+ All Categories
Home > Documents > 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors...

3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors...

Date post: 28-Mar-2015
Category:
Upload: allison-dalton
View: 218 times
Download: 4 times
Share this document with a friend
Popular Tags:
29
Microsoft Computing Safety Index 2012 Prepared for Microsoft by TNS Global Research
Transcript
Page 1: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

Microsoft Computing Safety Index 2012Prepared for Microsoft by TNS Global Research

Page 2: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

Methodology

Page 3: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

3

MethodologyMicrosoft Computing Safety Index

• Measure of 22 individual protective behaviors• Multivariate analysis grounded in factor analysis• Groups and weights protective behaviors into three tiers, with multiple components in each tier

• Foundational: Actions in this tier are considered the most basic yet critical precautions a user can take to help safeguard the health of his or her PCs, laptops, and other devices. These include:

An up-to-date, genuine operating system (Windows Vista or newer) Firewall turned on Up-to-date anti-virus protection Using auto-updates for software Using only secure wireless networks

• Technical: Actions in this tier suggest a higher level of technical sophistication, as well as a heightened degree of behavioral awareness. These include:

Limiting one’s ability to be tracked: including using in-private browser settings, otherwise limiting traceability, including deleting cookies, and editing entries

Actively managing on-line presence, including searching for one’s self online and editing data found there or using services to edit on-line data

Using a VPN Managing social networking: including using privacy settings on social networking sites, using gamer tags and screen names that are not

one’s actual name, and taking steps to limit information about one’s self on social sites

• Behavioral: Actions in this tier require an increased degree of user vigilance to combat socially engineered risks. These include:

Creating unique and strong passwords Looking for HTTPS for online transactions and otherwise limiting their activities to trustworthy sites Educating themselves about on-line reputation and identify theft, as well as learning ways that identity theft can be prevented or corrected

Taken together, this index provides a snapshot of consumer protective behaviors that can be compared across geographies, types of consumers and time.

Page 4: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

4

MethodologyMicrosoft Mobile Safety Index

• Modeled as an addition to the original index, measure of 14 protective behaviors when using mobile devices• Multivariate analysis grounded in factor analysis• Groups and weights protective behaviors into three tiers, with multiple components in each tier

• Foundational: Actions in this tier are considered the most basic yet critical precautions a user can take to help safeguard the health of his or her mobile devices. These include:

Install mobile anti-virus software and keep it up-to-date Install software updates on mobile device as soon as they are released Use PIN or password to lock the device

• Technical tools: Actions in this tier suggest a higher level of technical sophistication, as well as a heightened degree of behavioral awareness. These include:

Location capabilities: includes turning location tracking on/off, being selective about sharing information with people, organizations, and apps, and reviewing location and privacy settings in social media accounts

Avoiding use of open Wi-Fi connections with the mobile device Downloading and using only apps from trusted sources

• Behavioral: Actions in this tier require an increased degree of user vigilance to combat socially engineered risks. These include:

Social Savvy: Being selective about what to text, who to text, and who to give personal phone number to Exercising care when physically handling the device Avoid clicking on dubious links or ads when on the mobile device

Page 5: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

Interpreting the Index

Page 6: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

6

Countries IncludedNumber of Respondents in Each Country

Australia Belgium Brazil Canada China Egypt France Germany India Indonesia

527 525 531 540 530 510 536 537 563 526

Japan Korea Malaysia Mexico Russia Singapore Spain Turkey United

KingdomUnited States

528 537 519 523 523 529 532 534 530 540

Page 7: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

Executive Summary

Page 8: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

• In 2012, consumers from 20 countries in Africa, Asia, the Middle East, North America and South America scored 34 out of 100 possible points on the Microsoft Computer Security Index. While many consumers are actively protecting themselves online, they could still be doing more.• The highest scores were seen in Singapore (42), Malaysia (40), Australia (39) and Canada (39), while consumers in France (29),

Germany (29), Korea (27), and Japan (23) were not as proactive.• For the five countries that were surveyed in both 2011 and 2012, Brazil, France, Germany, the United Kingdom and the United

States, results remained mostly consistent. France (29.5, +4.2) and the United Kingdom (38.6, +4.2) recorded moderate increases while the other three countries, Brazil (37.3), Germany (29.2) and the United States (36.6), remained within 2 index points of last year’s results.

• When looking for patterns, the countries can be classified into four groups. The groups differ by how well consumers protect themselves, how many problems they experience, and how they assess the dangers they face when online.• Consumers in Group 1 score low on all portions of the index, but experience only low to moderate levels of problems when

online. They are less concerned about the harm they could face online, and are therefore less active when it comes to staying safe online. This group includes Korea, Japan, Russia and Spain.

