Adobe Security Survey

Size: px
Start display at page:

Download "Adobe Security Survey"

Transcription

1 Adobe Security Survey October 2016 Edelman + Adobe

2 INTRODUCTION Methodology Coinciding with National Cyber Security Awareness Month (NCSAM), Edelman Intelligence, on behalf of Adobe, conducted a nationally representative survey of ~2,000 computer-owning adults in the United States to gain insights into consumer behaviors around software updates, password control, and phishing. Who? Nationally representative sample of computer-owning adults How many? Total: 2,001 Margin of error: ±2.2% Millennials (636), Gen X (715), & Baby Boomers (650)*: Margin of error: ±3.9% Men (1,003) & Women (998) How? Online Quantitative Survey When? September 7, 2016 September 16, 2016 Margin of error: ±3.1% *For the purposes of this study, Millennials are ages 18-34, Gen Xers are ages 35-54, and Baby Boomers are 55 or older COPYRIGHT 2016 DANIEL J EDELMAN INC.

3 Key Findings Software Updates Almost two thirds of people update their software immediately Security and crash control are top reasons for updating software For those who do not update their software (a small subset), the top reason is they don t trust that the update is legitimate Perceptions around software updates are genuinely positive Passwords Fewer than one fourth of people use distinct passwords for each of their accounts Many people store their passwords where others can find them A majority of people do not update passwords regularly or frequently Phishing While almost three fourths of people say they can identify phishing s, more than one third believe they have been victims of phishing Four out of ten people would still open an from an unknown sender, with Millennials the most gullible

4 Software Updates COPYRIGHT 2016 DANIEL J EDELMAN INC. 4

5 Most people update their software when updates are first released 64% Tendency to Update Computer Software Showing total 30% 4% 1% Yes, I do It varies depending on what the update is/is for No, I don t I m not sure Q1: Do you typically update the software on your computer when new updates are released? A software update is a (generally free) download that provides fixes for features that aren't working as intended or for security issues, or that adds minor software enhancements or compatibility with other software or hardware. Software updates are typically available directly through the software program or via the software maker s website.

6 Among those who typically update their software, security and crash prevention are top determinants Reasons for Updating Software Showing those who typically update their software 68% 68% 62% 55% 36% 25% It is important to install updates to keep my computer safe and secure from hackers Updating ensures my software is free of bugs and runs more smoothly / crashes less often I want to make sure all my devices, softwares, programs, etc. remain compatible I want to make sure I have the latest and greatest features I assume I have to or else I I get sick of the reminders to would compromise the update my software effectiveness of my software Q3: You mentioned you typically update the software on your computer when new updates are released. Which, if any, are your reasons for doing so? Please select all that apply.

7 Among the 1 in 3 who update their software on a variable basis, the types of fixes/improvements provided in an update are a determining factor Decision-Making Criteria for Updating Software Showing those whose updating habits vary The fixes or improvements provided in the update 63% How busy I am at the time New features provided in the update 52% 52% The time it takes to download/install the update The software program The software functionality 47% 46% 46% The software provider 40% Other 4% Q2: What criteria do you consider when deciding whether or not to update your software? Please select all that apply.

8 Among the vast majority who typically update, a plurality choose to be prompted as updates become available Typical Software Update Methods Showing those who typically update their software I typically choose to be prompted when new software updates are available 41% If the software has the option to install updates automatically without me being prompted or having to take any action, I choose this option 34% It varies depending on the software I manually check for updates (e.g., via the menu option in the software itself or on the company's website) I didn t know there was more than one way to update software 3% 9% 12% Baby Boomers who typically update their software are more likely to choose automatic updates than Millennials (38% BB, 34% GX, 31% Mill) None of the above 0% Q5: How do you typically update your software?

9 Among those who typically update their software and choose to be prompted as updates become available, 1 in 3 update on the first notification; most require between 2 and 5 notifications Average Number of Notifications Needed Before Updating Showing those who typically update their software and choose to be prompted when updates are available 2-5 First notification 1 36% 2 39% Reminders 3 to 5 6 to 10 More than 10 I never update software on my computer I update software on my computer but I don't receive update notifications/prompts 2% 2% 0% 0% 21% Major generational decline in updating after one prompt: Millennials least likely to do so and Baby Boomers most likely (23% Mill vs 39% GX & 45% BB); Millennials are more likely to need 3-5 notifications than their older counterparts (30% Mill vs 21% GX & 12% BB) Q8: If you receive update notifications, approximately how many times (on average), do you need to see a prompt to update the software on your computer before you actually do it?

