THE GENERATION GAP IN COMPUTER SECURITY:

Size: px
Start display at page:

Download "THE GENERATION GAP IN COMPUTER SECURITY:"

Transcription

1 Introduction The broad adoption of digital media and social networking combined with the increasing amount of sensitive data stored online is making personal computer security more important than ever. But do different generations understand this problem and protect their systems while online? Does the younger, more tech-savvy generation manage computer security more effectively, or do more mature individuals who are often more guarded with their personal data protect themselves better? The following report, sponsored by ZoneAlarm (Check Point Software Technologies consumer business), presents the results of a global survey of 1,245 PC users conducted in the United States, Canada, United Kingdom, Germany, and Australia during March The goal of this study was to quantify generational differences towards personal computer security. In this report, Gen Y is defined as 18- to 25-year-olds, and Baby Boomers refers to 56- to 65-year olds. Key Findings Computer security increases in priority with age Only 31% of Gen Y participants rank security as the most important consideration when making decisions about their computers compared to 58% of Baby Boomers Gen Y is more likely to prioritize entertainment and community above security Approximately 36% of Baby Boomers are very concerned about security and privacy compared to only of Gen Y Baby Boomers are more concerned about attacks; Gen Y is more concerned about attacks through social networks and P2P file-sharing networks Gen Y is overconfident in its security knowledge 63% of Gen Y claims to be knowledgeable about security compared to 59% of Baby Boomers Yet, of Gen Y respondents have had security issues in the past two years compared to only 42% of Baby Boomers Gen Y has less sophisticated security due to cost and technical barriers Gen Y is less likely to use paid antivirus, 3rd-party firewalls, or integrated security suites than Baby Boomers 45% of Gen Y participants say security software is too expensive compared to 37% of Baby Boomers Sensitive data is stored on computers yet participants, especially Gen Y, ignore security best practices 84% of people keep sensitive data, such as tax records, financial info, and passwords on their computers Among participants of all generations, 71% do not follow security best practices of supplementing antivirus software with a firewall 78% of Gen Y do not follow security best practices compared to 53% of Baby Boomers Sponsored by

2 Detailed Findings Importance of computer security increases with age Participants were asked to rate the relative importance of different computer-related activities when making decisions about their computers and the applications used, including: Security: Confidence that personal information is safe and systems are secure Productivity: Quick access to applications such as Microsoft Office, , calendars, to-do lists Entertainment: The organization and use of music, video, and games Information: Access to news, product research, and online personal accounts Community: Interaction via social media, instant messaging, Internet calls, and video chat Among all participants, almost half (48%) ranked security as the most important of these activities. However, there was a clear trend that younger participants were much less likely to rank security as their most important consideration than older participants. Security most important - by age 70% 60% 40% 30% 0% 31% () 46% 51% 54% 58% (Baby Boomers) 48% Gen Y prioritizes entertainment and community Gen Y was 27% less likely (31% vs. 58%) to rank security as its top priority compared to Baby Boomers. Instead Gen Y participants were much more likely to put a higher priority on entertainment and community. Gen Y participants were 18% more likely (22% vs. 4%) to indicate entertainment was their top priority and 14% more likely (18% vs. 4%) to indicate community was most important compared to Baby Boomers. Page 2

3 Baby Boomers more concerned about security and privacy While 28% of all survey participants reported being very concerned about security and privacy when using their computers, Baby Boomers were much more likely, 36%, to describe themselves this way than younger generations. In comparison, only of Gen Y participants indicated that they were very concerned about security. Very concerned about computer security and privacy - by age 40% 35% 30% 25% 15% 5% 0% () 32% 34% 36% (Baby Boomers) 28% Generational differences in concerns about security attacks Both Gen Y and Baby Boomers were most concerned about the potential security threat from infected websites. However, there were distinct differences in the types of security attacks that caused concern among the different age groups. Baby Boomers were much more concerned about attacks coming through , (35% vs. 18%) whereas Gen Y indicated greater concern (24% vs. 9%) about attacks originating from social networks or P2P file-sharing networks. Source of security a.acks causing most concern Infected websites 49% 53% 18% 35% Social and P2P networks 9% 24% 0% 30% 40% 60% Page 3