• Consumers in Group 2 do fairly well on technical and behavioral safeguards, but lack in foundational behaviors. This lack of foundational steps hurts them, as consumers in this group experience more problems when online. Yet, they are not particularly concerned about the threats they may face. This group includes China, Egypt, India, Indonesia, Malaysia and Turkey.

• Consumers in Group 3 do well on foundational behaviors, but complete technical and behavioral steps less actively. They tend to experience fewer problems but are nevertheless greatly concerned about the threats they may encounter online. This group includes Belgium, France and Germany.

• Consumers in Group 4 are the most proactive as they complete technical, behavioral, and foundational steps actively. Overall, they tend to experience fewer problems but nevertheless remain vigilant about the dangers they may encounter online. This group includes Australia, Brazil, Canada, Mexico, Singapore, United Kingdom, and United States.

8

Key Findings

Page 9: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

• In general, consumers could take protective steps more regularly. Fewer than half complete even such foundational computer protection tasks as installing software updates or keeping an anti-virus protection current at least monthly.

• The most common computer threats are fraudulent emails asking for personal information or indicating a virus was detected, as well as actual instances of viruses, bots, ad- or spyware on the consumer’s computer.

• A second index measuring mobile behaviors, the Microsoft Mobile Security Index (MMSI) was added this year and yielded an average score of 40 out of the 100 points among the 20 countries included in the study.• The higher average compared to the existing computer-based index (+6 index points) is driven mainly by the Technical “+”

category where consumers receive an average of 15 points compared to 9 in the computer-based index.• Careful use of location-tracking capabilities increases the scores for many consumers in this category. Points are allocated for

turning location tracking on/off, being selective about sharing information with people, organizations, and apps, and reviewing location and privacy settings in social media accounts regularly.

• While many consumers could be more proactive in protecting their mobile devices, if a step needs to be taken repeatedly, they are at least more likely to do so on their mobile device than they are on a computer, likely driven by the more constant engagement with their mobile device than their PC.

9

Key Findings – Cont’d

Page 10: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

10

20-Country Average: 2012 MCSI – 34 points

Microsoft Computing Safety IndexGlobal Benchmark

Social network privacy

settings, take steps to limit info shared

3

Choosing reputable

sites, https3

Strong passwords

3

Educate self about

identity theft, reputation

5

Use service to edit online

info, search to manage info

3

Hide computer ID/

in-private browse,

edit/delete info3

Behavioral 11 points

Technical “+”9 points

Foundational 14 points

UpdatesAuto or

regular manual2

Anti-virus Maintain up-to-date

3

FirewallTurn it on; leave it on

2

Secure Wireless Networks

2Up-to-date, genuine version of Windows (Win 7 or

Vista) – 5

Pro

activ

e in

volv

em

en

t in p

rote

ctin

g s

elf

on

line

Q160. The list below details some of the ways people protect their security, privacy and personal safety from online risks. Which, if any, of these do you do? [MCSI Index Points]

Page 11: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

11

Microsoft Computing Safety IndexCountry Benchmarks

Q160. The list below details some of the ways people protect their security, privacy and personal safety from online risks. Which, if any, of these do you do? [MCSI Index Points]

Higher than average Lower than average

 Gran

d Total

Japan Korea Spain Russia China Turkey Egypt IndiaIndones

iaMalaysi

aGerman

yFrance Belgium Mexico

United States

BrazilUnited Kingdo

mCanada

Australia

Singapore

    Group 1 (Lo-Lo) Group 2 (Hi-Lo) Group 3 (Lo-Hi) Group 4 (Hi-Hi)

Responses10620

528 537 532 523 530 534 510 563 526 519 537 536 525 523 540 531 530 540 527 529

MCSI Total34.3

23.3 27.1 31.3 32.9 32.6 33.5 33.6 33.6 36 40 29.2 29.5 34.8 35.9 36.6 37.3 38.6 39.1 39.3 42.1

Behavioral (Net) 10.8 6.2 8.3 9.6 9.5 11.1 11.7 11.8 12.3 14 14.4 7.6 7.7 9 11.1 11.3 12 11.8 12 11.8 13.3

Strong passwords 3.1 1.8 2.7 2.6 3.7 3.2 2.9 3.3 3.1 3.7 3.7 2.6 2.2 2.7 3.9 3.5 2.7 3.6 3.8 3.5 3.7

