2012 NCSA / McAfee Online Safety Survey



Similar documents
2011 NCSA / McAfee Internet Home Users Survey

National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey

2012 NCSA / Symantec. National Small Business Study

Youth Online Behavior

2011 NATIONAL SMALL BUSINESS STUDY

Internet Security Priorities. Benenson Strategy Group and American Viewpoint December 20, 2013

National Cyber Security Month 2015: Daily Security Awareness Tips

Cybersecurity Protecting Yourself, Your Business, Your Clients

Cyber Security. Securing Your Mobile and Online Banking Transactions

BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary

Malware & Botnets. Botnets

STOP. THINK. CONNECT. Online Safety Quiz

2010 NCSA / Visa Inc. Small Business Study

Preparing Millennials to Lead in Cyberspace October 2014

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

2012 NORTON CYBERCRIME REPORT

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

How To Prevent Cybercrime

Cyber Security Awareness. Internet Safety Intro.

2014 Teen Internet Safety Survey. Conducted by The Futures Company

Special Eurobarometer 423 CYBER SECURITY SUMMARY

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students

Frisco ISD

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Keeping Safe Online. Program Support Notes. Junior - Senior Secondary. 24 mins. Health and Welfare. VEA Bringing Learning to Life

The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States

CONSUMER SECURITY RISKS SURVEY 2014: MULTI-DEVICE THREATS IN A MULTI-DEVICE WORLD. July, 2014

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Protect yourself online

Small businesses: What you need to know about cyber security

How To Deal With Social Media At Larks Hill J & I School

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online

STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION

NORTON CYBERSECURITY INSIGHTS REPORT

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Social Media Status Update Messages. Twitter

How-To Guide: Cyber Security. Content Provided by

10 Quick Tips to Mobile Security

Oakland Family Services - Was Your Hacked?

Course Overview and Outline

Internet Safety & Awareness. Dan Tomlinson 02/23/2013

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU

Who Needs Parental Controls?

How To Use Your Cell Phone At Renaissance Academy Charter School

How To Avoid The Identity Theft Predators

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)

EADS up. stop think connect

THE STOP.THINK.CONNECT. CAMPAIGN: GEORGE MASON UNIVERSITY CYBERSECURITY AWARENESS EVENT

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012

Bring Your Own Device

Internet threats: steps to security for your small business

Virginia Primary School Learning Together, Learning for our Future

National Cyber Policy Office

Ingle Farm East Primary School

Digital Citizenship Lesson Plan

2011 Parent-Teen Internet Safety Report

Electronic Communications Guidance for School Staff 2013/2014

July 2015 CPS Computer and Internet Use Supplement

HOW TO STAY SAFE. Smartphones

INTERNET, AND COMPUTER USE POLICY.

Norton Online Reputation Report:

Understand What s Going On

Maumee City School District Bylaws & Policies

Bright Local Schools BYOD Acceptable Use Policy

E-Safety Issues and Online Safety

2016 Cyber Security Calendar. Neela, Grade 4 State of Delaware

Nationwide Cyber Security Survey

National Cybersecurity Awareness Campaign Families Presentation

High Speed Internet - User Guide. Welcome to. your world.

Social Media Guidelines Resource

Special Eurobarometer 423 CYBER SECURITY REPORT

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

HEADS up. stop think connect

Activity 1: Your online presence

BYOD and Digital Citizenship at Trumbull High School

Technology Acceptable Use Policy

Cyber Safety Use Agreement - ICT at School

E-Safety Issues and Online Safety

Combating Identity Theft: Tips to Reduce Your Cybersecurity Risks. September 16, 2015

2015 Cyber Security Calendar. Ashlyn, Grade 10 State of Oklahoma

SOCIAL NETWORKING SITES

Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community.

National Cybersecurity Awareness Campaign. Kids Presentation

SENIORS ONLINE SECURITY

Sibford School Student Computer Acceptable Use Policy

Identity Protection Guide. The more you know, the better you can protect yourself.

