Survey Indicates Bad Cyber Security and Weak Password Practices

Almost all Americans are confident regarding their understanding of cybersecurity as per the latest AT&T study of 2,000 People in America. Nevertheless, bad cyber hygiene and poor password strategies remain a usual thing. OnePoll performed the survey for AT&T and uncovered that 70% of respondents thought they were educated concerning cybersecurity with 69% expressing they were certain in their capacity to recognize suspicious sites easily, nonetheless the normal person still gets on a suspicious website or social media profile 6.5 times a day.

When inquired regarding Internet usage, just 39% of participants stated they knew that internet sites could pass on malware to their computers and merely 45% stated they knew that suspicious websites can cause identity theft. 54% didn’t know the distinction between an active threat – one that necessitates some user action – and an inactive threat – where a gadget is compromised with no any activity from the user.

In spite of thinking they can distinguish suspicious sites, for instance, unverified internet sites, HTTP sites, and websites with lots of pop-ups, the probable security threats from accessing those internet sites were usually disregarded. 38% of survey participants claimed they stop by those websites for streaming sports activities, 37% make use of the internet sites to download song tracks and games that are difficult to obtain, and 36% mentioned they would go to those websites if they give special discounts on buys.

The risks caused by bad cybersecurity practices aren’t only theoretical. Bad cyber hygiene is used by threat actors and usually makes it possible for them to compromise accounts. Whenever questioned concerning threat situations, 45% of respondents mentioned they had gotten a call from a person professing to be from the government and 36% of participants stated they would answer a message if it seemed to have come from an official firm.

Below 40% of men and women consider the security problems of getting access to the Net like potential device or network infiltrations, malicious programs, or malware downloads. The number of participants impacted by password security risks is alarming. One of the major password security flaws is making use of the same password on several accounts. In case of a data breach at one organization wherein passwords are acquired, a credential stuffing attack can be carried out that would enable access to other accounts where that password is employed. 42% of survey respondents claimed they reuse passwords in various accounts.

The best procedure for making passwords is to employ a combo of numbers, lower and upper-case letters, and symbols, and to not use personal data in passwords. 31% of participants said they make use of their birthday as their security password, although many people can know the details and even discover it on social media pages. The survey furthermore showed that 34% of persons are reactive instead of proactive regarding password security, and could simply alter a password when they get a security notification regarding an attempt to view their account coming from an unknown IP address. These bad password practices remain even if a lot of people state they understand cybersecurity, and password managers are commonly accessible for free or at a cheap cost that can considerably strengthen password security.

These bad cyber practices must be an issue for businesses. When people are lax concerning personal security even with knowing the dangers of identity theft and fraud, it is possible that those poor practices could at the same time take place on the job. Employers ought to make certain they give regular security awareness training to make clear to their staff how taking risks including these could put the business in jeopardy.

About Christine Garcia 1192 Articles
Christine Garcia is the staff writer on Calculated HIPAA. Christine has several years experience in writing about healthcare sector issues with a focus on the compliance and cybersecurity issues. Christine has developed in-depth knowledge of HIPAA regulations. You can contact Christine at [email protected]. You can follow Christine on Twitter at https://twitter.com/ChrisCalHIPAA