4 Gen Y is overconfident about security knowledge Gen Y participants described themselves as slightly more knowledgeable about security with 63% indicating that they were knowledgeable about security threats compared to 59% of Baby Boomers. Knowledgeable about security 59% 63% 40% 45% 55% 60% 65% However, Gen Y participants reported that they actually experienced more security problems than Baby Boomers. Half () of all Gen Y participants indicated that they have had computer security issues in the past two years compared to only 42% of Baby Boomers. Have experienced computer security issues in the past two years 42% 25% 30% 35% 40% 45% 55% In particular, Gen Y reported more virus infections (42%) compared to Baby Boomers (35%). Have you had any of the following computer security issues in the last 2 years? Virus infeccon 38% 35% 42% Hacked computer or account ID the0/stolen finanical info 4% 4% 4% 9% 8% 0% 5% 15% 25% 30% 35% 40% 45% Page 4

5 Gen Y less likely to use additional security software Gen Y is less likely to use additional security software beyond the basics that come with the Windows operating system. These participants reported using fewer paid antivirus, 3rd-party firewalls, and integrated security suites that include both a firewall and antivirus. Use addi(onal security so1ware Integrated security suite 12% 27% Paid an8virus 24% 34% 3rd- party firewall 22% 0% 5% 15% 25% 30% 35% 40% Cost and technical issues create barrier to greater use of security software Gen Y has greater cost sensitivity than Baby Boomers, which is a barrier to using more paid security software. More Gen Y respondents, 45%, claimed that one of the reasons they do not use more security software is because it is too expensive. This compares to only 37% of Baby Boomers citing the same issue. Reasons for not using more security so1ware It's too expensive 37% 45% I think MicrosoA has me covered with built- in security soaware 28% 26% Security soaware slows down my computer 16% 18% I have had technical problems with security soaware in the past 12% 12% I have had problems upda:ng my security soaware in the past 6% 0% 5% 15% 25% 30% 35% 40% 45% Page 5

6 Agreement among generations that security software should be free While there were many differences between generations in this study, the opinion that security software should be free was commonly shared across all ages. Approximately half of all participants, 48%, indicated that free is the price they expect to pay for security software. Expect security so.ware to be free 60% 40% 30% 0% 48% () 41% 53% (Baby Boomers) 48% generations keep sensitive data on their computers The difference in attitudes towards security was unrelated to the amount of personal information stored on their computers. Across all age groups, most participants (84%) kept sensitive personal data such as tax records, financial information, and passwords on their computers. Keep personal data on their computers - by age 90% 80% 70% 60% 40% 30% 0% 82% () 86% 83% 86% (Baby Boomers) 82% 84% Page 6

7 Participants, especially Gen Y, do not follow security best practices A generally accepted best practice among all personal computing security experts is that each computer should have a two-way firewall in addition to antivirus software. Given these guidelines, we evaluated how many participants were following these best practices. In general, 71% of all survey participants do not follow these security best practices. Baby Boomers did a much better job than any other generation with almost half following these best practices. Gen Y was the least protected with 78% not following these best practices. Do not follow security best prac3ces 71% 53% 78% 0% 30% 40% 60% 70% 80% 90% Survey Methodology In March 2012, independent groups of PC users were invited to participate in a Web survey on the topic of personal computer security sponsored by ZoneAlarm. A total of 1,245 respondents across the United States, Canada, United Kingdom, Germany, and Australia completed the survey, all of whom had responsibility for purchasing and maintaining their personal desktop or laptop computer. Australia 17% Loca%on United States 33% years old Age of Par*cipants years old Gender Male 41% Germany 17% United Kingdom 17% Canada 16% years old years old years old Female 59% Page 7

8 About Dimensional Research Dimensional Research provides practical marketing research to help technology companies make their customers more successful. Our researchers are experts in the people, processes, and technology of corporate IT and understand how IT organizations operate. We partner with our clients to deliver actionable information that reduces risks, increases customer satisfaction, and grows the business. For more information visit. About Check Point Software Technologies Check Point Software Technologies Ltd. ( the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft. Page 8

