THE GENERATION GAP IN COMPUTER SECURITY:
|
|
- Oscar Stafford
- 8 years ago
- Views:
Transcription
1 Introduction The broad adoption of digital media and social networking combined with the increasing amount of sensitive data stored online is making personal computer security more important than ever. But do different generations understand this problem and protect their systems while online? Does the younger, more tech-savvy generation manage computer security more effectively, or do more mature individuals who are often more guarded with their personal data protect themselves better? The following report, sponsored by ZoneAlarm (Check Point Software Technologies consumer business), presents the results of a global survey of 1,245 PC users conducted in the United States, Canada, United Kingdom, Germany, and Australia during March The goal of this study was to quantify generational differences towards personal computer security. In this report, Gen Y is defined as 18- to 25-year-olds, and Baby Boomers refers to 56- to 65-year olds. Key Findings Computer security increases in priority with age Only 31% of Gen Y participants rank security as the most important consideration when making decisions about their computers compared to 58% of Baby Boomers Gen Y is more likely to prioritize entertainment and community above security Approximately 36% of Baby Boomers are very concerned about security and privacy compared to only of Gen Y Baby Boomers are more concerned about attacks; Gen Y is more concerned about attacks through social networks and P2P file-sharing networks Gen Y is overconfident in its security knowledge 63% of Gen Y claims to be knowledgeable about security compared to 59% of Baby Boomers Yet, of Gen Y respondents have had security issues in the past two years compared to only 42% of Baby Boomers Gen Y has less sophisticated security due to cost and technical barriers Gen Y is less likely to use paid antivirus, 3rd-party firewalls, or integrated security suites than Baby Boomers 45% of Gen Y participants say security software is too expensive compared to 37% of Baby Boomers Sensitive data is stored on computers yet participants, especially Gen Y, ignore security best practices 84% of people keep sensitive data, such as tax records, financial info, and passwords on their computers Among participants of all generations, 71% do not follow security best practices of supplementing antivirus software with a firewall 78% of Gen Y do not follow security best practices compared to 53% of Baby Boomers Sponsored by
2 Detailed Findings Importance of computer security increases with age Participants were asked to rate the relative importance of different computer-related activities when making decisions about their computers and the applications used, including: Security: Confidence that personal information is safe and systems are secure Productivity: Quick access to applications such as Microsoft Office, , calendars, to-do lists Entertainment: The organization and use of music, video, and games Information: Access to news, product research, and online personal accounts Community: Interaction via social media, instant messaging, Internet calls, and video chat Among all participants, almost half (48%) ranked security as the most important of these activities. However, there was a clear trend that younger participants were much less likely to rank security as their most important consideration than older participants. Security most important - by age 70% 60% 40% 30% 0% 31% () 46% 51% 54% 58% (Baby Boomers) 48% Gen Y prioritizes entertainment and community Gen Y was 27% less likely (31% vs. 58%) to rank security as its top priority compared to Baby Boomers. Instead Gen Y participants were much more likely to put a higher priority on entertainment and community. Gen Y participants were 18% more likely (22% vs. 4%) to indicate entertainment was their top priority and 14% more likely (18% vs. 4%) to indicate community was most important compared to Baby Boomers. Page 2
3 Baby Boomers more concerned about security and privacy While 28% of all survey participants reported being very concerned about security and privacy when using their computers, Baby Boomers were much more likely, 36%, to describe themselves this way than younger generations. In comparison, only of Gen Y participants indicated that they were very concerned about security. Very concerned about computer security and privacy - by age 40% 35% 30% 25% 15% 5% 0% () 32% 34% 36% (Baby Boomers) 28% Generational differences in concerns about security attacks Both Gen Y and Baby Boomers were most concerned about the potential security threat from infected websites. However, there were distinct differences in the types of security attacks that caused concern among the different age groups. Baby Boomers were much more concerned about attacks coming through , (35% vs. 18%) whereas Gen Y indicated greater concern (24% vs. 9%) about attacks originating from social networks or P2P file-sharing networks. Source of security a.acks causing most concern Infected websites 49% 53% 18% 35% Social and P2P networks 9% 24% 0% 30% 40% 60% Page 3
