{"id":84554,"date":"2017-06-29T17:54:00","date_gmt":"2017-06-29T21:54:00","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-08-14T15:31:12","modified_gmt":"2021-08-14T19:31:12","slug":"dont-know-much-security","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/dont-know-much-security\/","title":{"rendered":"Don\u2019t Know Much Security"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-115511\" title=\"Don\u2019t Know Much Security\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Woman_confused1.jpg?resize=125%2C83&#038;ssl=1\" alt=\"Don\u2019t Know Much Security\" width=\"125\" height=\"83\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Woman_confused1.jpg?resize=150%2C100&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Woman_confused1.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Woman_confused1.jpg?w=301&amp;ssl=1 301w\" sizes=\"auto, (max-width: 125px) 100vw, 125px\" \/>With apologies to <a href=\"https:\/\/www.google.com\/#newwindow=1&amp;q=otis+redding+wonderful+world&amp;stick=H4sIAAAAAAAAAONgFuLRT9c3LDYwLY-vrMpTAvMKTbOqkirK0rW0spOt9HNLizOT9YtSk_OLUjLz0uOTc0qLS1KLrPJLMlKLFMpSi4oz8_OKAeiNu91KAAAA\" target=\"_blank\" rel=\"noopener noreferrer\">Otis Redding<\/a>, <strong>Americans don\u2019t know much about security<\/strong>. They don&#8217;t know much privacy or the SPAM they took. A new <a href=\"http:\/\/www.pewinternet.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pew Research Center<\/a> survey, &#8220;<a href=\"http:\/\/www.pewinternet.org\/2017\/03\/22\/what-the-public-knows-about-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">What the Public Knows About Cybersecurity<\/a>&#8221; quizzed 1,055 adults about their understanding of concepts important to online safety and privacy. The results of the Pew survey are unsettling.<\/p>\n<p><a href=\"https:\/\/drchromo.wordpress.com\/2014\/03\/29\/to-ask-or-not-to-ask-what-is-the-question\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"questions about cybersecurity\" src=\"https:\/\/drchromo.files.wordpress.com\/2014\/03\/q3.jpg?resize=126%2C83\" alt=\"questions about cybersecurity\" width=\"126\" height=\"83\" \/><\/a>The <a href=\"http:\/\/www.pewinternet.org\/quiz\/cybersecurity-knowledge\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pew Research survey<\/a> asked 13 questions about cybersecurity. The median score was five correct answers. <strong>Just 20% answered eight questions correctly<\/strong>. A relatively large percentage of respondents answered &#8220;not sure&#8221; to questions rather than providing the wrong answer.<\/p>\n<p>Most Americans don&#8217;t know how to protect themselves. Only <strong>10% were able to identify<\/strong> one example of <a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/what-will-replace-your-password\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>multi-factor authentication<\/strong><\/a> when presented with four images of online log-in screens.<\/p>\n<p>Most Americans still unknowingly allow themselves to be tracked across the web. <strong>61% of those surveyed were not aware that Internet Service Providers can still see the websites<\/strong> their customer visit even when they&#8217;re using &#8220;private browsing&#8221; on their search engines.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20161001085909\/http:\/\/www.skillspire.net:80\/courses\/internet-security\/\"><\/a>A slight majority <strong>(52%) of people<\/strong> recognized that just turning off the <strong>GPS function<\/strong> on smartphones does not prevent all tracking of the phone&#8217;s location. <strong>Mobile phones can be tracked<\/strong> via cell towers or Wi-Fi networks.<\/p>\n<p>Only 54% of respondents <strong>correctly identified a phishing attack<\/strong>. For cybercriminals, phishing remains a favorite trick for infecting computers with malware. Phishing schemes usually involve an email that directs users to click on a link to an infected website.<\/p>\n<p><a href=\"https:\/\/thegreenlanterns.wordpress.com\/2016\/03\/14\/how-to-stay-safe-from-second-life-phishing-scams\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"phishing attack\" src=\"https:\/\/thegreenlanterns.files.wordpress.com\/2014\/12\/phishing.jpg?resize=132%2C85\" alt=\"phishing attack\" width=\"132\" height=\"85\" \/><\/a>Computer security software does a good job of blocking most phishing schemes, Stephen Cobb, security researcher for anti-virus software firm <a href=\"https:\/\/www.eset.com\/us\/\" target=\"_blank\" rel=\"noopener noreferrer\">ESET<\/a> <a href=\"https:\/\/phys.org\/news\/2017-04-survey-americans-shallow-cybersecurity.html\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <a href=\"https:\/\/phys.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Phys.org<\/em><\/a>, including many advanced <strong>spear-phishing attacks<\/strong> targeting people with personalized information.<\/p>\n<p>Retired Rear Adm. Ken Slaght, head of the <a href=\"https:\/\/sdccoe.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">San Diego Cyber Center of Excellence<\/a>, a trade group for the region&#8217;s cybersecurity industry told <a href=\"https:\/\/www.knowbe4.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>KnowB4<\/em><\/a>.<\/p>\n<p style=\"padding-left: 30px;\"><em>It is probably our No. 1 concern and No. 1 vulnerability &#8230; These attackers keep upping their game. It has gone well beyond the jumbled, everything misspelled email.