Reputable sites 3.1 1.5 2.2 3 2.5 3 3.7 2.6 2.6 3.1 3.5 2.9 3.5 3.7 3.6 3.3 3.5 3.7 3.5 3.5 3.4

Educate self 4.6 2.9 3.5 4 3.3 5 5 6 6.6 7.2 7.1 2.2 1.9 2.7 3.6 4.6 5.9 4.4 4.7 4.7 6.2

Technical + (Net) 9.3 4.2 6.9 8.5 9.8 9.5 8.7 10 9.6 11 12.2 6.9 7.2 8.9 10.5 9.1 10.7 9.3 10.2 10.2 12.4

Hide comp ID 2.7 1.2 2.1 2.4 2.5 3.1 2.7 2.7 2.6 3.2 3.4 2.2 1.9 2.3 3.1 2.7 3.4 2.9 3.2 3 3.7

Edit online info 3.1 1.4 2.6 2.9 2.8 3.6 3.1 4.6 3.9 4.1 4.8 2.3 2.1 2.8 3.4 2.6 3.6 2.5 2.6 2.8 4

Social network privacy

3.4 1.6 2.3 3.1 4.5 2.8 2.9 2.7 3.1 3.8 4 2.4 3.1 3.8 4 3.8 3.7 4 4.3 4.3 4.6

Foundational (Net)

14.2 13 11.8 13.2 13.6 12 13.1 11.7 11.7 10.9 13.4 14.8 14.6 16.8 14.3 16.1 14.5 17.6 16.9 17.4 16.5

Firewall 2.3 2.1 2.9 2 1.5 2.7 1.9 2.2 1.5 1.9 1.7 2.7 2.6 2.9 2 2.5 2.5 2.8 2.9 2.7 2.5

Anti-virus 2.6 2.3 2.3 2.2 3.3 2 1.9 2.6 2.1 2.3 2.4 2.7 2.4 2.6 2.5 3 2.7 3.2 3 3.1 2.8

Software updates 2.2 1.6 1.9 1.7 3.1 1.7 1.9 1.8 1.7 1.5 1.7 2.3 2.5 2.9 2.1 2.7 2.2 2.8 2.9 3 2.4

Secure wireless 2.2 1.3 1.8 2.2 1.4 2.8 2.7 1.4 2.1 1.6 2.6 2.2 1.4 2.5 2.7 2.4 2 2.8 2.3 2.7 3.3

Up-to-date Windows 4.9 5.7 3 5 4.2 2.9 4.7 3.7 4.3 3.6 5 4.9 5.7 5.8 5.1 5.6 5.2 5.9 5.8 5.8 5.4

Page 12: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

12

Microsoft Computing Safety Index2012 to 2011 Comparison

Q160. The list below details some of the ways people protect their security, privacy and personal safety from online risks. Which, if any, of these do you do? [MCSI Index Points]Letters indicate statistical significance at 95% interval.

• Among the five countries also surveyed in 2011, MCSI scores stayed largely consistent year over year• Current Windows adoption grew in all five countries, but in Brazil and Germany, the resulting increase was offset

by less diligence in following behavioral steps

 Brazil Brazil France France

Germany

Germany UK UK US US

2012 2011 2012 2011 2012 2011 2012 2011 2012 2011(A) (B) (C) (D) (E) (F) (G) (H) (I) (J)

Responses 531 159 536 151 537 167 530 165 540 172MCSI Total 37.3 38 29.5 D 25.3 29.2 30.8 38.6 H 34.4 36.6 35.1

Behavioral (Net) 12 14.4 A 7.7 7.3 7.6 9.9 E 11.8 12.2 11.3 13.3 IStrong passwords 2.7 3.2 2.2 1.9 2.6 3.4 E 3.6 3.9 3.5 3.7

Reputable sites 3.5 4.1 A 3.5 3 2.9 3.5 E 3.7 3.8 3.3 3.7Educate self 5.9 7.1 A 1.9 2.4 2.2 3.1 E 4.4 4.5 4.6 5.9 I

Technical + (Net) 10.7 11.5 7.2 7.1 6.9 8.2 9.3 8.2 9.1 8.7Hide comp ID 3.4 4.1 1.9 2 2.2 2.7 2.9 2.8 2.7 2.9

Edit online info 3.6 3 2.1 2.1 2.3 2.6 2.5 H 1.8 2.6 J 1.6Social network privacy

3.7 4.3 A 3.1 2.9 2.4 2.9 4 3.6 3.8 4.2

Foundational (Net) 14.5 B 12.1 14.6 D 10.9 14.8 F 12.6 17.6 H 14 16.1 J 13.1Firewall 2.5 2.9 2.6 2.3 2.7 3.2 E 2.8 2.7 2.5 2.6