4 Gen Y is overconfident about security knowledge Gen Y participants described themselves as slightly more knowledgeable about security with 63% indicating that they were knowledgeable about security threats compared to 59% of Baby Boomers. Knowledgeable about security 59% 63% 40% 45% 55% 60% 65% However, Gen Y participants reported that they actually experienced more security problems than Baby Boomers. Half () of all Gen Y participants indicated that they have had computer security issues in the past two years compared to only 42% of Baby Boomers. Have experienced computer security issues in the past two years 42% 25% 30% 35% 40% 45% 55% In particular, Gen Y reported more virus infections (42%) compared to Baby Boomers (35%). Have you had any of the following computer security issues in the last 2 years? Virus infeccon 38% 35% 42% Hacked computer or account ID the0/stolen finanical info 4% 4% 4% 9% 8% 0% 5% 15% 25% 30% 35% 40% 45% Page 4
5 Gen Y less likely to use additional security software Gen Y is less likely to use additional security software beyond the basics that come with the Windows operating system. These participants reported using fewer paid antivirus, 3rd-party firewalls, and integrated security suites that include both a firewall and antivirus. Use addi(onal security so1ware Integrated security suite 12% 27% Paid an8virus 24% 34% 3rd- party firewall 22% 0% 5% 15% 25% 30% 35% 40% Cost and technical issues create barrier to greater use of security software Gen Y has greater cost sensitivity than Baby Boomers, which is a barrier to using more paid security software. More Gen Y respondents, 45%, claimed that one of the reasons they do not use more security software is because it is too expensive. This compares to only 37% of Baby Boomers citing the same issue. Reasons for not using more security so1ware It's too expensive 37% 45% I think MicrosoA has me covered with built- in security soaware 28% 26% Security soaware slows down my computer 16% 18% I have had technical problems with security soaware in the past 12% 12% I have had problems upda:ng my security soaware in the past 6% 0% 5% 15% 25% 30% 35% 40% 45% Page 5
6 Agreement among generations that security software should be free While there were many differences between generations in this study, the opinion that security software should be free was commonly shared across all ages. Approximately half of all participants, 48%, indicated that free is the price they expect to pay for security software. Expect security so.ware to be free 60% 40% 30% 0% 48% () 41% 53% (Baby Boomers) 48% generations keep sensitive data on their computers The difference in attitudes towards security was unrelated to the amount of personal information stored on their computers. Across all age groups, most participants (84%) kept sensitive personal data such as tax records, financial information, and passwords on their computers. Keep personal data on their computers - by age 90% 80% 70% 60% 40% 30% 0% 82% () 86% 83% 86% (Baby Boomers) 82% 84% Page 6
7 Participants, especially Gen Y, do not follow security best practices A generally accepted best practice among all personal computing security experts is that each computer should have a two-way firewall in addition to antivirus software. Given these guidelines, we evaluated how many participants were following these best practices. In general, 71% of all survey participants do not follow these security best practices. Baby Boomers did a much better job than any other generation with almost half following these best practices. Gen Y was the least protected with 78% not following these best practices. Do not follow security best prac3ces 71% 53% 78% 0% 30% 40% 60% 70% 80% 90% Survey Methodology In March 2012, independent groups of PC users were invited to participate in a Web survey on the topic of personal computer security sponsored by ZoneAlarm. A total of 1,245 respondents across the United States, Canada, United Kingdom, Germany, and Australia completed the survey, all of whom had responsibility for purchasing and maintaining their personal desktop or laptop computer. Australia 17% Loca%on United States 33% years old Age of Par*cipants years old Gender Male 41% Germany 17% United Kingdom 17% Canada 16% years old years old years old Female 59% Page 7
8 About Dimensional Research Dimensional Research provides practical marketing research to help technology companies make their customers more successful. Our researchers are experts in the people, processes, and technology of corporate IT and understand how IT organizations operate. We partner with our clients to deliver actionable information that reduces risks, increases customer satisfaction, and grows the business. For more information visit. About Check Point Software Technologies Check Point Software Technologies Ltd. ( the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft. Page 8
THE RISK OF SOCIAL ENGINEERING ON INFORMATION SECURITY:
Introduction The threat of technology-based security attacks is well understood, and IT organizations have tools and processes in place to manage this risk to sensitive corporate data. However, social
