{"id":111570,"date":"2019-11-16T11:41:43","date_gmt":"2019-11-16T16:41:43","guid":{"rendered":"http:\/\/rbach.net\/index.php\/"},"modified":"2021-08-19T14:39:02","modified_gmt":"2021-08-19T18:39:02","slug":"why-dont-users-protect-themselves","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/why-dont-users-protect-themselves\/","title":{"rendered":"Why Don&#8217;t Users Protect Themselves"},"content":{"rendered":"<p><a href=\"https:\/\/www.imdb.com\/title\/tt0054215\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-111584\" title=\"Why Don't Users Protect Themselves\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyber_hygine.png?resize=164%2C110&#038;ssl=1\" alt=\"Why Don't Users Protect Themselves\" width=\"164\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyber_hygine.png?resize=150%2C101&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyber_hygine.png?resize=1024%2C688&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyber_hygine.png?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyber_hygine.png?resize=768%2C516&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyber_hygine.png?resize=1536%2C1032&amp;ssl=1 1536w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyber_hygine.png?resize=2048%2C1376&amp;ssl=1 2048w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyber_hygine.png?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyber_hygine.png?w=1440&amp;ssl=1 1440w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/><\/a>A new report (PDF) from <a href=\"https:\/\/www.zdnet.com\/article\/carbonite-buys-webroot-for-618-million\/\" target=\"_blank\" rel=\"noopener noreferrer\">recently swallowed<\/a> and <a href=\"https:\/\/web.archive.org\/web\/20221207193319\/https:\/\/www.channele2e.com\/investors\/mergers-acquisitions\/carbonite-webroot-acquired-by-opentext\/\" target=\"_blank\" rel=\"noopener noreferrer\">swallowed again<\/a> <a href=\"https:\/\/www.webroot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Webroot<\/a>, says that American technology users <strong>overestimate their levels of cyber hygiene<\/strong>. Cyber hygiene is a <strong>cybersecurity risk mitigation<\/strong> technique introduced by <a href=\"https:\/\/internethalloffame.org\/inductees\/vint-cerf\" target=\"_blank\" rel=\"noopener noreferrer\">Vinton Cerf<\/a> <a href=\"https:\/\/www.jec.senate.gov\/archive\/Documents\/Hearings\/cerf22300.htm\" target=\"_blank\" rel=\"noopener noreferrer\">in 2000<\/a> where you train yourself to think proactively about your cybersecurity. The goal is to resist cyber threats and online security issues to protect and maintain IT systems and devices and implement cybersecurity best practices, just as you do with your daily personal hygiene.<\/p>\n<p><a href=\"https:\/\/www.webroot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-111583 size-thumbnail\" title=\"Webroot logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/webroot_logo.png?resize=75%2C75&#038;ssl=1\" alt=\"Webroot logo\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/webroot_logo.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/webroot_logo.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/webroot_logo.png?w=500&amp;ssl=1 500w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>The report says U.S. users do not know how to protect themselves from cyber threats. Americans are <strong>overconfident in the perceived protection they have<\/strong>. The endpoint security and threat intelligence provider found that 88% of interviewed Americans believe they are taking the appropriate steps to protect themselves from cyber-attacks.<\/p>\n<p><strong>Their confidence is misplaced<\/strong>. Instead, Americans have only a surface-level understanding of the most common types of cyber threats according to Webroot. We can recognize some of the names of the most common cyber-attacks such as malware (79%) or phishing (70%), but for most, that\u2019s where their knowledge ends. Very few (less than 1 in 3) actually know what these common cyber-attacks are or what they do.<\/p>\n<p>While Americans claim to have heard of some of the most common cyber-attack terms when prompted, <strong>very few actually understand what those cyber-attacks are<\/strong>. When asked about critical cyber-hygiene issues like malware, backups passwords, and identity theft <strong>surveyed Americans reported<\/strong>:<\/p>\n<p><strong><a href=\"https:\/\/web.archive.org\/web\/20180108082814\/https:\/\/www.yellowpages.ca\/bus\/Ontario\/Innisfil\/Marty-s-Computer-Repair-Services\/100387772.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-111585 size-thumbnail\" title=\"20% update their AV software regularly\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-28.jpg?resize=75%2C75&#038;ssl=1\" alt=\"20% update their AV software regularly\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-28.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-28.jpg?w=116&amp;ssl=1 116w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>Malware<\/strong> &#8211; 79% have heard of malware, but only 28% can confidently explain what it is. 82% are using some sort of AV software on their personal devices. 62% of those who use AV software use a free product. <strong>Only 20% update their AV software<\/strong> each time they are prompted.<\/p>\n<p><strong>Backups &#8211;<\/strong> are another weakness. 78% of respondents report backing up their data. However, 57% are still leaving themselves susceptible to risk by only backing up using one method, rather than backing up online (cloud) and offline.<\/p>\n<ul>\n<li><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-111590\" title=\"22% rarely or never backup their data.\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/PC_lifesaver.jpg?resize=95%2C95&#038;ssl=1\" alt=\"22% rarely or never backup their data.\" width=\"95\" height=\"95\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/PC_lifesaver.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/PC_lifesaver.