Anti-virus 2.7 2.8 2.4 2.4 2.7 3.1 E 3.2 3 3 3.3Software updates 2.2 2.8 2.5 2.5 2.3 2.8 E 2.8 3.3 2.7 3.1

Secure wireless 2 2.1 1.4 1.2 2.2 1.9 2.8 2.7 2.4 J 1.6Up-to-date Windows 5.2 B 1.4 5.7 D 2.4 4.9 F 1.6 5.9 H 2.3 5.6 J 2.5

Page 13: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

13

Four Groups Emerge

X axis denotes technical and behavioral safeguards based on MCSI score. Those who exhibit them react to and mitigate risks.

Y axis denotes foundational behaviors based on MCSI score. Those who exhibit them regularly avoid risks.

Page 14: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

Q161. And how often do you perform the following actions?Letters indicate statistical significance at 95% interval.

Protective Steps TakenAt Least Once a Month

• Except for easy-to-finish foundational options, consumers do not complete protective steps regularly

Page 15: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

15

Problems ExperiencedIn Past 6 Months

Q150A. When was the last time you personally experienced any of these privacy, security or safety threats?Letters indicate statistical significance at 95% interval.

• Malicious emails and various infections (virus, spyware, adware) are the most common threats everywhere• Consumers in Group 2 (Turkey, Egypt, China, Malaysia, India, Indonesia) had the most problems, 5.3 on average,

while those in Group 3 (Belgium, Germany, and France) had the fewest, 3.1 on average

Q150A. When was the last time you personally experienced any of these privacy, security or safety threats?Letters indicate statistical significance at 95% interval.

Page 16: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

16

Problems Experienced – YoY Comparison

In Past 12 Months• Among countries surveyed on both 2011 and 2012, consumers report more online threats, compared to last year• Email providers searching for keywords and phishing emails seem notably more common than in 2011• In Brazil and Germany, the overall threat level seems higher as consumers report increases in a variety of different

threats

Q150. (2011) Which of these, if any, have you or people you know experienced in the last 12 months?/ Q150A. (2012) When was the last time you personally experienced any of these privacy, security or safety threats [in past year] ? Letters indicate statistical significance at 95% interval.

Q150. (2011) Which of these, if any, have you or people you know experienced in the last 12 months?/ Q150A. (2012) When was the last time you personally experienced any of these privacy, security or safety threats [in past year] ? Letters indicate statistical significance at 95% interval.

Page 17: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

17

Problem AssessmentSeen as Extremely Harmful

Q151. And thinking about the possible consequences of each of these items, how much of a threat do you perceive them to be?Base: Those who experienced threat in past 6 months .Letters indicate statistical significance at 95% interval.

• Those who take a more active approach to protecting themselves (groups 3 and 4) do so because they perceive the online environment as more threatening, with virus infections and stolen passwords as the biggest perceived threats

• In general, consumers in groups 3 and 4 whose countries tend to have older populations are most concerned about threats

Page 18: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

18

When Protective Steps Are Taken

Q162. Thinking about some of the threats you recently experienced, when did you take actions to address them? Base: Those who experienced threat in past month.

• Consumers are most proactive in countering threats from viruses, bots, adware and malware. Many are also very vigilant in protecting their reputation online.

Q162. Thinking about some of the threats you recently experienced, when did you take actions to address them? Base: Those who experienced threat in past month.

Page 19: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

19

Microsoft Computing Safety IndexDetailed Figures for Index Factors – Groups 1 and 2

Q160. The list below details some of the ways people protect their security, privacy and personal safety from online risks. Which, if any, of these do you do?