10 Of the small subset of respondents who do not typically update their software *, the # 1 reason cited is a concern an update may not be legitimate Reasons for Not Updating Software Showing those who do not typically update their software* I don't always know if an update is legitimate vs a virus/malware/from a hacker The timing of updates is often inconvenient (e.g., when I am in the middle of something) I don't understand what software updates do Updating takes too long / I don t have time Someone else updates my software for me I don t care about having up-to-date software I don't think there is a benefit to updating my software Installing updates can slow my computer down or make it crash I forget to actually install them I don't trust the software company providing the update 2% (2 respondents) 17% 17% 35% (31 respondents) 27% (24 respondents) 26% (23 respondents) 26% (23 respondents) 25% (22 respondents) 25% (22 respondents) 19% (17 respondents) (15 respondents) (15 respondents) Q6: You mentioned you typically don t update the software on your computer when new updates are released. Which, if any, are your reasons for not doing so? Please select all that apply. *Note: N is under 100, and therefore data is directional in nature

11 A majority are equally or more diligent in updating mobile devices vs computers Compared to their computer(s), consumers are 17% 35% More diligent Equally diligent 24% 18% Less diligent 48% Smartphone when it comes to installing updates on their Millennials are most likely to be more diligent in updating their smartphones (45% Mill, 34% GX, 20% BB) and more likely than Baby Boomers to be more diligent in updating their tablets (22% Mill vs 15% BB) 58% Tablet Q10: Compared to your computer(s), are you more or less diligent when it comes to installing updates on your?

12 People recognize the importance of software updates I Find Updating Software to be Showing total 78% value software updates Recognizing the value of updates is lowest among Millennials (72% Mill, 80% GX, 82% BB); 1 in 4 Millennials find updates somewhat inconvenient 3% 19% 20% 38% 21% A total nuisance. They interrupt my computer use, so I hardly ever accept software updates. Somewhat inconvenient. I usually delay software updates until it s absolutely necessary. Helpful. It reminds me that I need to update my software so I can continue to be productive. Important. Having up-to-date software helps me protect my files and personal identity. Q9: Please complete the following sentence with the answer that best matches your opinion: I find updating software to be? Absolutely critical. I never want to put my personal or professional information at risk.

13 But general knowledge is relatively low Baby boomers are less likely than their younger counterparts to know know how to check if software needs to be updated (49% BB, 55% GX, 58% Mill) Software Opinions Showing total Total Agree 54% 51% 48% 24% 22% Strongly agree Somewhat agree Neither agree nor disagree Somewhat disagree Strongly disagree 32% 22% 20% 26% 30% 16% 26% 25% 25% 23% 16% 14% 11% 7% 8% I know how to check if any of the software on a computer needs to be updated I have a clear understanding of what software updates do and what the benefits of updating are I update security software more often than other softwares 9% 8% 15% 14% 24% 33% 25% 27% I don t really understand how software works in general 25% 20% Downloading software updates can make my computer more vulnerable Q7: To what extent would you agree or disagree with each of the following statements?

14 Passwords COPYRIGHT 2016 DANIEL J EDELMAN INC.14

15 Consumers have lots of accounts to keep track of Number of Password-Protected Accounts Showing total 68% 21% 1% 9% None 1 to to 50+ Not sure I lost track! Q11: Approximately how many password-protected accounts do you have? Please consider accounts such as , banking, entertainment (e.g., Netflix, social media), shopping, etc.

16 3 in 4 recycle their passwords across various accounts Password Selection Method Showing those with password-protected accounts 28% 31% Millennials are least likely to use different passwords for each account (18% Mill, 26% GX, 27% BB) 24% 17% I generally use the same password everywhere I use unique passwords for my most sensitive accounts (e.g., banking, credit card accounts, etc.) but for the most part I use the same passwords for my passwordprotected accounts I may use the same password on a few sites, but for the most part, I have unique passwords for my password-protected accounts I use a different password for each of my online accounts Q12: When signing up for password-protected accounts, which of the following best characterizes how you choose your passwords?