THE RISK OF SOCIAL ENGINEERING ON INFORMATION SECURITY:

THE RISK OF SOCIAL ENGINEERING ON INFORMATION SECURITY: Introduction The threat of technology-based security attacks is well understood, and IT organizations have tools and processes in place to manage this risk to sensitive corporate data. However, social

More information

The Attacker s Target: The Small Business

The Attacker s Target: The Small Business Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection

More information

How To Understand The Security Posture Of Home Internet Users In Australia

How To Understand The Security Posture Of Home Internet Users In Australia AusCERT Home Users Computer Security Survey 2008 Kathryn Kerr Manager, Analysis and Assessments 1 Agenda Scope Purpose Methodology Key findings Conclusion Copyright 2007 AusCERT 2 Survey scope Random sample

More information

CHECK POINT SOFTWARE TECHNOLOGIES REPORTS 2013 FIRST QUARTER FINANCIAL RESULTS

CHECK POINT SOFTWARE TECHNOLOGIES REPORTS 2013 FIRST QUARTER FINANCIAL RESULTS INVESTOR CONTACT: MEDIA CONTACT: Kip E. Meintzer James Rivas Check Point Software Technologies Check Point Software Technologies +1.650.628.2040 +1.650.628.2215 ir@checkpoint.com press@checkpoint.com CHECK

More information

2012 NORTON CYBERCRIME REPORT

2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,

More information

COLLABORATION TRENDS AND TECHNOLOGY

COLLABORATION TRENDS AND TECHNOLOGY August 2015 Sponsored by Introduction Today s most productive knowledge workers business professionals who are contributing, sharing insight and experiences, participating in decision making, and influencing

More information

Security Solutions for HIPAA Compliance

Security Solutions for HIPAA Compliance Security Solutions for HIPAA Compliance www.currentware.com 613-368-4300 info@currentware.com In today s digital and mobile age, the healthcare sector is susceptible to increasing vulnerabilities of exposing

More information

The Evolution of IPS. Intrusion Prevention (Protection) Systems aren't what they used to be

The Evolution of IPS. Intrusion Prevention (Protection) Systems aren't what they used to be The Evolution of IPS Intrusion Prevention (Protection) Systems aren't what they used to be The Evolution of IPS Contents Background 3 Past Case for Standalone IPS 3 Organizational Control 3 Best-of-Breed

More information

2011 NCSA / McAfee Internet Home Users Survey

2011 NCSA / McAfee Internet Home Users Survey 2011 NCSA / McAfee Internet Home Users Survey National Cyber Security Alliance McAfee Zogby International October 2011 Methodology and Sample Characteristics IBOPE Zogby International was commissioned

More information

Check Point 2013-2014 Partner Marketing Campaign Plan

Check Point 2013-2014 Partner Marketing Campaign Plan Check Point 2013-2014 Partner Marketing Campaign Plan 1 Welcome To keep pace with the changes and complexities of today s security challenges, you need a partner that is uniquely equipped to provide security

More information

2012 NCSA / McAfee Online Safety Survey

2012 NCSA / McAfee Online Safety Survey 2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security

More information

PROTECTING YOUR DIGITAL LIFE

PROTECTING YOUR DIGITAL LIFE PROTECTING YOUR DIGITAL LIFE Table of Contents What is a Digital Life?... 1 Missing: Five Years of Photos... 2 Are Your Files Safe?... 3 Everyday Risks... 4 Real People, Real Loss... 5 Forgot to Back Up?

More information

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011. NetSafe/ AVG New Zealand Contents Page 1. Objectives and Methodology 3 2. Summary and Conclusions 6 3. Main Findings 8 Online security a serious issue 9 Concern about online challenges 11 Most important

More information

BAE Systems Cyber Security Survey Report

BAE Systems Cyber Security Survey Report BAE Systems Cyber Security Survey Report Q1 2016 1 Copyright 2016 BAE Systems. All Rights Reserved. Table of Contents Page Number Objectives & Methodology 3 Executive Summary 4 Key Findings 7 Detailed

More information

Zone Labs Integrity Smarter Enterprise Security

Zone Labs Integrity Smarter Enterprise Security Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the

More information

McAfee Total Protection Reduce the Complexity of Managing Security

McAfee Total Protection Reduce the Complexity of Managing Security McAfee Total Protection Reduce the Complexity of Managing Security Computer security has changed dramatically since the first computer virus emerged 25 years ago. It s now far more complex and time-consuming.

