THE GENERATION GAP IN COMPUTER SECURITY:



Similar documents
THE RISK OF SOCIAL ENGINEERING ON INFORMATION SECURITY:

The Attacker s Target: The Small Business

2012 NORTON CYBERCRIME REPORT

COLLABORATION TRENDS AND TECHNOLOGY

Security Solutions for HIPAA Compliance

The Evolution of IPS. Intrusion Prevention (Protection) Systems aren't what they used to be

Check Point Partner Marketing Campaign Plan

2012 NCSA / McAfee Online Safety Survey

PROTECTING YOUR DIGITAL LIFE

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.

BAE Systems Cyber Security Survey Report

Zone Labs Integrity Smarter Enterprise Security

McAfee Total Protection Reduce the Complexity of Managing Security

Managing Security Risks in Modern IT Networks

2014 Teen Internet Safety Survey. Conducted by The Futures Company

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012

How To Prevent Cybercrime

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.

PEW INTERNET PROJECT DATA MEMO. Sydney Jones, Research Assistant & Susannah Fox, Associate Director

Spyware: Securing gateway and endpoint against data theft

Mobile Banking and Payment Trends What You Need to Know

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Global IT Security Risks

High Speed Internet - User Guide. Welcome to. your world.

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

CloudDesk - Security in the Cloud INFORMATION

Remote Managed Services

Working from Anywhere Exploring Remote Access Technologies

Check Point Whitepaper. Check Point Abra: A Virtual Secure Workspace Technical Whitepaper

STOP THINK CLICK Seven Practices for Safer Computing

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Cisco ASA 5500 Series VPN Edition for the Enterprise

The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens

Spyware is the latest epidemic security threat. Investigating Factors Affecting

2012 NCSA / Symantec. National Small Business Study

ONE Mail Direct for Mobile Devices

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

Secure Web Gateways Buyer s Guide >

SECURE SHARING AND COMMUNICATION. Protection for servers, and collaboration

Network Security Report:

2012 Endpoint Security Best Practices Survey

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Sygate Secure Enterprise and Alcatel

TLP WHITE. Denial of service attacks: what you need to know

HomeNet. Gateway User Guide

The Path Forward. International Women s Day 2012 Global Research Results

Uncover security risks on your enterprise network

The Value of Financial Planning

Security Effectiveness Framework Study

AVeS Cloud Security powered by SYMANTEC TM

Internet Safety Fact Sheet Facts about Social Networking:

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

2011 Cell Phone Consumer Attitudes Study

Youth Online Behavior

The Value of Financial Planning and Awareness of CFP Certification: A Global Financial Planning Survey Singapore Results

Understanding Security Complexity in 21 st Century IT Environments:

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

CSI/FBI 2000 COMPUTER CRIME AND SECURITY SURVEY

The definitive guide to consumer perceptions on home security in Australia. Secure Homes Report. ADT Always There

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

Endpoint Protection Small Business Edition 2013?

Top Four Considerations for Securing Microsoft SharePoint

Digital War in e-business

Surveying the Digital Future

Saheel KHOYRATTY. Partner Technology Advisor

Student Tech Security Training. ITS Security Office

2009 Antispyware Coalition Public Workshop

ViRobot Desktop 5.5. User s Guide

How To Protect Your Endpoints From Attack

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

1) Outsourcing ERP systems helps to lower the cost of software ownership and maintenance. Answer: TRUE Diff: 1 Page Ref: 268

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise

Transcription:

Introduction The broad adoption of digital media and social networking combined with the increasing amount of sensitive data stored online is making personal computer security more important than ever. But do different generations understand this problem and protect their systems while online? Does the younger, more tech-savvy generation manage computer security more effectively, or do more mature individuals who are often more guarded with their personal data protect themselves better? The following report, sponsored by ZoneAlarm (Check Point Software Technologies consumer business), presents the results of a global survey of 1,245 PC users conducted in the United States, Canada, United Kingdom, Germany, and Australia during March 2012. The goal of this study was to quantify generational differences towards personal computer security. In this report, Gen Y is defined as 18- to 25-year-olds, and Baby Boomers refers to 56- to 65-year olds. Key Findings Computer security increases in priority with age Only 31% of Gen Y participants rank security as the most important consideration when making decisions about their computers compared to 58% of Baby Boomers Gen Y is more likely to prioritize entertainment and community above security Approximately 36% of Baby Boomers are very concerned about security and privacy compared to only of Gen Y Baby Boomers are more concerned about email attacks; Gen Y is more concerned about attacks through social networks and P2P file-sharing networks Gen Y is overconfident in its security knowledge 63% of Gen Y claims to be knowledgeable about security compared to 59% of Baby Boomers Yet, of Gen Y respondents have had security issues in the past two years compared to only 42% of Baby Boomers Gen Y has less sophisticated security due to cost and technical barriers Gen Y is less likely to use paid antivirus, 3rd-party firewalls, or integrated security suites than Baby Boomers 45% of Gen Y participants say security software is too expensive compared to 37% of Baby Boomers Sensitive data is stored on computers yet participants, especially Gen Y, ignore security best practices 84% of people keep sensitive data, such as tax records, financial info, and passwords on their computers Among participants of all generations, 71% do not follow security best practices of supplementing antivirus software with a firewall 78% of Gen Y do not follow security best practices compared to 53% of Baby Boomers Sponsored by

Detailed Findings Importance of computer security increases with age Participants were asked to rate the relative importance of different computer-related activities when making decisions about their computers and the applications used, including: Security: Confidence that personal information is safe and systems are secure Productivity: Quick access to applications such as Microsoft Office, email, calendars, to-do lists Entertainment: The organization and use of music, video, and games Information: Access to news, product research, and online personal accounts Community: Interaction via social media, instant messaging, Internet calls, and video chat Among all participants, almost half (48%) ranked security as the most important of these activities. However, there was a clear trend that younger participants were much less likely to rank security as their most important consideration than older participants. Security most important - by age 70% 60% 40% 30% 0% 31% 18-25 () 46% 51% 54% 58% 26-35 36-45 46-55 56-65 (Baby Boomers) 48% Gen Y prioritizes entertainment and community Gen Y was 27% less likely (31% vs. 58%) to rank security as its top priority compared to Baby Boomers. Instead Gen Y participants were much more likely to put a higher priority on entertainment and community. Gen Y participants were 18% more likely (22% vs. 4%) to indicate entertainment was their top priority and 14% more likely (18% vs. 4%) to indicate community was most important compared to Baby Boomers. Page 2

Baby Boomers more concerned about security and privacy While 28% of all survey participants reported being very concerned about security and privacy when using their computers, Baby Boomers were much more likely, 36%, to describe themselves this way than younger generations. In comparison, only of Gen Y participants indicated that they were very concerned about security. Very concerned about computer security and privacy - by age 40% 35% 30% 25% 15% 5% 0% 18-25 () 32% 34% 36% 26-35 36-45 46-55 56-65 (Baby Boomers) 28% Generational differences in concerns about security attacks Both Gen Y and Baby Boomers were most concerned about the potential security threat from infected websites. However, there were distinct differences in the types of security attacks that caused concern among the different age groups. Baby Boomers were much more concerned about attacks coming through email, (35% vs. 18%) whereas Gen Y indicated greater concern (24% vs. 9%) about attacks originating from social networks or P2P file-sharing networks. Source of security a.acks causing most concern Infected websites 49% 53% Email 18% 35% Social and P2P networks 9% 24% 0% 30% 40% 60% Page 3