Currently Doing Each (Average % Shown)GrandTotal

Japan Spain Korea Russia Turkey Egypt China IndiaIndo

nesiaMalay

sia

Behavioral (Net) 84% 61% 81% 83% 85% 85% 86% 88% 89% 92% 93%Conduct transactions on reputable sites ONLY 47% 25% 38% 45% 49% 55% 44% 43% 34% 57% 44%Create passwords using upper and lower case letters, numbers and/or symbols 45% 28% 39% 50% 56% 41% 39% 43% 36% 44% 46%Educate myself about the latest steps to take to prevent identity theft 38% 30% 32% 31% 26% 36% 52% 41% 46% 57% 55%Use websites with an https connection for highly sensitive transactions (…) 33% 13% 39% 13% 18% 41% 23% 33% 33% 25% 46%Educate myself about the latest steps to take to protect my online reputation 33% 15% 28% 21% 22% 43% 45% 31% 53% 52% 57%Create unique passwords for each account or web site I use 31% 17% 24% 19% 35% 30% 39% 34% 38% 45% 43%Educate myself about the latest steps to take to correct identity theft 30% 19% 29% 24% 23% 32% 35% 36% 45% 50% 44%Technical "+" 75% 50% 73% 69% 83% 70% 73% 77% 73% 80% 84%Take steps to limit amount of personal information available about myself online 39% 9% 31% 38% 47% 29% 27% 31% 37% 39% 44%Change my social networking privacy settings to limit what information I share 35% 10% 33% 22% 52% 35% 31% 28% 36% 46% 44%Installed anti-virus/spyware/malware software on mobile, keep up-to-date 33% 19% 36% 27% 33% 25% 47% 31% 34% 36% 43%Create screen names and/or gamer tags that are not my real name 28% 27% 27% 11% 33% 20% 22% 24% 19% 28% 31%Use phishing & web browser filters 26% 18% 21% 23% 23% 28% 18% 31% 21% 24% 31%Take steps to hide my computer`s identity from the web sites I visit 22% 6% 21% 15% 24% 21% 24% 25% 21% 30% 27%Edit or delete information about me online that might impact my online reputation 21% 7% 20% 16% 18% 21% 26% 24% 24% 26% 29%Use search engines to monitor and manage my personal information online 17% 7% 14% 15% 16% 21% 20% 17% 20% 21% 23%Used a service to edit or delete information about me online or information that might impact my online reputation12% 4% 11% 11% 7% 12% 26% 19% 18% 21% 23%Use a VPN 9% 3% 7% 6% 9% 12% 13% 13% 15% 13% 20%Foundational 90% 91% 85% 85% 90% 86% 86% 88% 87% 78% 88%Use Win7/Vista 62% 72% 63% 38% 53% 60% 47% 36% 54% 46% 63%Installed anti-virus/spyware/malware software (…) and keep it up-to-date 53% 48% 46% 47% 68% 39% 53% 42% 43% 48% 49%Turn on and leave on my computer firewall 44% 40% 39% 54% 29% 35% 42% 52% 29% 35% 33%Run software updates and/or turn on automatic updates 42% 31% 33% 36% 59% 36% 34% 31% 33% 28% 32%Use secured wireless networks 33% 19% 33% 27% 21% 40% 21% 41% 31% 24% 40%None of the above 3% 4% 4% 3% 2% 3% 5% 2% 2% 2% 2%

Group 2 (Hi-Lo)Group1 (Lo-Lo)

Page 20: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

20

Microsoft Computing Safety IndexDetailed Figures for Index Factors – Groups 3 and 4

Q160. The list below details some of the ways people protect their security, privacy and personal safety from online risks. Which, if any, of these do you do?