More information

Managing Security Risks in Modern IT Networks

Managing Security Risks in Modern IT Networks Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling

More information

2014 Teen Internet Safety Survey. Conducted by The Futures Company

2014 Teen Internet Safety Survey. Conducted by The Futures Company 2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online

More information

Outpost For Home Users

Outpost For Home Users Outpost For Home Users. Scope of This Document In this white paper we analyze potential risks and threats to home computers, as well as discuss some solutions for these computers secure. Scope of This

More information

Websense: Worldwide Leader in Web Filtering Expands into Web Security

Websense: Worldwide Leader in Web Filtering Expands into Web Security Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com VENDOR PROFILE Websense: Worldwide Leader in Web Filtering Expands into Web Security Brian E. Burke

More information

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012 Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents

More information

How To Prevent Cybercrime

How To Prevent Cybercrime 2013 NORTON REPORT 2013 NORTON REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA,

More information

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.

More information

Commissioned Study. SURVEY: Mobile Threats are Real and Costly

Commissioned Study. SURVEY: Mobile Threats are Real and Costly Commissioned Study SURVEY: Mobile Threats are Real and Costly Introduction A lack of integrated mobile security is costing companies in terms of everything from lost productivity to lost data. Cyber criminals

More information

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: June 2011 Ponemon

More information

PEW INTERNET PROJECT DATA MEMO. Sydney Jones, Research Assistant & Susannah Fox, Associate Director

PEW INTERNET PROJECT DATA MEMO. Sydney Jones, Research Assistant & Susannah Fox, Associate Director PEW INTERNET PROJECT DATA MEMO BY: Sydney Jones, Research Assistant & Susannah Fox, Associate Director RE: Generations Online in 2009 DATE: January 28, 2009 Contrary to the image of Generation Y as the

More information

Spyware: Securing gateway and endpoint against data theft

Spyware: Securing gateway and endpoint against data theft Spyware: Securing gateway and endpoint against data theft The explosion in spyware has presented businesses with increasing concerns about security issues, from data theft and network damage to reputation

More information

Mobile Banking and Payment Trends What You Need to Know

Mobile Banking and Payment Trends What You Need to Know Mobile Banking and Payment Trends What You Need to Know May 2011 1 Research Objectives and Methodology Study objective Determine the impact of mobile devices on behaviors related to financial transactions

More information

Information Technology Acceptable Use Policies

Information Technology Acceptable Use Policies White Paper: Information Technology Acceptable Use Policies A practical guide for protecting IT assets from the largest single IT Security threat inappropriate use of IT services, including desktops, email,

More information

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built

More information

Intralinks Survey Report

Intralinks Survey Report Intralinks Survey Report Safe Sharing: A Survey of Enterprise IT Decision Makers on Best Practices for Adopting File Sync and Share Applications New research conducted by Harris Poll June 2014 Copyright

More information

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced

More information

Neutralizing Spyware in the Enterprise Environment

Neutralizing Spyware in the Enterprise Environment White Paper Neutralizing Spyware in the Enterprise Environment Check Point protects every part of your network perimeter, internal, Web to keep your information resources safe, accessible, and easy to

More information

Global IT Security Risks

Global IT Security Risks Global IT Security Risks June 17, 2011 Kaspersky Lab leverages the leading expertise in IT security risks, malware and vulnerabilities to protect its customers in the best possible way. To ensure the most

More information

State of Mobility Survey. France Results

State of Mobility Survey. France Results State of Mobility Survey France Results Methodology Survey performed by Applied Research 6,275 global organizations 43 countries NAM 2 LAM 14 EMEA 13 APJ 14 SMBs: Individuals in charge of computers Enterprises:

More information

Laura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services

Laura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services Consumer Choices: Computer Security Software Prepared by: Dave Palmer, Instructional Media Faculty, University of Florida/IFAS Extension, South Central Extension District Laura Royer, Extension Faculty,