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.pindigit.com\/a-review-of-bitdefender-internet-security-2013\/\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a>2\/3&#8217;s<\/strong> of Americans tested, <strong>could not identify<\/strong> what the\u00a0what the &#8216;s&#8217; in &#8216;<strong>https<\/strong>&#8216; meant.\u00a0The article explains that the &#8216;s&#8217; stands for secure, with website <strong>authentication<\/strong> and <strong>encryption<\/strong> of digital traffic. It is used mostly for online payments. Security researchers often suggest computer users <strong>check the website addresses &#8211; known as the URL &#8211; as a first step before they click on a link.<\/strong> ESET&#8217;s Cobb said,\u00a0&#8220;<em>You wonder if people know what a URL is &#8230; Do they know how to read a URL? So there is plenty of work to be done<\/em>.&#8221;<\/p>\n<p>In the most puzzling finding to me,\u00a075% of participants identified the most secure password from a list of four options. And yet followers of <a href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Bach Seat<\/em><\/a> know that <a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/password-insecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">year<\/a> <a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/25-most-used-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">after<\/a> <a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/2015s-worst-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">year<\/a>\u00a0<strong>passwords suck<\/strong>. Could it be that Americans just don&#8217;t care about online security?<\/p>\n<p><a href=\"https:\/\/medicinaonline.co\/2016\/12\/30\/un-semplice-test-per-misurare-i-tuoi-livelli-di-autostima\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-114204\" title=\"\u201csecurity awareness\u201d 1s a top priority\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spite-e1598747110921-150x87.jpg?resize=120%2C69&#038;ssl=1\" alt=\"\" width=\"120\" height=\"69\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spite-e1598747110921.jpg?resize=150%2C87&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spite-e1598747110921.jpg?resize=75%2C43&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spite-e1598747110921.jpg?w=579&amp;ssl=1 579w\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" \/><\/a>Fortunately, some Americans also recognize that public Wi-Fi hotspots aren&#8217;t necessarily safe for online banking or e-commerce. The mixed security results highlight that staying secure online is not a priority for Americans at work or at home.<\/p>\n<p>The <a href=\"https:\/\/www.wsj.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Wall Street Journal<\/em><\/a> also <a href=\"https:\/\/blogs.wsj.com\/cio\/2017\/04\/03\/employees-weak-link-in-cybersecurity-efforts-analysts\/\" target=\"_blank\" rel=\"noopener noreferrer\">covered the Pew findings<\/a> and quoted <a href=\"https:\/\/go.forrester.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Forrester<\/a>: &#8220;<em>The percentage of security and risk professionals citing \u201csecurity awareness\u201d as a top priority rose to 61% last year, from 56% in 2010<\/em>.&#8221;<\/p>\n<p>In the enterprise, Heidi Shey, a senior analyst at Forrester, told <a href=\"https:\/\/www.wsj.com\/news\/cio-journal\" target=\"_blank\" rel=\"noopener noreferrer\"><em>CIO Journal<\/em><\/a> that security awareness training isn\u2019t always effective, since it\u2019s often conducted once a year as a compliance issue and involves lists of dos and don\u2019ts.<\/p>\n<p style=\"padding-left: 30px;\"><em>The human element is important in safeguarding a firm against cyberattack, since it\u2019s both a first line of defense as well as a weak link. Successful awareness efforts are focused on enabling behavioral change, and typically customized and specific to an organization, its workforce, and relevant risks.<\/em><\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>The data from Pew says that enterprise and home users need to be more security-aware. Technology can&#8217;t solve stupid so users have to be the last line of defense.<\/em><\/p>\n<p><strong>Related articles<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/thehill.com\/blogs\/pundits-blog\/technology\/318698-americans-must-become-better-at-cybersecurity\" target=\"_blank\" rel=\"noopener noreferrer\"> Americans must become better at cybersecurity<\/a> (<a href=\"https:\/\/thehill.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Hill<\/a>)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Americans don\u2019t know much about online security privacy or SPAM in a new Pew survey<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2990,2099,824,286,2945,1921,612,185,4],"class_list":["post-84554","post","type-post","status-publish","format-standard","hentry","category-security","tag-2990","tag-authentication","tag-encryption","tag-https","tag-location","tag-pew-research-center","tag-phishing","tag-privacy","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/84554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=84554"}],"version-history":[{"count":13,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/84554\/revisions"}],"predecessor-version":[{"id":131799,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/84554\/revisions\/131799"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=84554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=84554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=84554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}