Currently Doing Each (Average % Shown)GrandTotal

Germany

FranceBel

giumUS

Australia

Canada

UKMexico

BrazilSingapore

Behavioral (Net) 84% 75% 78% 86% 81% 83% 84% 84% 89% 87% 90%Conduct transactions on reputable sites ONLY 47% 41% 50% 57% 48% 55% 54% 53% 56% 52% 48%Create passwords using upper and lower case letters, numbers and/or symbols 45% 45% 38% 45% 49% 53% 53% 54% 52% 47% 52%Educate myself about the latest steps to take to prevent identity theft 38% 20% 17% 23% 42% 41% 40% 40% 27% 47% 50%Use websites with an https connection for highly sensitive transactions (…) 33% 33% 41% 39% 37% 37% 37% 42% 38% 38% 40%Educate myself about the latest steps to take to protect my online reputation 33% 14% 14% 19% 27% 32% 32% 27% 26% 48% 48%Create unique passwords for each account or web site I use 31% 20% 19% 23% 35% 34% 39% 34% 42% 20% 37%Educate myself about the latest steps to take to correct identity theft 30% 14% 12% 17% 32% 31% 30% 31% 26% 34% 37%Technical "+" 75% 66% 74% 79% 75% 77% 78% 78% 80% 80% 86%Take steps to limit amount of personal information available about myself online 39% 31% 37% 47% 47% 48% 49% 48% 41% 45% 48%Change my social networking privacy settings to limit what information I share 35% 25% 25% 31% 34% 43% 41% 36% 44% 40% 52%Installed anti-virus/spyware/malware software on mobile, keep up-to-date 33% 23% 27% 37% 26% 31% 31% 30% 39% 42% 41%Create screen names and/or gamer tags that are not my real name 28% 17% 32% 35% 33% 36% 39% 34% 32% 25% 37%Use phishing & web browser filters 26% 26% 26% 31% 27% 29% 34% 33% 28% 31% 27%Take steps to hide my computer`s identity from the web sites I visit 22% 16% 11% 13% 23% 26% 30% 23% 22% 25% 35%Edit or delete information about me online that might impact my online reputation 21% 14% 12% 15% 19% 23% 19% 18% 29% 31% 32%Use search engines to monitor and manage my personal information online 17% 18% 15% 19% 17% 16% 16% 15% 20% 19% 17%Used a service to edit or delete information about me online or information that might impact my online reputation12% 7% 3% 4% 9% 10% 9% 7% 13% 15% 18%Use a VPN 9% 5% 4% 6% 8% 8% 6% 5% 7% 7% 15%Foundational 90% 91% 92% 95% 93% 94% 95% 94% 88% 90% 95%Use Win7/Vista 62% 62% 73% 74% 71% 74% 65% 75% 65% 66% 69%Installed anti-virus/spyware/malware software (…) and keep it up-to-date 53% 56% 50% 53% 62% 65% 61% 66% 51% 55% 57%Turn on and leave on my computer firewall 44% 51% 49% 56% 47% 51% 55% 54% 37% 47% 48%Run software updates and/or turn on automatic updates 42% 43% 47% 56% 51% 57% 56% 53% 39% 42% 46%Use secured wireless networks 33% 33% 21% 38% 36% 40% 35% 42% 40% 30% 50%None of the above 3% 4% 3% 2% 3% 3% 2% 2% 1% 3% 0%

Group 4 (Hi-Hi)Group 3 (Lo-Hi)

Page 21: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

21

Microsoft Mobile Safety IndexGlobal Benchmark among Mobile Device Owners

Apps from trusted sources

2

Care in handling1

Social savvy10

Avoid dubious links

2

Avoid open Wi-Fi2

Location capabilities

10

Behavioral 12 points

Technical “+”15 points

Foundational 13 points

Use PIN on device3

Anti-virus6

Software Updates

4

Pro

activ

e in

volv

em

en

t in p

rote

ctin

g

self o

n m

ob

ile d

evic

e

20-Country Average: 2012 MMSI – 40 points

Q165. This second list details some of the ways people protect their security, privacy and personal safety from online risks while on a mobile device. Which, if any, of these, do you do?

Page 22: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

22

Microsoft Mobile Safety IndexCountry Benchmarks

Q165. This second list details some of the ways people protect their security, privacy and personal safety from online risks while on a mobile device. Which, if any, of these do you do? Base: Own smartphone or tablet.

Higher than average Lower than average

• Consistent with the theme from the main computer index, consumers in Korea and Japan are also less vigilant about mobile security while those Indonesia, Mexico and Brazil are much more proactive

  Grand Total

Japan Korea Spain Russia China Egypt IndiaMalaysi

aTurkey Indonesi

aGerma

nyFrance

Belgium

United Kingdo

m

United States

Australia

Canada Singapore Brazil Mexico

    Group 1 (Lo-Lo) Group 2 (Hi-Lo) Group 3 (Lo-Hi) Group 4 (Hi-Hi)

Responses 4783 183 386 294 217 391 93 225 279 209 257 188 193 118 262 195 230 166 404 215 278

MMSI Total 39.6 22 30.3 32.1 43.2 35.7 38.7 44.1 44.1 44.9 48.7 34.1 37.3 44.6 35.3 39.4 41.8 42.5 43.4 45.3 48.1

Behavioral (Net) 12.4 7.4 9.4 9.5 15.6 9.4 9.4 12.6 12.9 14.9 15.7 10.4 12.1 14.7 12.3 12.5 13 14 13 14.9 17.1

Social Savvy 9.5 6.2 7.2 7.4 12.4 6.3 6.6 9.4 9.6 11.5 12.4 8.2 9.4 11.5 9.3 9.5 10 10.6 9.7 11 13.4

Care in Handling 1.3 0.5 1 0.9 1.2 1.3 1 1.4 1.7 1.5 1.5 1.1 0.8 1.2 1.3 1.3 1.4 1.5 1.3 1.7 1.5

Avoid Dubious Links 1.7 0.8 1.2 1.2 2 1.7 1.8 1.8 1.7 1.9 1.7 1.1 2 2 1.8 1.8 1.7 1.9 1.9 2.1 2.2

Technical + (Net) 14.5 7.8 10 11.6 12.2 13.6 14 17.2 15.4 16.4 19 10.7 13.3 16.8 13.6 15.4 17.5 16 17.4 15.8 16.4

