+ All Categories
Home > Technology > The public and cybersecurity practices and knowledge

The public and cybersecurity practices and knowledge

Date post: 21-Jan-2018
Category:
Upload: pew-research-centers-internet-american-life-project
View: 1,968 times
Download: 0 times
Share this document with a friend
13
The public and cybersecurity practices and knowledge Lee Rainie - @lrainie Director Internet, Science, and Technology Research Cybersecurity Alliance - May 5, 2017
Transcript
Page 1: The public and cybersecurity practices and knowledge

The public and cybersecurity practices and knowledge

Lee Rainie - @lrainie

Director Internet, Science, and Technology Research

Cybersecurity Alliance - May 5, 2017

Page 3: The public and cybersecurity practices and knowledge

A big problem

41

35

16

15

14

13

6

64

Noticed fraudulent charges on their credit card

Received a notice that personal information had been

compromised

Had their social media account taken over without

permission

Had their email account taken over without permission

Received notice their social security number was compromised

Had a loan or line of credit taken out in their name

Had a tax refund taken out in their name

Any of these

Page 4: The public and cybersecurity practices and knowledge

How confident these entities can protect your data?

Page 5: The public and cybersecurity practices and knowledge

How people keep track of their passwords

Page 6: The public and cybersecurity practices and knowledge

Not best practices

• 41% of online adults have shared the password to one of their online accounts with a friend or family member.

• 39% say that they use the same (or very similar) passwords for many of their online accounts.

• 25% admit that they often use passwords that are less secure than they’d like, because simpler passwords are easier to remember than more complex ones.

• 28% of smartphone owners do not use screen locks

• 54% use public Wi-Fi networks for sensitive activities like e-commerce and banking

Page 7: The public and cybersecurity practices and knowledge

Will cyberattacks happen in the next 5 years?

Page 8: The public and cybersecurity practices and knowledge

Knowledge – Tier 1

Page 9: The public and cybersecurity practices and knowledge

Knowledge – Tier 2

Incorrect Correct Not sure

Page 10: The public and cybersecurity practices and knowledge

Knowledge – Tier 3

Incorrect Correct Not sure

Page 11: The public and cybersecurity practices and knowledge

Knowledge – Tier 4

Incorrect Correct Not sure

Page 12: The public and cybersecurity practices and knowledge

Demographics

• Broad differences in knowledge by educational

attainment, especially concerning gap between

those who ended education at high school and those

who have college+ degrees

• Modest differences in knowledge by age• Private browsing

• GPS function

• Multi-factor authentication

• Botnet

• Public Wi-Fi not always safe

Page 13: The public and cybersecurity practices and knowledge

Amen!


Recommended