Background. Executive Summary

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

2011 Cell Phone Consumer Attitudes Study

Chapter 12 - Software. Unit 1 Role and function of application software

Clarity Middle School Survey

Online Security Tips

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Years 3-7 Acceptable Use Policy & Agreement

CYBERSAFETY USE AGREEMENT for Cambridge High School Students

Transcription:

2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012

Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security Alliance (NCSA) and McAfee to conduct an online safety survey of 1,000 adults nationwide. A sampling of JZ Analytics online panel, which is representative of the adult population of the U.S., was invited to participate from August 31, 2012 to September 3, 2012. Slight weights were added to region, age, race, gender, party, religion and education to more accurately reflect the population. The margin of error is +/- 3.2 percentage points and margins of error are higher in subgroups. The MOE calculation is for sampling error only. Narrative Analysis 1. On a scale of one to five, with one being not safe at all and five being completely safe, how safe do you feel from viruses, malware and hackers while on the Internet? Not safe at all 8% Not Completely Safe 90% 2 12% 3 37% 4 33% Completely safe 8% Not sure 2% 2. Which of the following do you store digitally on a desktop or laptop computer? (Choose all that apply) Table 1. Storing Digitally Desktop/ Laptop Digital Photos 73% Music 54% Other personal documents 44% Videos 35% Calendar 23% Banking information 26% Personal records 24% Tax returns 22% Business contacts 18% Business records 12% Other business documents 8% Health information 15% Torrents 6% None of these 8% No desktop/laptop 1% Not sure 3% 1

3. Which of the following do you store digitally on a smartphone? (Choose all that apply) Table 2. Storing Digitally Smartphone Digital Photos 39% Music 32% Other personal documents 8% Videos 21% Calendar 21% Banking information 6% Personal records 7% Tax returns 3% Business contacts 9% Business records 3% Other business documents 1% Health information 2% Torrents <1% None of these 10% No smartphone 42% Not sure 2% 4. Which of the following do you store digitally on a tablet? (Choose all that apply) Table 3. Storing Digitally Tablet Digital Photos 15% Music 14% Other personal documents 6% Videos 10% Calendar 8% Banking information 4% Personal records 5% Tax returns 3% Business contacts 3% Business records 3% Other business documents 3% Health information 2% Torrents <1% None of these 10% No tablet 67% Not sure 2% 2

5. Which of the following do you store digitally on a cloud service? (Choose all that apply) Table 4. Storing Digitally Cloud Service Digital Photos 15% Music 16% Other personal documents 8% Videos 9% Calendar 8% Banking information 2% Personal records 5% Tax returns 4% Business contacts 5% Business records 4% Other business documents 3% Health information 2% Torrents 1% None of these 7% No desktop/laptop 66% Not sure 3% 6. When was the last time you changed the password on a major online account without being prompted to do so by the service provider? Within the last week 13% Within the last month 23% Sometime in the past six months 23% Within the last year 14% Never 17% Not sure 10% 7. How often do you change passwords for your social media account(s)? Weekly 6% Monthly 11% Twice a year 13% Once a year 19% Never 42% Not sure 10% 8. How often do you change passwords for your banking account(s)? Weekly 8% Monthly 16% Twice a year 19% Once a year 18% 3

Never 28% Not sure 12% 9. Which device do you feel the safest accessing the Internet with? Desktop or laptop 61% Smartphone 9% Tablet 3% I have only accessed the Internet with a desktop or laptop 22% Not sure 6% 10. Do you use your smartphone or mobile device to access the Internet? Yes 49% No 10% Do not own a smartphone or mobile device that accesses the Internet 41% 11. In the last year, have you been notified by any businesses, online service providers or an organization that any information about you (password, credit card number, email address, or other personally identifiable information) has been lost or compromised because of a data breach? Yes 26% No 69% Not sure 6% 12. In the last six months, which of the following have you done from your smartphone at least once? Table 5. Smartphone Activities Smartphone Keep a list of personal contacts 57% Store photos 68% Social networking 57% Keep a calendar 45% Instant message 43% Research potential purchases 29% Access work email 22% Access personal email 58% Watch videos/tv shows 34% Banking 33% Shop 27% Store documents 12% 4

Make online payments 26% Make a point sale purchase 9% Transfer money via a third party payment website/app 15% Access work documents or databases on a server 8% Online gaming 19% Post to a blog 8% Read blog 22% Purchase goods from auction sites 7% Other 4% None of these 10% Not sure 3% 13. Are you allowed to use a personal tablet, smartphone or laptop to perform job functions? Yes 48% No 47% Not sure 5% 14. Do you use a personal tablet, smartphone, or laptop to connect to your work network? Yes 31% No 64% Not sure 4% 15. When you use your personal device on a work network, does your company have policies/training/security requirements that you must follow? Yes 42% No 44% Not sure 14% 16. Do you agree or disagree that a safe and secure Internet is critical to our nation's economic security? Strongly agree 66% Somewhat agree 24% Somewhat disagree 4% Strongly disagree 2% Not sure 4% 5