Gen Y is overconfident about security knowledge Gen Y participants described themselves as slightly more knowledgeable about security with 63% indicating that they were knowledgeable about security threats compared to 59% of Baby Boomers. Knowledgeable about security 59% 63% 40% 45% 55% 60% 65% However, Gen Y participants reported that they actually experienced more security problems than Baby Boomers. Half () of all Gen Y participants indicated that they have had computer security issues in the past two years compared to only 42% of Baby Boomers. Have experienced computer security issues in the past two years 42% 25% 30% 35% 40% 45% 55% In particular, Gen Y reported more virus infections (42%) compared to Baby Boomers (35%). Have you had any of the following computer security issues in the last 2 years? Virus infeccon 38% 35% 42% Hacked computer or account ID the0/stolen finanical info 4% 4% 4% 9% 8% 0% 5% 15% 25% 30% 35% 40% 45% Page 4

Gen Y less likely to use additional security software Gen Y is less likely to use additional security software beyond the basics that come with the Windows operating system. These participants reported using fewer paid antivirus, 3rd-party firewalls, and integrated security suites that include both a firewall and antivirus. Use addi(onal security so1ware Integrated security suite 12% 27% Paid an8virus 24% 34% 3rd- party firewall 22% 0% 5% 15% 25% 30% 35% 40% Cost and technical issues create barrier to greater use of security software Gen Y has greater cost sensitivity than Baby Boomers, which is a barrier to using more paid security software. More Gen Y respondents, 45%, claimed that one of the reasons they do not use more security software is because it is too expensive. This compares to only 37% of Baby Boomers citing the same issue. Reasons for not using more security so1ware It's too expensive 37% 45% I think MicrosoA has me covered with built- in security soaware 28% 26% Security soaware slows down my computer 16% 18% I have had technical problems with security soaware in the past 12% 12% I have had problems upda:ng my security soaware in the past 6% 0% 5% 15% 25% 30% 35% 40% 45% Page 5

Agreement among generations that security software should be free While there were many differences between generations in this study, the opinion that security software should be free was commonly shared across all ages. Approximately half of all participants, 48%, indicated that free is the price they expect to pay for security software. Expect security so.ware to be free 60% 40% 30% 0% 48% 18-25 () 41% 53% 26-35 36-45 46-55 56-65 (Baby Boomers) 48% generations keep sensitive data on their computers The difference in attitudes towards security was unrelated to the amount of personal information stored on their computers. Across all age groups, most participants (84%) kept sensitive personal data such as tax records, financial information, and passwords on their computers. Keep personal data on their computers - by age 90% 80% 70% 60% 40% 30% 0% 82% 18-25 () 86% 83% 86% 26-35 36-45 46-55 56-65 (Baby Boomers) 82% 84% Page 6

Participants, especially Gen Y, do not follow security best practices A generally accepted best practice among all personal computing security experts is that each computer should have a two-way firewall in addition to antivirus software. Given these guidelines, we evaluated how many participants were following these best practices. In general, 71% of all survey participants do not follow these security best practices. Baby Boomers did a much better job than any other generation with almost half following these best practices. Gen Y was the least protected with 78% not following these best practices. Do not follow security best prac3ces 71% 53% 78% 0% 30% 40% 60% 70% 80% 90% Survey Methodology In March 2012, independent groups of PC users were invited to participate in a Web survey on the topic of personal computer security sponsored by ZoneAlarm. A total of 1,245 respondents across the United States, Canada, United Kingdom, Germany, and Australia completed the survey, all of whom had responsibility for purchasing and maintaining their personal desktop or laptop computer. Australia 17% Loca%on United States 33% 56-65 years old Age of Par*cipants 18-25 years old Gender Male 41% Germany 17% United Kingdom 17% Canada 16% 46-55 years old 36-45 years old 26-35 years old Female 59% Page 7

About Dimensional Research Dimensional Research provides practical marketing research to help technology companies make their customers more successful. Our researchers are experts in the people, processes, and technology of corporate IT and understand how IT organizations operate. We partner with our clients to deliver actionable information that reduces risks, increases customer satisfaction, and grows the business. For more information visit. About Check Point Software Technologies Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft. Page 8