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures

More information

CloudDesk - Security in the Cloud INFORMATION

CloudDesk - Security in the Cloud INFORMATION CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES

More information

Remote Managed Services

Remote Managed Services Remote Managed Services A Model for Growth and Efficiency in Security IFSEC 2011 Honeywell at a Glance $38B Fortune 100 company with a 120-year legacy of innovation 120,000 employees in 100 countries World-class

More information

Working from Anywhere Exploring Remote Access Technologies

Working from Anywhere Exploring Remote Access Technologies We facilitate technology transformations that drive & support business success. Working from Anywhere Exploring Remote Access Technologies If you have questions about this presentation please contact Triella.

More information

Check Point Whitepaper. Check Point Abra: A Virtual Secure Workspace Technical Whitepaper

Check Point Whitepaper. Check Point Abra: A Virtual Secure Workspace Technical Whitepaper Check Point Whitepaper Check Point Abra: A Virtual Secure Workspace Technical Whitepaper Contents An Increasingly Mobile World 3 Threats and Dangers of a Mobile Workforce 3 Abra Provides the Solution 4

More information

STOP THINK CLICK Seven Practices for Safer Computing

STOP THINK CLICK Seven Practices for Safer Computing Seven Practices for Safer Computing Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than earlier generations

More information

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions. Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Internet Security................................................................ 4

More information

Cisco ASA 5500 Series VPN Edition for the Enterprise

Cisco ASA 5500 Series VPN Edition for the Enterprise Solution Overview Cisco ASA 5500 Series VPN Edition for the Enterprise CISCO ASA 5500 SERIES VPN EDITION PROVIDES CUSTOMIZABLE, SECURE, AND COST-EFFECTIVE REMOTE ACCESS The Cisco ASA 5500 Series VPN Edition

More information

The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens

The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens The Online Generation Gap Contrasting attitudes and behaviors of parents and teens The Online Generation Gap: Contrasting attitudes and behaviors of parents and teens Submitted to: The Family Online Safety

More information

Bookmarks for Desktop Self-Defense

Bookmarks for Desktop Self-Defense Basic Security Tips Bookmarks for Desktop Self-Defense Get Safe Online http://www.getsafeonline.org/ Get Safe Online will help you protect yourself against Internet threats. The site is sponsored by government

More information

Spyware is the latest epidemic security threat. Investigating Factors Affecting

Spyware is the latest epidemic security threat. Investigating Factors Affecting By Younghwa Lee and Kenneth A. Kozar Investigating Factors Affecting of Anti Spyware is the latest epidemic security threat for Internet users. There are various types of spyware programs (see Table 1)

More information

THE EASY WAY TO SECURITY AND SIMPLICITY. Business Suite

THE EASY WAY TO SECURITY AND SIMPLICITY. Business Suite THE EASY WAY TO SECURITY AND SIMPLICITY Business Suite CHOOSE DATA SECURITY THE EASY WAY Choosing the right business IT security is often a difficult task that requires going through endless options. F-Secure

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to

More information

Secure Web Gateways Buyer s Guide >

Secure Web Gateways Buyer s Guide > White Paper Secure Web Gateways Buyer s Guide > (Abbreviated Version) The web is the number one source for malware distribution. With more than 2 million 1 new pages added every day and 10,000 new malicious

More information

SECURE SHARING AND COMMUNICATION. Protection for servers, email and collaboration

SECURE SHARING AND COMMUNICATION. Protection for servers, email and collaboration SECURE SHARING AND COMMUNICATION Protection for servers, email and collaboration THE VALUE OF SECURITY Most malware attacks use software vulnerabilities to reach their targets. Only 90% of malware attacks

More information

Network Security Report:

Network Security Report: Network Security Report: The State of Network Security in Schools Managing tight budgets. Complying with regulatory requirements. Supporting Internet-based learning technologies. There are many challenges

More information

2012 Endpoint Security Best Practices Survey

2012 Endpoint Security Best Practices Survey WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners

More information

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Guideline for Prevention of Spyware and other Potentially Unwanted Software Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,

More information

Sygate Secure Enterprise and Alcatel

Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and

More information

TLP WHITE. Denial of service attacks: what you need to know

TLP WHITE. Denial of service attacks: what you need to know Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...