17 More than half (53%) use note-based methods to keep track of passwords Ways of Keeping Track of Account Passwords Showing those with password protected accounts 50% Note-based methods 38% Note-based methods 12% 11% 10% Memory - I can easily remember my password(s) I keep a printed or handwritten list close to my computer I save my passwords in a document on my computer I use password management software I keep a list in the Notes app on my cell phone Q13: How do you keep track of the password(s) for your password-protected accounts? (Please select all that apply)

18 Millennials favor memory methods, while Baby Boomers favor note-based Ways of Keeping Track of Account Passwords Showing those with password-protected accounts by generations, significant differences only Millennials Gen X Baby Boomers 69% 52% 35% 56% 68% of Baby Boomers use note-based password management (a handwritten list, password document saved on their computer, or list in the notes app of their phone) vs 49% of Gen X and 42% of Millennials 29% 22% 17% 9% 5% Memory - I can easily remember my password(s) I keep a printed or handwritten list close to my computer I keep a list in the Notes app on my cell phone Q13: How do you keep track of the password(s) for your password-protected accounts? (Please select all that apply)

19 The most common criteria in selecting passwords is security Baby Boomers are most likely to rely on website and app requirements to select their passwords; Gen X is least likely, with Millennials falling in-between (44% Mill, 36% GX, 48% BB) Password-Selection Criteria Showing those with password-protected accounts 49% 43% 41% 40% 39% 6% 5% 5% Secure (e.g. a mixture of letters, numbers and special characters, and more than 10 characters) Meets the advice or requirements of the website or app Meaningful to me, but not to anyone else Hard for others to guess Easy to remember No special characters Sentences instead of words Short (no more than six characters) Q14: Which of the following criteria do you consider when selecting a new password? (Select all that apply)

20 But no matter the standard, the majority doesn t update passwords regularly or frequently Frequency of Password Changes Showing those with password-protected accounts 34% 28% Millennials are most likely to admit they rarely change their passwords (39% Mill, 29% GX, 33% BB); Gen X more likely to change passwords regularly than Millennials (31% GX, 24% Mill) 14% 10% 8% 1% 4% Rarely (less often than once a year on average) Regularly (on average at least once a year) Frequently (on average at least once every month) Only when prompted by the site Only if I forget my password and have to reset it It depends on the account Never Q15: On average, how often do you change your passwords?

21 Phishing COPYRIGHT 2016 DANIEL J EDELMAN INC.21

22 Most believe they can identify phishing Millennials are most confident Unsure No 11% 18% Millennials are considerably more likely to believe they can identify a phishing than their older counterparts (80% Mill, 69% GX, 63% BB) 70% Yes Perceived Ability to Identify Phishing s Showing total Q20: Do you believe you are generally able to tell a phishing from a legitimate ? Phishing is a form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading as a legitimate, reputable entity or person in , IM or other communication channels.

23 Yet nearly 4 in 10 believe they may have been victims of phishing 38% say YES Phishing Victimization Showing total Millennials are more likely than their older counterparts to say they have not been victimized (49% Mill, 41% GX, 40% BB) 43% 19% 19% 19% Yes, I know I have Yes, I believe I have but am not certain I have no idea No, I do not believe I have ever been a phishing victim Q22: Do you believe you have ever been the victim of phishing?

24 With s, people are suspicious of many different items; whether or not the sender is known is a key indicator Criteria Used to Determine Legitimacy Showing those who believe they can identify a phishing 67% 66% 63% 58% 58% 54% 50% 49% 46% Whether or not I know the sender address of sender requests personal information Subject line Name or title of sender discusses money, banking, or finances Presence of unrequested attachments Presence of unrequested links Address of unrequested links Q21: What criteria do you use to determine whether an is legitimate or not? Please select all that apply.

25 But 4 in 10 would open an from an unknown sender Millennials are most likely to take actions that may put them at risk 41% say YES Behavior Around Opening s From Unknown Senders Showing total 44% 22% 8% 10% 15% 1% Yes, I always open the s I receive Yes, but only if the subject line or preview content interests me Yes, but only if the appears legitimate despite the fact that I do not personally know the sender Q16: Do you typically open s you receive from unknown senders? Yes, for another reason Only by mistake No, I never open s from unknown senders More than half of Millennials open s from unknown senders (52% Mill, 38% GX, 33% BB); Half of Baby Boomers never open s from unknown senders, even by mistake (34% Mill, 46% GX, 50% BB)

26 1 in 3 would be more likely to open an if it appeared to be from a service they use a common ploy among phishers Scenarios That Would Increase Likelihood of Opening s From Unknown Senders Showing total If the sender appeared to be affiliated with a service I already use (e.g., my bank, a social media site I belong to, etc.) 33% If the sender seemed important (for example, s from job recruiters, etc.) 25% If the subject was about re-setting an account password I want to make sure no one has hacked my accounts. If the subject line or preview discussed financial matters I want to make sure I don t accidentally ignore something important. If it were sent to my work I want to be sure I m on top of all my work correspondence.* It was sent to my personal I m always connecting with new people and want to make sure I don t miss any opportunities. 10% 10% 9% 15% If there was an attachement included 4% None of the above 41% Q17: What would make you more likely to open an from an unknown sender? Please select all that apply *Answer choice asked of those who work full or part time only