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/PC_lifesaver.jpg?w=600&amp;ssl=1 600w\" sizes=\"auto, (max-width: 95px) 100vw, 95px\" \/>34% Automatically backup to the cloud<\/li>\n<li>27% Backup to an external hard drive<\/li>\n<li>24% Backup to a USB stick<\/li>\n<li>22$ backup locally on My Computer<\/li>\n<li>17% backup manually to the cloud<\/li>\n<li><strong>22% rarely or never back up their data<\/strong>.<\/li>\n<\/ul>\n<p>Among those who are backing up their information by uploading it to the cloud, only 43% are taking the extra step in ensuring that it\u2019s stored in an encrypted format.<\/p>\n<p><strong><a href=\"https:\/\/fractionalciso.com\/does-your-organization-need-a-password-manager\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-111593\" title=\"33% of Americans admit to sharing their passwords\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/passwords-3.jpg?resize=127%2C90&#038;ssl=1\" alt=\"33% of Americans admit to sharing their passwords\" width=\"127\" height=\"90\" \/><\/a>Passwords<\/strong> &#8211; Followers of <a href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> know that passwords suck and the Webroot report confirms it. <strong>33% of Americans admit to sharing their passwords with others<\/strong>. To make matters worse, 63% are reusing passwords across multiple accounts. The research found that Americans have on average 9 passwords for 17 accounts.<\/p>\n<p><strong>Mobile<\/strong> &#8211; While on the go, 67% of Americans use public Wi-Fi, but <strong>only 35%<\/strong> take the extra step to protect themselves by <strong>using a VPN. <\/strong>Additionally,<strong> 34% use a work device as <\/strong>their primary <strong>personal device at home.<br \/>\n<\/strong><\/p>\n<p><strong>Identity theft<\/strong> 74% of Americans believe their identity stolen has never been stolen.<\/p>\n<p>According to the Webroot whitepaper, the 5 most cyber risky U.S. states are:<\/p>\n<ol>\n<li><a href=\"https:\/\/www.britannica.com\/place\/Mississippi-state\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-111595 size-medium\" title=\"Mississippi most cyber risky state\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mississippi-e1573869527645-150x95.jpg?resize=150%2C95&#038;ssl=1\" alt=\"Mississippi most cyber risky state\" width=\"150\" height=\"95\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mississippi-e1573869527645.jpg?resize=150%2C95&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mississippi-e1573869527645.jpg?resize=75%2C47&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mississippi-e1573869527645.jpg?resize=768%2C486&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mississippi-e1573869527645.jpg?w=820&amp;ssl=1 820w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>Mississippi<\/li>\n<li>Louisiana<\/li>\n<li>California<\/li>\n<li>Alaska<\/li>\n<li>Connecticut<\/li>\n<\/ol>\n<p>The 5 least risky U.S. states are<\/p>\n<ol>\n<li><a href=\"https:\/\/web.archive.org\/web\/20220708224949\/https:\/\/www.lonelyplanet.com\/usa\/new-england\/new-hampshire\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-111596 size-medium\" title=\"New Hampshire least cyber risky state\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/new-hampshire-map-e1573869911140-150x98.jpg?resize=150%2C98&#038;ssl=1\" alt=\"New Hampshire least cyber risky state\" width=\"150\" height=\"98\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/new-hampshire-map-e1573869911140.jpg?resize=150%2C98&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/new-hampshire-map-e1573869911140.jpg?resize=75%2C49&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/new-hampshire-map-e1573869911140.jpg?resize=768%2C501&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/new-hampshire-map-e1573869911140.jpg?w=778&amp;ssl=1 778w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>New Hampshire<\/li>\n<li>North Dakota<\/li>\n<li>Ohio<\/li>\n<li>Idaho<\/li>\n<li>Kentucky<\/li>\n<\/ol>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>According to the research conducted by <a href=\"https:\/\/www.wakefieldresearch.com\" target=\"_blank\" rel=\"noopener noreferrer\">Wakefield<\/a> for Webroot, <strong>Michigan ranked 31<\/strong> among the 50 states. Overall, the average home user scored a 60% for cyber-hygiene. The researchers also found that those who they classified as &#8220;Superstars&#8221; tended to be:<\/em><\/p>\n<ul>\n<li><em>A Boomer<\/em><\/li>\n<li><em>Married or in a relationship<\/em><\/li>\n<li><em>Suburbanite<\/em><\/li>\n<li><em>Not a parent.<\/em><\/li>\n<\/ul>\n<p><em><strong>Related article<\/strong><\/em><\/p>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20190620212234\/https:\/\/www.theoaklandpress.com\/news\/local\/over-michiganders-lost-million-as-victims-of-cyber-crimes-in\/article_7c107d26-92ac-11e9-ae6c-df9775f49abc.html\" target=\"_blank\" rel=\"noopener noreferrer\">Over 7,500 Michiganders lost $81 million as victims of cyber crimes in 2018<\/a> (<a href=\"https:\/\/www.theoaklandpress.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Oakland Press<\/a>)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Webroot says tech users are overconfident in their online security many don&#8217;t update their AV software backup data 33% share passwords with others<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3161,565,1821,3381,3259,209,612,4,3380,2448,1063],"class_list":["post-111570","post","type-post","status-publish","format-standard","hentry","category-security","tag-3161","tag-anti-virus","tag-backup","tag-cyber-hygiene","tag-mergers-and-acquisition","tag-password","tag-phishing","tag-security","tag-vinton-cerf","tag-vpn","tag-webroot"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/111570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=111570"}],"version-history":[{"count":15,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/111570\/revisions"}],"predecessor-version":[{"id":130972,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/111570\/revisions\/130972"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=111570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=111570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=111570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}