More information

Empirical Analysis of Software Usage to Drive Policy Recommendations. May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance

Empirical Analysis of Software Usage to Drive Policy Recommendations. May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance Empirical Analysis of Software Usage to Drive Policy Recommendations May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance Outline Introduction to BSA Global Studies and their Methodology 2014 BSA

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

The Path Forward. International Women s Day 2012 Global Research Results

The Path Forward. International Women s Day 2012 Global Research Results The Path Forward International Women s Day 2012 Global Research Results Research objectives Accenture conducted its global research study, The Path Forward for release on International Women s Day to gain

More information

Paul Nguyen. 2014 CSG Interna0onal

Paul Nguyen. 2014 CSG Interna0onal Paul Nguyen 2014 CSG Interna0onal Security is Top- of- Mind Everywhere High- profile breaches: 2K+ breaches expose nearly 1B records in 2013 Increased regulatory pressure State- sponsored hacking around

More information

Uncover security risks on your enterprise network

Uncover security risks on your enterprise network Uncover security risks on your enterprise network Sign up for Check Point s on-site Security Checkup. About this presentation: The key message of this presentation is that organizations should sign up

More information

The Value of Financial Planning

The Value of Financial Planning The Value of Financial Planning FPSB s Global Consumer Survey Danel Kuhlmann Financial Planning Standards Board Marketing & Communications Director 1 Copyright 2015 Financial Planning Standards Board Who

More information

Security Effectiveness Framework Study

Security Effectiveness Framework Study Security Effectiveness Framework Study Is your organisation effective in managing its security operations? Sponsored by: HP Information Security, and Check Point Software Technologies Ltd. 31 July 2010

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic 1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

2011 Cell Phone Consumer Attitudes Study

2011 Cell Phone Consumer Attitudes Study 2011 Cell Phone Consumer Attitudes Study Prepared for: CWTA April 29, 2011 Copyright 2009-2012 Quorus Consulting Group Ltd. Table of Contents Executive Summary 3 Research Objectives and Methodology 9 Detailed

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

The Value of Financial Planning and Awareness of CFP Certification: A Global Financial Planning Survey Singapore Results

The Value of Financial Planning and Awareness of CFP Certification: A Global Financial Planning Survey Singapore Results The Value of Financial Planning and Awareness of CFP Certification: A Global Financial Planning Survey Singapore Results 1 Copyright 2015 Financial Planning Standards Board How was the global survey conducted?

More information

Instant Messaging, VoIP, P2P, and games in the workplace: How to take back control

Instant Messaging, VoIP, P2P, and games in the workplace: How to take back control Instant Messaging, VoIP, P2P, and games in the workplace: How to take back control Employees installing and using unauthorized applications like Instant Messaging, VoIP, games and peer-to-peer file-sharing

More information

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012 Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives Initiation date: January 2012 Completion date: June 2012 Nomination submitted by: Samuel A. Nixon

More information

Understanding Security Complexity in 21 st Century IT Environments:

Understanding Security Complexity in 21 st Century IT Environments: Understanding Security Complexity in 21 st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & Germany Sponsored by Check Point Software Technologies Independently conducted

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

CSI/FBI 2000 COMPUTER CRIME AND SECURITY SURVEY

CSI/FBI 2000 COMPUTER CRIME AND SECURITY SURVEY CSI/FBI 00 COMPUTER CRIME AND SECURITY SURVEY Statement of intent This survey was conducted by the Computer Security Institute (CSI) in association with the San Francisco Computer Crime Squad of the Federal

More information

The definitive guide to consumer perceptions on home security in Australia. Secure Homes Report. ADT Always There

The definitive guide to consumer perceptions on home security in Australia. Secure Homes Report. ADT Always There The definitive guide to consumer perceptions on home security in Australia Secure Homes Report 2012 ADT Always There KEY FINDINGS AT A GLANCE 30% of surveyed residents have been a victim of a break-in

More information

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser) 1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 11 THINGS YOUR FIREWALL SHOULD DO a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 2 THE GUIDE OF BY DALE SHULMISTRA Dale Shulmistra is a Technology Strategist at Invenio IT, responsible for

More information

Endpoint Protection Small Business Edition 2013?