Location Capabilities 10.1 5.7 7 8 7.9 9.2 9 12.2 10.7 10.7 13.4 7 9.6 12.4 9.6 11.1 13 11.3 12.3 11 11.4

Avoid Open Wi-Fi 2.1 0.7 1.2 1.8 1.8 2.2 2.4 2.3 2.6 2.9 2.8 1.9 1.7 2 1.8 2.1 2.3 2.4 2.4 2.5 2.4

Trusted Apps 2.3 1.4 1.8 1.9 2.5 2.1 2.6 2.7 2.1 2.8 2.7 1.8 2 2.4 2.2 2.2 2.2 2.3 2.6 2.4 2.6

Foundational (Net) 12.7 6.8 10.9 11 15.5 12.7 15.3 14.3 15.8 13.6 14 12.9 11.9 13.1 9.4 11.5 11.3 12.5 13.1 14.6 14.7

Anti-virus 6 3.6 6 5.1 7.9 7.1 8.5 6.3 8.3 6.2 7.1 6.3 4.1 5.1 3.2 4.8 4.5 5.1 4.9 8.4 7.5

Software Updates 3.9 2 3 2.8 5.2 3.7 3.9 4.3 3.9 4.1 3.7 3.5 4.4 4.9 3.6 4.4 4.3 4.5 4.5 3.9 4.1

Use PIN on device 2.8 1.3 1.9 3 2.4 2 2.9 3.7 3.6 3.3 3.2 3.2 3.4 3.2 2.6 2.3 2.5 2.9 3.6 2.3 3

Page 23: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

23

Protective Mobile Steps TakenAt Least Once a Month

Q166. And how often do you perform the following actions to protect yourself while on a mobile device? Base: Own smartphone or tablet.Letters indicate statistical significance at 95% interval.

• If a step needs to be taken repeatedly, consumers are at least as likely to do so on their mobile device as they are on a regular computer. This is likely driven by the more constant engagement consumers have with mobile devices, compared to more traditional computers.

Page 24: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

24

Microsoft Mobile Safety IndexDetailed Figures for Index Factors – Groups 1 and 2

Q165 This second list details some of the ways people protect their security, privacy and personal safety from online risks while on a mobile device. Which, if any, of these do you do?

% Currently Doing Each (Average % shown)Grand Total

Japan Korea Russia Spain China Egypt India Malaysia Turkey Indonesia

    Group 1 (Lo-Lo) Group 2 (Hi-Lo)

Behavioral

Selective about who you text 34% 21% 25% 52% 19% 25% 28% 31% 40% 38% 49%

Selective about who you give your number to 44% 39% 35% 61% 42% 22% 32% 40% 46% 49% 57%Selective about what you text (information, comments, pictures, etc.) 32% 15% 25% 53% 31% 29% 30% 32% 35% 40% 53%

Care in handling device 25% 8% 22% 25% 20% 34% 28% 27% 39% 29% 36%

Avoid dubious links 41% 18% 31% 57% 31% 47% 41% 50% 44% 43% 42%

Technical "+"

Turn location tracking on/off 21% 8% 22% 13% 17% 27% 18% 27% 31% 15% 26%

Selective in sharing location 29% 13% 16% 26% 30% 30% 27% 34% 29% 36% 43%

Selecting allowing apps to access location 28% 13% 21% 30% 29% 29% 26% 33% 31% 26% 49%

Reviewing location/privacy in social sites 25% 12% 22% 18% 21% 29% 32% 27% 39% 40% 41%

Avoid Open Wi-Fi 28% 7% 19% 24% 26% 35% 32% 32% 39% 36% 45%

Apps from Trusted Sources 36% 20% 35% 46% 35% 42% 47% 44% 40% 44% 52%

Foundational

Anti-virus - Maintain up-to-date 37% 13% 40% 57% 34% 48% 58% 39% 59% 38% 49%

Software Updates 28% 12% 26% 36% 23% 33% 35% 34% 33% 28% 32%

Using PIN on device 34% 13% 26% 30% 38% 27% 37% 44% 54% 38% 47%

None of these 17% 31% 10% 8% 13% 5% 12% 10% 3% 12% 3%

Page 25: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

25

Microsoft Mobile Safety IndexDetailed Figures for Index Factors – Groups 3 and 4

Q165 This second list details some of the ways people protect their security, privacy and personal safety from online risks while on a mobile device. Which, if any, of these do you do?