More informationThe Attacker s Target: The Small Business
Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection
More informationHow To Understand The Security Posture Of Home Internet Users In Australia
AusCERT Home Users Computer Security Survey 2008 Kathryn Kerr Manager, Analysis and Assessments 1 Agenda Scope Purpose Methodology Key findings Conclusion Copyright 2007 AusCERT 2 Survey scope Random sample
More informationCHECK POINT SOFTWARE TECHNOLOGIES REPORTS 2013 FIRST QUARTER FINANCIAL RESULTS
INVESTOR CONTACT: MEDIA CONTACT: Kip E. Meintzer James Rivas Check Point Software Technologies Check Point Software Technologies +1.650.628.2040 +1.650.628.2215 ir@checkpoint.com press@checkpoint.com CHECK
More information2012 NORTON CYBERCRIME REPORT
2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,
More informationCOLLABORATION TRENDS AND TECHNOLOGY
August 2015 Sponsored by Introduction Today s most productive knowledge workers business professionals who are contributing, sharing insight and experiences, participating in decision making, and influencing
More informationSecurity Solutions for HIPAA Compliance
Security Solutions for HIPAA Compliance www.currentware.com 613-368-4300 info@currentware.com In today s digital and mobile age, the healthcare sector is susceptible to increasing vulnerabilities of exposing
More informationThe Evolution of IPS. Intrusion Prevention (Protection) Systems aren't what they used to be
The Evolution of IPS Intrusion Prevention (Protection) Systems aren't what they used to be The Evolution of IPS Contents Background 3 Past Case for Standalone IPS 3 Organizational Control 3 Best-of-Breed
More information2011 NCSA / McAfee Internet Home Users Survey
2011 NCSA / McAfee Internet Home Users Survey National Cyber Security Alliance McAfee Zogby International October 2011 Methodology and Sample Characteristics IBOPE Zogby International was commissioned
More informationCheck Point 2013-2014 Partner Marketing Campaign Plan
Check Point 2013-2014 Partner Marketing Campaign Plan 1 Welcome To keep pace with the changes and complexities of today s security challenges, you need a partner that is uniquely equipped to provide security
More information2012 NCSA / McAfee Online Safety Survey
2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security
More informationPROTECTING YOUR DIGITAL LIFE
PROTECTING YOUR DIGITAL LIFE Table of Contents What is a Digital Life?... 1 Missing: Five Years of Photos... 2 Are Your Files Safe?... 3 Everyday Risks... 4 Real People, Real Loss... 5 Forgot to Back Up?
More informationNetsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.
NetSafe/ AVG New Zealand Contents Page 1. Objectives and Methodology 3 2. Summary and Conclusions 6 3. Main Findings 8 Online security a serious issue 9 Concern about online challenges 11 Most important
More informationBAE Systems Cyber Security Survey Report
BAE Systems Cyber Security Survey Report Q1 2016 1 Copyright 2016 BAE Systems. All Rights Reserved. Table of Contents Page Number Objectives & Methodology 3 Executive Summary 4 Key Findings 7 Detailed
More informationZone Labs Integrity Smarter Enterprise Security
Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the
More informationMcAfee Total Protection Reduce the Complexity of Managing Security
McAfee Total Protection Reduce the Complexity of Managing Security Computer security has changed dramatically since the first computer virus emerged 25 years ago. It s now far more complex and time-consuming.
More informationManaging Security Risks in Modern IT Networks
Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling
More information2014 Teen Internet Safety Survey. Conducted by The Futures Company
2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online
More informationOutpost For Home Users
Outpost For Home Users. Scope of This Document In this white paper we analyze potential risks and threats to home computers, as well as discuss some solutions for these computers secure. Scope of This
More informationWebsense: Worldwide Leader in Web Filtering Expands into Web Security
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com VENDOR PROFILE Websense: Worldwide Leader in Web Filtering Expands into Web Security Brian E. Burke
More informationReport on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012
Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents
More informationHow To Prevent Cybercrime
2013 NORTON REPORT 2013 NORTON REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA,
More informationCybersecurity Report on Small Business: Study Shows Gap between Needs and Actions
SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.
More informationCommissioned Study. SURVEY: Mobile Threats are Real and Costly
Commissioned Study SURVEY: Mobile Threats are Real and Costly Introduction A lack of integrated mobile security is costing companies in terms of everything from lost productivity to lost data. Cyber criminals
More informationPerceptions About Network Security Survey of IT & IT security practitioners in the U.S.
Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: June 2011 Ponemon
More informationPEW INTERNET PROJECT DATA MEMO. Sydney Jones, Research Assistant & Susannah Fox, Associate Director
PEW INTERNET PROJECT DATA MEMO BY: Sydney Jones, Research Assistant & Susannah Fox, Associate Director RE: Generations Online in 2009 DATE: January 28, 2009 Contrary to the image of Generation Y as the
More informationSpyware: Securing gateway and endpoint against data theft
Spyware: Securing gateway and endpoint against data theft The explosion in spyware has presented businesses with increasing concerns about security issues, from data theft and network damage to reputation
More informationMobile Banking and Payment Trends What You Need to Know
Mobile Banking and Payment Trends What You Need to Know May 2011 1 Research Objectives and Methodology Study objective Determine the impact of mobile devices on behaviors related to financial transactions
More informationInformation Technology Acceptable Use Policies
White Paper: Information Technology Acceptable Use Policies A practical guide for protecting IT assets from the largest single IT Security threat inappropriate use of IT services, including desktops, email,
More informationSYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built
More informationIntralinks Survey Report
Intralinks Survey Report Safe Sharing: A Survey of Enterprise IT Decision Makers on Best Practices for Adopting File Sync and Share Applications New research conducted by Harris Poll June 2014 Copyright
More informationSBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics
SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced
More informationNeutralizing Spyware in the Enterprise Environment
White Paper Neutralizing Spyware in the Enterprise Environment Check Point protects every part of your network perimeter, internal, Web to keep your information resources safe, accessible, and easy to
More informationGlobal IT Security Risks
Global IT Security Risks June 17, 2011 Kaspersky Lab leverages the leading expertise in IT security risks, malware and vulnerabilities to protect its customers in the best possible way. To ensure the most
More informationState of Mobility Survey. France Results
State of Mobility Survey France Results Methodology Survey performed by Applied Research 6,275 global organizations 43 countries NAM 2 LAM 14 EMEA 13 APJ 14 SMBs: Individuals in charge of computers Enterprises:
More informationLaura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services
Consumer Choices: Computer Security Software Prepared by: Dave Palmer, Instructional Media Faculty, University of Florida/IFAS Extension, South Central Extension District Laura Royer, Extension Faculty,
More informationHigh Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
More informationJoint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
More informationCloudDesk - Security in the Cloud INFORMATION
CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES
More informationRemote Managed Services
Remote Managed Services A Model for Growth and Efficiency in Security IFSEC 2011 Honeywell at a Glance $38B Fortune 100 company with a 120-year legacy of innovation 120,000 employees in 100 countries World-class
More informationWorking from Anywhere Exploring Remote Access Technologies
We facilitate technology transformations that drive & support business success. Working from Anywhere Exploring Remote Access Technologies If you have questions about this presentation please contact Triella.
More informationCheck Point Whitepaper. Check Point Abra: A Virtual Secure Workspace Technical Whitepaper
Check Point Whitepaper Check Point Abra: A Virtual Secure Workspace Technical Whitepaper Contents An Increasingly Mobile World 3 Threats and Dangers of a Mobile Workforce 3 Abra Provides the Solution 4
More informationSTOP THINK CLICK Seven Practices for Safer Computing
Seven Practices for Safer Computing Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than earlier generations
More informationInternet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.
Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Internet Security................................................................ 4
More informationCisco ASA 5500 Series VPN Edition for the Enterprise
Solution Overview Cisco ASA 5500 Series VPN Edition for the Enterprise CISCO ASA 5500 SERIES VPN EDITION PROVIDES CUSTOMIZABLE, SECURE, AND COST-EFFECTIVE REMOTE ACCESS The Cisco ASA 5500 Series VPN Edition
More informationThe Online Generation Gap. Contrasting attitudes and behaviors of parents and teens
The Online Generation Gap Contrasting attitudes and behaviors of parents and teens The Online Generation Gap: Contrasting attitudes and behaviors of parents and teens Submitted to: The Family Online Safety
More informationBookmarks for Desktop Self-Defense
Basic Security Tips Bookmarks for Desktop Self-Defense Get Safe Online http://www.getsafeonline.org/ Get Safe Online will help you protect yourself against Internet threats. The site is sponsored by government
More informationSpyware is the latest epidemic security threat. Investigating Factors Affecting
By Younghwa Lee and Kenneth A. Kozar Investigating Factors Affecting of Anti Spyware is the latest epidemic security threat for Internet users. There are various types of spyware programs (see Table 1)
More informationTHE EASY WAY TO SECURITY AND SIMPLICITY. Business Suite
THE EASY WAY TO SECURITY AND SIMPLICITY Business Suite CHOOSE DATA SECURITY THE EASY WAY Choosing the right business IT security is often a difficult task that requires going through endless options. F-Secure
More information2012 NCSA / Symantec. National Small Business Study
2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National
More informationONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
More informationBROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
More informationSecure Web Gateways Buyer s Guide >
White Paper Secure Web Gateways Buyer s Guide > (Abbreviated Version) The web is the number one source for malware distribution. With more than 2 million 1 new pages added every day and 10,000 new malicious
More informationSECURE SHARING AND COMMUNICATION. Protection for servers, email and collaboration
SECURE SHARING AND COMMUNICATION Protection for servers, email and collaboration THE VALUE OF SECURITY Most malware attacks use software vulnerabilities to reach their targets. Only 90% of malware attacks
More informationNetwork Security Report:
Network Security Report: The State of Network Security in Schools Managing tight budgets. Complying with regulatory requirements. Supporting Internet-based learning technologies. There are many challenges
More information2012 Endpoint Security Best Practices Survey
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
More informationGuideline for Prevention of Spyware and other Potentially Unwanted Software
Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,
More informationSygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
More informationTLP WHITE. Denial of service attacks: what you need to know
Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...
More informationEmpirical Analysis of Software Usage to Drive Policy Recommendations. May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance
Empirical Analysis of Software Usage to Drive Policy Recommendations May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance Outline Introduction to BSA Global Studies and their Methodology 2014 BSA
More informationHomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
More informationThe Path Forward. International Women s Day 2012 Global Research Results
The Path Forward International Women s Day 2012 Global Research Results Research objectives Accenture conducted its global research study, The Path Forward for release on International Women s Day to gain
More informationPaul Nguyen. 2014 CSG Interna0onal
Paul Nguyen 2014 CSG Interna0onal Security is Top- of- Mind Everywhere High- profile breaches: 2K+ breaches expose nearly 1B records in 2013 Increased regulatory pressure State- sponsored hacking around
More informationUncover security risks on your enterprise network
Uncover security risks on your enterprise network Sign up for Check Point s on-site Security Checkup. About this presentation: The key message of this presentation is that organizations should sign up
More informationThe Value of Financial Planning
The Value of Financial Planning FPSB s Global Consumer Survey Danel Kuhlmann Financial Planning Standards Board Marketing & Communications Director 1 Copyright 2015 Financial Planning Standards Board Who
More informationSecurity Effectiveness Framework Study
Security Effectiveness Framework Study Is your organisation effective in managing its security operations? Sponsored by: HP Information Security, and Check Point Software Technologies Ltd. 31 July 2010
More informationAVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
More informationInternet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
More information1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic
1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
More information2011 Cell Phone Consumer Attitudes Study
2011 Cell Phone Consumer Attitudes Study Prepared for: CWTA April 29, 2011 Copyright 2009-2012 Quorus Consulting Group Ltd. Table of Contents Executive Summary 3 Research Objectives and Methodology 9 Detailed
More informationYouth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
More informationThe Value of Financial Planning and Awareness of CFP Certification: A Global Financial Planning Survey Singapore Results
The Value of Financial Planning and Awareness of CFP Certification: A Global Financial Planning Survey Singapore Results 1 Copyright 2015 Financial Planning Standards Board How was the global survey conducted?
