The Key to Battling Cyber-Crime Begins With Users

Samuel Greengard Avatar

Updated on:

The Key to Battling Cyber-Crime Begins With Users

The Key to Battling Cyber-Crime Begins With UsersThe Key to Battling Cyber-Crime Begins With Users

Businesses must do a better job of educating consumers and employees about proper cyber-security precautions as a first line of defense against cyber-criminals.

Insecurities RuleInsecurities Rule

84% of surveyed Americans believe their personal information is more vulnerable than it was a year ago.

Out of ControlOut of Control

69% of those surveyed Americans think having their personal information stolen in their lifetime is inevitable.

No ControlsNo Controls

70% have not installed security software on their smartphone or tablet, 62% have not strengthened their Wi-Fi password, and 51% do not change passwords frequently.

No PlansNo Plans

89% feel that dealing with a theft or loss of their personal information would be more difficult to deal with than doing their taxes. 61% of Americans lack a response plan for a data breach.

Private MattersPrivate Matters

38% have a “private folder” on their PC or mobile device that they wouldn’t want anyone else to see. Among Millennials, the figure is 57%.

Working DangersWorking Dangers

88% of employed Americans use work devices without trusted company security software.

A Matter of TrustA Matter of Trust

88% of Americans believe that companies often say their data is more secure than it actually is. More than 1 in 3 people feel that companies spend more on a social media strategy than on a data protection strategy.

Socially SecureSocially Secure

70% think it would be riskier to trust a company with their Social Security number than to carry their social security card in a wallet.

Risky BusinessRisky Business

84% do not frequently dispose of work information that is no longer needed by deleting and shredding documents.

Key TakeawaysKey Takeaways

Educate customers and employees about risks and appropriate actions. Use encryption, virtualization and enterprise mobility management to reduce risks. Develop a deeper understanding of employee needs and behaviors in order to build a better security framework.

Final ThoughtsFinal Thoughts

“The public is aware of increasing security threats but people do not fully understand the risks and what to do if data is compromised.”—Alicia Rey, Citrix Security Solutions

Samuel Greengard Avatar