Endpoint Protection Small Business Edition 2013? Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,

More information

Top Four Considerations for Securing Microsoft SharePoint

Top Four Considerations for Securing Microsoft SharePoint Top Four Considerations for Securing by Chris McCormack, Product Marketing Manager, Sophos is now the standard for internal and external collaboration and content management in much the same way Microsoft

More information

Digital War in e-business

Digital War in e-business Digital War in e-business Ricci Ieong, Secretary of ISFS, Senior Security Consultant, PrivyLink (HK) Ltd. Trend in Internet Commerce Market More Internet Commerce Market G Increase in Business to Commerce

More information

Kiwis Managing their Online Identity Information

Kiwis Managing their Online Identity Information Kiwis Managing their Online Identity Information Interim Report Survey Findings Professor Miriam Lips, Dr Elizabeth Eppel, Dr Dalice Sim, Lynn Barlow and Dr Karl Lofgren Victoria University of Wellington

More information

Surveying the Digital Future

Surveying the Digital Future www.ccp.ucla.edu The UCLA Internet Report Surveying the Digital Future Year Three UCLA Center for Communication Policy February 2003 THE UCLA INTERNET REPORT Surveying the Digital Future YEAR THREE Jeffrey

More information

Saheel KHOYRATTY. Partner Technology Advisor

Saheel KHOYRATTY. Partner Technology Advisor Saheel KHOYRATTY Partner Technology Advisor The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment

More information

Statistical Analysis of Internet Security Threats. Daniel G. James

Statistical Analysis of Internet Security Threats. Daniel G. James Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There

More information

Student Tech Security Training. ITS Security Office

Student Tech Security Training. ITS Security Office Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with

More information

2009 Antispyware Coalition Public Workshop

2009 Antispyware Coalition Public Workshop 2009 Antispyware Coalition Public Workshop Jeffrey Fox Technology Editor, Consumer Reports Media contact: Lauren Hackett, 914-378-2561 Background For several years, Consumer Reports has been testing and

More information

ViRobot Desktop 5.5. User s Guide

ViRobot Desktop 5.5. User s Guide ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,

More information

How To Protect Your Endpoints From Attack

How To Protect Your Endpoints From Attack 2012 Endpoint Security Best Practices Survey GLOBAL RESULTS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Top tier organizations fare better against attacks... 8 Finding 2: Top tier organizations

More information

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches

More information

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) MOBILE SECURITY Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) JULY 2014 INTRODUCTION BYOD SECURITY 2014 It s no surprise that there are many articles and papers on

More information

1) Outsourcing ERP systems helps to lower the cost of software ownership and maintenance. Answer: TRUE Diff: 1 Page Ref: 268

1) Outsourcing ERP systems helps to lower the cost of software ownership and maintenance. Answer: TRUE Diff: 1 Page Ref: 268 Enterprise Systems for Management, 2e (Motiwalla/Thompson) Chapter 10 Global, Ethics, and Security Management 1) Outsourcing ERP systems helps to lower the cost of software ownership and maintenance. Diff:

More information

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ: Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check

More information

Osterman Research Executive Summary

Osterman Research Executive Summary Osterman Research Executive Summary Report Focus Any email user, IT manager, CIO or network administrator will attest to the fact that threats introduced into an organization through the email system and,

More information

The Cisco Connected World Technology Report

The Cisco Connected World Technology Report The Cisco Connected World Technology Report September 21, 2011 2011 Cisco and/or its affiliates. All rights reserved. 1 Timing and Sample Qualifications This report discusses the findings for 1,441 College

More information

Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise

Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise Solution Overview Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise CISCO ASA 5500 SERIES SSL / IPSEC VPN EDITION PROVIDES CUSTOMIZABLE, SECURE, AND COST- EFFECTIVE REMOTE ACCESS The Cisco

More information

2012 Bit9 Cyber Security Research Report

2012 Bit9 Cyber Security Research Report 2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by

More information