17. When you think of the kinds of things that can happen to you on the Internet, which of the following are you the most concerned about? Table 6. Internet Concerns Identity theft 41% Loss of privacy 5% Someone hacking into my 13% (or my family's) financial information Someone monitoring or 4% recording my online account activity Someone hacking my email 3% or other non-financial accounts Someone hacking my 2% social media account A cyber criminal gaining 3% information about my family or me Getting infected with 16% malware or virus Harassment or stalking 1% Falling victim to an online 4% scam or fraud Someone hacking my 3% online connections or network Other <1% Not sure 5% 18. Which of the following online risks are you most concerned about when it comes to your child(ren)? Table 7. Parental Concerns Adult sexual content & 39% pornogrophy Portrayals of drug or 3% alcohol use Bullying or harassment 10% from peers Contact with strangers 27% Identity theft 9% Loss of personal 1% information Long-term damage to their 2% 6

reputation None of these 3% Not sure 5% 19-23. Please choose which age range you think is the most appropriate for a child to first own... Table 8. Appropriate Age Ownership Tablet Smartphone Desktop/ Laptop Email Account Social Network Account 1-3 years-old 2% 1% 3% 1% <1% 4-6 years-old 5% <1% 8% 2% <1% 7-9 years-old 9% 3% 18% 5% 2% 10-13 years-old 21% 16% 30% 29% 9% 14-16 years-old 25% 37% 24% 33% 31% More that 16 years-old 31% 36% 12% 25% 45% Never 3% 3% 1% 2% 8% Not Sure 5% 3% 3% 4% 5% 24. How safe do you feel your smartphone is from hackers, malware or other types of cyber crime? Very safe 15% Somewhat safe 49% Somewhat unsafe 20% Not safe at all 9% Not sure 8% 25. Have you ever backed up your smartphone by storing its data or information elsewhere? Yes 38% No 58% Not sure 5% 26. Have you installed any security software or apps on your smartphone in order to make it more secure from viruses or malware? Yes 31% No 64% Not sure 6% 27. Are you more or less cautious using the Internet on your smartphone than on your desktop/laptop? Much more 19% Somewhat more 25% Somewhat less 11% Much less 7% About the same 32% 7

Do not own a desktop or laptop 2% Not sure 4% 28. Have you ever decided not to download an app to your smart phone over a privacy concern? Yes 58% No 35% Not sure 7% (If Q28 = Yes) 29. What were you concerned about? The use of my location 39% Unsure about the reputation of the app developer/service 40% Identity theft 55% Access to information on my device such as contacts or social networks 41% Unsure of what data about me was being collected and how it would be used 48% A security concern 44% A privacy concern 50% Contacts in social networks 16% Hackers gaining access to bank account information or financial data 36% Other 2% Not sure 2% 30. Are you concerned about the basic security of your smartphone, tablet or laptop and what could happen to it if it gets lost? Very concerned 31% Somewhat concerned 38% Not very concerned 14% Not at all concerned 10% Not sure 7% 31. To what degree is your job dependent on a safe and secure Internet? Very dependent 33% Somewhat dependent 26% Not very dependent 14% Not at all dependent 15% Not sure 12% 32. On a scale of one to five, with one being not at all disruptive and five being extremely disruptive, how disruptive would it be to your job if you lost Internet access for 48-hours straight during a regular business week? 8

1 Not at all disruptive 13% 2 11% 3 20% 4 14% 5 Extremely disruptive 33% Not sure 9% 33. If a trusted third party such as your Internet service provider, your financial institution, a favorite e-commerce site or online service provider knew that your computer was infected with a virus or malware do you agree or disagree that you would want it to notify you? Strongly agree 66% Somewhat agree 20% Somewhat disagree 6% Strongly disagree 1% Not sure 7% 34. Which entity do you think is most responsible for providing information on how to stay safe and secure online? Security software provider 29% Internet service provider 31% Federal government 9% State or local government 3% Non-profit organizations <1% Other software provider <1% Companies I do business with online (banking, e-commerce, etc) 10% Other 2% Not sure 15% 35. Which of the following do you think puts you most at risk of a cyber crime or loss of personal information? Connecting to an unsecure wireless network 30% Not having any or enough security software 22% Using a public computer (such as one found at a hotel) 13% Not knowing how to identify if a site is secure 12% Not having strong passwords 7% Not updating other software (such as browser or operating system) 3% None of these 2% Not sure 12% 36. Do you agree or disagree that your local police department is equipped to handle reports and investigate crimes committed over the Internet? 9

Strongly agree 8% Somewhat agree 27% Somewhat disagree 27% Strongly disagree 25% Not sure 12% 37. Have you ever been the victim of a crime that was committed over the Internet such as identity theft, data theft, bullying or auction fraud? Yes 17% No 78% Not sure 6% 38. Do you know anyone who was the victim of a crime that was committed over the Internet such as identity theft, data theft, bullying or auction fraud? Yes 29% No 64% Not sure 8% 10