More informationInstant Messaging, VoIP, P2P, and games in the workplace: How to take back control
Instant Messaging, VoIP, P2P, and games in the workplace: How to take back control Employees installing and using unauthorized applications like Instant Messaging, VoIP, games and peer-to-peer file-sharing
More informationCommonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012
Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives Initiation date: January 2012 Completion date: June 2012 Nomination submitted by: Samuel A. Nixon
More informationUnderstanding Security Complexity in 21 st Century IT Environments:
Understanding Security Complexity in 21 st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & Germany Sponsored by Check Point Software Technologies Independently conducted
More informationINTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
More informationCSI/FBI 2000 COMPUTER CRIME AND SECURITY SURVEY
CSI/FBI 00 COMPUTER CRIME AND SECURITY SURVEY Statement of intent This survey was conducted by the Computer Security Institute (CSI) in association with the San Francisco Computer Crime Squad of the Federal
More informationThe definitive guide to consumer perceptions on home security in Australia. Secure Homes Report. ADT Always There
The definitive guide to consumer perceptions on home security in Australia Secure Homes Report 2012 ADT Always There KEY FINDINGS AT A GLANCE 30% of surveyed residents have been a victim of a break-in
More informationHow To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
More information11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER
11 THINGS YOUR FIREWALL SHOULD DO a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 2 THE GUIDE OF BY DALE SHULMISTRA Dale Shulmistra is a Technology Strategist at Invenio IT, responsible for
More informationEndpoint Protection Small Business Edition 2013?
Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,
More informationTop Four Considerations for Securing Microsoft SharePoint
Top Four Considerations for Securing by Chris McCormack, Product Marketing Manager, Sophos is now the standard for internal and external collaboration and content management in much the same way Microsoft
More informationDigital War in e-business
Digital War in e-business Ricci Ieong, Secretary of ISFS, Senior Security Consultant, PrivyLink (HK) Ltd. Trend in Internet Commerce Market More Internet Commerce Market G Increase in Business to Commerce
More informationKiwis Managing their Online Identity Information
Kiwis Managing their Online Identity Information Interim Report Survey Findings Professor Miriam Lips, Dr Elizabeth Eppel, Dr Dalice Sim, Lynn Barlow and Dr Karl Lofgren Victoria University of Wellington
More informationSurveying the Digital Future
www.ccp.ucla.edu The UCLA Internet Report Surveying the Digital Future Year Three UCLA Center for Communication Policy February 2003 THE UCLA INTERNET REPORT Surveying the Digital Future YEAR THREE Jeffrey
More informationSaheel KHOYRATTY. Partner Technology Advisor
Saheel KHOYRATTY Partner Technology Advisor The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment
More informationStatistical Analysis of Internet Security Threats. Daniel G. James
Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There
More informationStudent Tech Security Training. ITS Security Office
Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with
More information2009 Antispyware Coalition Public Workshop
2009 Antispyware Coalition Public Workshop Jeffrey Fox Technology Editor, Consumer Reports Media contact: Lauren Hackett, 914-378-2561 Background For several years, Consumer Reports has been testing and
More informationViRobot Desktop 5.5. User s Guide
ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,
More informationHow To Protect Your Endpoints From Attack
2012 Endpoint Security Best Practices Survey GLOBAL RESULTS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Top tier organizations fare better against attacks... 8 Finding 2: Top tier organizations
More informationProactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
More informationMOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)
MOBILE SECURITY Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) JULY 2014 INTRODUCTION BYOD SECURITY 2014 It s no surprise that there are many articles and papers on
More information1) Outsourcing ERP systems helps to lower the cost of software ownership and maintenance. Answer: TRUE Diff: 1 Page Ref: 268
Enterprise Systems for Management, 2e (Motiwalla/Thompson) Chapter 10 Global, Ethics, and Security Management 1) Outsourcing ERP systems helps to lower the cost of software ownership and maintenance. Diff:
More informationHint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:
Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check
More informationOsterman Research Executive Summary
Osterman Research Executive Summary Report Focus Any email user, IT manager, CIO or network administrator will attest to the fact that threats introduced into an organization through the email system and,
More informationThe Cisco Connected World Technology Report
The Cisco Connected World Technology Report September 21, 2011 2011 Cisco and/or its affiliates. All rights reserved. 1 Timing and Sample Qualifications This report discusses the findings for 1,441 College
More informationCisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise
Solution Overview Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise CISCO ASA 5500 SERIES SSL / IPSEC VPN EDITION PROVIDES CUSTOMIZABLE, SECURE, AND COST- EFFECTIVE REMOTE ACCESS The Cisco
More information2012 Bit9 Cyber Security Research Report
2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by
More information