How Hackers Are Getting Inside Help

How Hackers Are Getting Inside Help

There are more people today aware of the security risks they expose themselves and their companies during their regular internet activities than there have ever been before. The media has made it clear to all internet users just how often and easily their online privacy is threatened and each time some of the best and most common security measures have been detailed. And yet many of the same users that do feel threatened will ignore the most basic security features just to enjoy the fun of online shopping.

According to a survey by ISACA, non-profit IT association, 90% of the people who need to use a PC, laptop or tablet for their work are aware of the dangers that an online persona poses but they and more than half believe that the biggest threat comes from corporations that are desperate to get at their personal, product interest data. With that being the case you would expect that most people would at least try to respect their company’s security settings but that is not the case.

They study looked at how much people enjoy their online line shopping rituals by examining the threats they are willing to face. The most impressive statistic from the report is that 65% of all respondents do not verify the security settings of online shopping sites. That means they are not only endangering their privacy but also their financial security is severely questioned.

Another aspect about online security that the survey looked at was how many people use their work devices for personal online surfing. And while the good news is that we all seem to be doing it 37% of us say that they will spend 2 days during work hours for holiday shopping this year. Of course, dealing with that is at the discretion of the individual managers but the simple fact of spending so much time and sharing so much of your personal data on unsecured shopping networks does bring an increased security risk.

What is even more significant is that there are quite a large percentage of users who endanger more than just their own security but their company’s security as well. There are two basic ways in which this happens: one only poses a risk to the company and to themselves from a privacy point of view and the other one is actually posing a security threat.

From a private data point of view 36% of interviewed people have admitted to accessing social networks sites from their work computers and 19% used their work email address for online shopping. In themselves none of these actions pose very big security threats but they do put out just that little bit more personal information.

However the real security threats come from those 12% of respondents that store work related passwords on their personal computers, thus completely bypassing any security arrangements a company may have made. And there are also another 11% who have used a cloud storage service like Dropbox or Google Drive for their work related documents.

By Luchi Gabriel Manescu

Luchi

Luchi is a Sociology major that worked as a technician in a computer shop to put himself through collage. He then continued to work for HP as a data analyst while trying to assert himself as a soft skills trainer. Finally he found the perfect balance between his diverging skills when he started writing tech related articles almost 3 years ago and since then he has continued to learn about almost every aspect of the IT world while continuously working on his writing skills.
FacebookTwitterLinkedInGoogle+Share

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Popular

Top Viral Impact

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation

Cloud Infographic: The Education Of Tomorrow

Cloud Infographic: The Education Of Tomorrow

Cloud Infographic: The Education Of Tomorrow  Online Education is a very exciting topic for many as it opens up many new doors and opportunities. We’ve touched on areas such as Massive Open Online Sources (MOOC) which provides tremendous levels of cloud based interconnectivity. We’ve taken a look into higher education,  the increased demand for online courses as well as

Cloud Infographic – The Power Of Cloud Disaster Recovery

Cloud Infographic – The Power Of Cloud Disaster Recovery

Cloud Infographic – The Power Of Cloud Disaster Recovery Preventing a Cloud Disaster is one thing. Recovering from a disaster is a whole other area of concern. Today’s infographic provided by CloudVelox outlines some best practices and safeguards in order to help your business make more informed decisions. About Latest Posts LuchiLuchi is a Sociology

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.