27 Millennials are the most likely to open from an unknown sender Scenarios That Would Increase Likelihood of Opening s From Unknown Senders Showing total by generations Millennials Gen X Baby Boomers 53% 39% 37% 43% 30% 29% 24% 21% 26% 14% 12% 12% 13% 8% 8% 15% 11% 4% 12% 9% 8% 8% 4% 2% If the senderif the sender seemedif the subject wasif the subject line orif it was sent to myif it was sent to myif there was an appeared to beimportant about re-setting an previewwork * personal attachment included affiliated with a account password discussed financial service I already use matters None of the above Q17: What would make you more likely to open an from an unknown sender? Please select all that apply

28 Nearly half of those who would open an from an unknown sender would also click on a link in the This rises to more than half of Millennials 47% say YES Behavior Around Clicking Links in s From Unknown Senders Showing those who open s from unknown senders Among those who open s from unknown senders, Millennials are most likely to click links present (54% Mill, 49% GX, 37% BB) 27% 39% 13% 13% 7% Yes, I always click on the links in s I receive Yes, but only if the linked site or content interests me Yes, but only if the appears legitimate despite the fact that I do not personally know the sender Only by mistake No, I never click on links in s from unknown senders Q18: Do you typically click on links in s you receive from unknown senders?

29 4 in 10 would open an attachment Again, half amongst Millennials Behavior Around Opening Attachments in s From Unknown Senders Showing those who open s from unknown senders 40% say YES Among those who open s from unknown senders, Millennials are nearly twice as likely as Baby Boomers to open attachments present (50% Mill, 42% GX, 26% BB) 50% 24% 6% 10% 10% Yes, I always open the attachments in s I receive Yes, but only if the subject line, the file name or the attachment description interests me Yes, but only if the appears legitimate despite the fact that I do not personally know the sender Only by mistake No, I never open attachments in s from unknown senders Q19: Do you typically open attachments you receive in s from unknown senders?

30 Thank You

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their

More information

Norton Online Reputation Report: Why Millennials should manage their online footprint

Norton Online Reputation Report: Why Millennials should manage their online footprint Norton Online Reputation Report: Why Millennials should manage their online footprint UK May 2016 Methodology A quantitative survey was conducted online among 1,000 mobile users aged 18-34 years who own

More information

NORTON WI-FI RISK REPORT: U.S. Results

NORTON WI-FI RISK REPORT: U.S. Results NORTON WI-FI RISK REPORT: U.S. Results Research Objective Norton by Symantec commissioned its second annual online survey, this year expanded to 15 global markets, in order to better understand consumers

More information

Methodology USA UK AUSTRALIA CANADA JAPAN N=1,008 MOE=+/-3% N=1,044 MOE=+/- 3% N=1,028 MOE=+/- 3% N=1,025 MOE=+/- 3% N=1,005 MOE=+/- 3%

Methodology USA UK AUSTRALIA CANADA JAPAN N=1,008 MOE=+/-3% N=1,044 MOE=+/- 3% N=1,028 MOE=+/- 3% N=1,025 MOE=+/- 3% N=1,005 MOE=+/- 3% Norton by Symantec commissioned an online survey across nine countries in order to better understand consumers public Wi-Fi perceptions and practices, unveiling consumer misconceptions and worries about

More information

Disrupting the Personal Lives

Disrupting the Personal Lives IS WORK EMAIL Disrupting the Personal Lives OF US EMPLOYEES? Samanage Email Overload Survey Report March 30, 2016 SCREENER QUESTION: Do you receive company emails on your mobile device? Only people who

More information

How. Biometrics. Expand the Reach of Mobile Banking ENTER

How. Biometrics. Expand the Reach of Mobile Banking ENTER How Biometrics Expand the Reach of Mobile Banking ENTER Table of Contents 01 The Mobile Banking Opportunity 02 What s Suppressing Mobile Adoption? 03 Onboarding Challenges: Proving One s Identity 04 Authentication

More information

HOW CANADIANS BANK. Annual tracking study on Canadian attitudes and behaviours towards banking. Prepared for:

HOW CANADIANS BANK. Annual tracking study on Canadian attitudes and behaviours towards banking. Prepared for: HOW CANADIANS BANK Annual tracking study on Canadian attitudes and behaviours towards banking Prepared for: 2016 METHODOLOGY Data collection method Hybrid phone/online survey methodology. 817 interviews

More information

The State of the American Traveler TM

The State of the American Traveler TM The State of the American Traveler TM MOBILE EDITION Fall 2016 Volume 22 The Mobile Edition THIS FALL EDITION of The State of the American Traveler TM explores travelers use of mobile devices in planning

More information

USPS Customer & Market Insights. USPS Mail Moments Review. Phil Vinnedge- USPS Conducted by Summit Research March 2016

USPS Customer & Market Insights. USPS Mail Moments Review. Phil Vinnedge- USPS Conducted by Summit Research March 2016 USPS Mail Moments 2016 Review Phil Vinnedge- USPS Conducted by Summit Research March 2016 Overview Summary Methodology Findings: Overall Mail Attitudes Customer Behaviors Generational Differences Bills

More information

Psychology of Passwords: Neglect is Helping Hackers Win

Psychology of Passwords: Neglect is Helping Hackers Win 2018 Psychology of Passwords: Neglect is Helping Hackers Win Table of Contents Global Cyber Threats Skyrocket but Password Behaviors Unchanged Respondent Demographics Findings at-a-glance Attention IT:

More information

How to Build a Culture of Security

How to Build a Culture of Security How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your

More information

Cyber Security Guide. For Politicians and Political Parties

Cyber Security Guide. For Politicians and Political Parties Cyber Security Guide For Politicians and Political Parties Indian Election Integrity Initiative Design by ccm.design Cover Image by Paul Dufour Helping to Safeguard the Integrity of the Electoral Process

More information

2013 NATIONAL ONLINE SAFETY STUDY

2013 NATIONAL ONLINE SAFETY STUDY 2013 NATIONAL ONLINE SAFETY STUDY Methodology and Sample Characteristics The National Cyber Security Alliance has conducted a new study with PayPal to analyze the cyber security behaviors and perceptions

More information

App-nesia in the UK The need for app re-engagement marketing

App-nesia in the UK The need for app re-engagement marketing App-nesia in the The need for app re-engagement marketing Ipsos, March 2015 Background In our mobile-first world, brands know it s key to build an app and offer a fantastic user experience. A great app

More information

2013 CONSUMER MOBILE INSIGHTS STUDY!

2013 CONSUMER MOBILE INSIGHTS STUDY! 2013 CONSUMER MOBILE INSIGHTS STUDY! Released by Jumio, Inc. & conducted by Harris Interactive 2013 CONSUMER MOBILE INSIGHTS STUDY: KEY FINDINGS & INSIGHTS! 83% of respondents worry about identity theft

More information

T he Inbox Report 2017

T he Inbox Report 2017 Search Inbox Sent 1 Fluent LLC to me 2:10 Drafts Spam Trash T he Inbox Report 2017 CONSUMER PERCEPTIONS OF EMAIL loading... REVEAL MORE Click here to Reply Inbox Report 2017 Page 1

More information

Cyber Hygiene Guide. Politicians and Political Parties

Cyber Hygiene Guide. Politicians and Political Parties Cyber Hygiene Guide Politicians and Political Parties Canadian Election Integrity Initiative Design by ccm.design Cover Image by Songquan Deng Helping to Safeguard the Integrity of the Electoral Process

More information

US 2013 Consumer Data Privacy Study Mobile Edition

US 2013 Consumer Data Privacy Study Mobile Edition RESEARCH REPORT US 2013 Consumer Data Privacy Study Mobile Edition 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0

More information

Global Mobile Consumer Survey, US Edition Overview of results

Global Mobile Consumer Survey, US Edition Overview of results Global Mobile Consumer Survey, US Edition Overview of results Smartphones front and center Mobile phones are still on the rise, in number and importance Smartphone ownership reached 85% (a YoY increase

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

2013 ISACA IT Risk/Reward Barometer Mexico Consumer Results. October

2013 ISACA IT Risk/Reward Barometer Mexico Consumer Results. October 2013 ISACA IT Risk/Reward Barometer Mexico Consumer Results October 2013 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Carina Bustamente,

More information

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication!

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! 1 Today s Speakers! Alex Doll! CEO OneID Jim Fenton! Chief Security Officer OneID 2 Contents!

