at how much people enjoy their online line shopping rituals by examining the threats they are willing to face. The most impressive statistic from the report is that 65% of all respondents do not verify the security settings of online shopping sites. That means they are not only endangering their privacy but also their financial security is severely questioned.
Another aspect about online security that the survey looked at was how many people use their work devices for personal online surfing. And while the good news is that we all seem to be doing it 37% of us say that they will spend 2 days during work hours for holiday shopping this year. Of course, dealing with that is at the discretion of the individual managers but the simple fact of spending so much time and sharing so much of your personal data on unsecured shopping networks does bring an increased security risk.
What is even more significant is that there are quite a large percentage of users who endanger more than just their own security but their company’s security as well. There are two basic ways in which this happens: one only poses a risk to the company and to themselves from a privacy point of view and the other one is actually posing a security threat.
From a private data point of view 36% of interviewed people have admitted to accessing social networks sites from their work computers and 19% used their work email address for online shopping. In themselves none of these actions pose very big security threats but they do put out just that little bit more personal information.
However the real security threats come from those 12% of respondents that store work related passwords on their personal computers, thus completely bypassing any security arrangements a company may have made. And there are also another 11% who have used a cloud storage service like Dropbox or Google Drive for their work related documents.
By Luchi Gabriel Manescu