 % Doing Each (Average % shown)Germany France Belgium UK US Australia Canada Singapore Brazil Mexico

Group 3 (Lo-Hi) Group 4 (Hi-Hi)

Behavioral                    

Selective about who you text 26% 33% 39% 29% 25% 33% 26% 36% 40% 61%

Selective about who you give your number to 34% 44% 47% 44% 37% 45% 36% 53% 51% 57%

Selective about what you text (information, comments, pictures, etc.) 15% 26% 32% 24% 27% 32% 28% 35% 39% 47%

Care in handling device 18% 13% 18% 23% 19% 27% 20% 33% 34% 34%

Avoid dubious links 23% 46% 43% 36% 34% 38% 33% 50% 53% 54%

Technical "+"                    

Turn location tracking on/off 15% 15% 18% 18% 19% 29% 16% 39% 20% 26%

Selective in sharing location 14% 19% 25% 27% 28% 35% 24% 41% 42% 40%

Selecting allowing apps to access location 9% 22% 32% 26% 24% 32% 23% 41% 34% 30%

Reviewing location/privacy in social sites 9% 18% 25% 16% 19% 25% 19% 29% 30% 41%

Avoid Open Wi-Fi 18% 19% 22% 22% 22% 28% 22% 39% 39% 36%

Apps from Trusted Sources 21% 24% 30% 29% 26% 30% 26% 50% 39% 43%

Foundational                    

Anti-virus - Maintain up-to-date 28% 21% 27% 19% 20% 23% 23% 34% 59% 50%

Software Updates 18% 23% 27% 23% 24% 30% 24% 41% 31% 32%

Using PIN on device 28% 39% 37% 29% 21% 30% 27% 52% 25% 36%

None of these 38% 19% 23% 32% 37% 28% 39% 9% 9% 7%

Page 26: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

26

Comparing the Two Indices2012 Computer Security Index (MCSI) vs. Mobile Security Index (MMSI)

• Overall, the mobile index returns higher scores than the computer index, mostly driven by the Technical “+” category• “Location capabilities” is the strongest factor in the category. It includes turning location tracking on and off, being selective about

sharing your location with people and organizations, which apps to trust with your location information, and reviewing location, and privacy settings in your social media accounts.

• Social savvy, part of the Behavioral category, also lifts the MMSI. Social savvy includes being selective about what you text, who you text, and who you give your number to.

2012 Microsoft Computer Security Index (MCSI)

2012 Microsoft Mobile Security Index (MMSI)

Total 34 points 40 points

Behavioral 11 points 12 points

Strong passwords – 3,Choosing reputable sites, https – 3,

Educate self about identity theft, reputation – 5

Social savvy – 10,Care in handling – 1,

Avoid dubious links – 2

Technical “+” 9 points 15 points

Hide computer ID/ in-private browse, edit info – 3,

Use service to edit online info, manage info – 3,Social network privacy settings, limit info – 3

Location capabilities – 10,Avoid open Wi-Fi – 2,

Apps from trusted sources – 2

Foundational 14 points 13 points

Firewall (turn it on, leave it on) – 2, Anti-virus (maintain up-to-date) – 3,Updates (auto or regular manual) – 2

Secure wireless networks – 2,Up-to-date genuine Windows 7 or Vista – 5

Anti-virus – 6,Software updates – 4,Use PIN on device – 3

Q160. The list below details some of the ways people protect their security, privacy and personal safety from online risks. Which, if any, of these do you do? [MCSI Index Points]. Q165. This second list details some of the ways people protect their security, privacy and personal safety from online risks while on a mobile device. Which, if any, of these, do you do? [MMSI Index Points].

Page 27: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

27

Trusted EntitiesCompanies/Organizations that Can Protect Online Security

Q131. Here is a list of organizations and websites. How much of the time do you think you can trust them to protect your personal information online?Letters indicate statistical significance at 95% interval.

• Banking and government are considered most trustworthy when it comes to protecting personal information online

• Consumers in Group 2 (Turkey, Egypt, China, Malaysia, India, and Indonesia) tend to put more trust in social networking and online gaming sites than consumers elsewhere

Page 28: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

28

Source of Online Security

Q60A. Who do you feel is primarily responsible for protecting the online security, privacy and safety of your personal information online? Letters indicate statistical significance at 95% interval.

• Consumers realize they need to be self-reliant when it comes to ensuring their security online• Such awareness is highest in Group 4 which includes the countries where consumers are most proactive in online

security matters

Page 29: 3 Methodology Microsoft Computing Safety Index Measure of 22 individual protective behaviors Multivariate analysis grounded in factor analysis Groups.

© 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.


Recommended