More information

2013 ISACA IT Risk/Reward Barometer India Consumer Results. October

2013 ISACA IT Risk/Reward Barometer India Consumer Results. October ISACA IT Risk/Reward Barometer India Consumer Results October www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Rachel D souza, Ketchum Sampark,

More information

2013 ISACA IT Risk/Reward Barometer US Consumer Results. October

2013 ISACA IT Risk/Reward Barometer US Consumer Results. October 2013 ISACA IT Risk/Reward Barometer US Consumer Results October 2013 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Aaron Berger, Ketchum,

More information

Online Consumers Views and Usage of Ad Blocking Technologies. IAB Ad Blocking Study

Online Consumers Views and Usage of Ad Blocking Technologies. IAB Ad Blocking Study Online Consumers Views and Usage of Ad Blocking Technologies IAB Ad Blocking Study September 2014 Objectives and Methodology Objectives Estimate the incidence of ad blocking among the US adult population

More information

November 2016 G. Oscar Anderson, Senior Research Advisor AARP Research

November 2016 G. Oscar Anderson, Senior Research Advisor AARP Research November 2016 G. Oscar Anderson, Senior Research Advisor AARP Research https://doi.org/10.26419/res.00140.001 AARP is a nonprofit, nonpartisan organization, with a membership of nearly 38 million that

More information

Employee Security Awareness Training

Employee Security Awareness Training Employee Security Awareness Training September 2016 Purpose Employees have access to sensitive data through the work they perform for York. Examples of sensitive data include social security numbers, medical

More information

Consumers Use of Mobile Financial Services 2015

Consumers Use of Mobile Financial Services 2015 Consumers Use of Mobile Financial Services 2015 Arturo Gonzalez and Ellen A. Merry Division of Consumer and Community Affairs Federal Reserve Board The analysis and conclusions set forth in this presentation

More information

FAQ. Usually appear to be sent from official address

FAQ. Usually appear to be sent from official  address FAQ 1. What is Phishing Email? A form of fraud by which an attacker masquerades as a reputable entity in order to obtain your personal information. Usually appear to be sent from official email address

More information

Consumer Insights. YouGov Omnibus, 5 th -6 th April

Consumer Insights. YouGov Omnibus, 5 th -6 th April Consumer Insights YouGov Omnibus, 5 th -6 th April 2018 research@iabuk.net Methodology asked a series of questions to consumers to support the release of the Full Year 2017 Adspend Report Quantitative

More information

Customer Insights Customer Insights

Customer Insights Customer Insights ustomer Insights ustomer Insights riving While istracted ell Phone Ban August, 009 ustomer Insights Market Research Methodology This survey was conducted by Harris Interactive via its National Quorum SM

More information

T he Inbox Report REVEAL MORE CONSUMER PERCEPTIONS OF . Fluent LLC Inbox. Sent. Drafts. Spam. Trash. Click here to Reply

T he Inbox Report REVEAL MORE CONSUMER PERCEPTIONS OF  . Fluent LLC Inbox. Sent. Drafts. Spam. Trash. Click here to Reply Inbox 1 Fluent LLC Sent Drafts Spam Trash T he Inbox Report CONSUMER PERCEPTIONS OF EMAIL loading... REVEAL MORE Click here to Reply Inbox Report 2018 Americans are addicted to email.

More information

South Central Power Stop Scams

South Central Power Stop Scams Don t get tricked. People around the country have been receiving emails and phone calls from scammers. South Central Power wants to help you keep your money and prevent scams. Review the helpful tips below.

More information

Financial scams. What to look for and how to avoid them.

Financial scams. What to look for and how to avoid them. Financial scams What to look for and how to avoid them. Keep your money secure We take the security and wellbeing of our customers very seriously. So we ve created this guide to highlight the most common

More information

Why was an extra step of choosing a Security Image added to the sign-in process?

Why was an extra step of choosing a Security Image added to the sign-in process? General Information Why was an extra step of choosing a Security Image added to the sign-in process? Criminals can create websites that look very similar to legitimate business websites. We want to take

More information

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi SECURITY ON PUBLIC WI-FI New Zealand A guide to help you stay safe online while using public Wi-Fi WHAT S YOUR WI-FI PASSWORD? Enter password for the COFFEE_TIME Wi-Fi network An all too common question

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

REGULATED DOMESTIC ROAMING RESEARCH REPORT 2017

REGULATED DOMESTIC ROAMING RESEARCH REPORT 2017 REGULATED DOMESTIC ROAMING RESEARCH REPORT 2017 Researching the attitudes and perceptions of regional and remote Australians towards mobile providers and domestic roaming Vodafone Regional Roaming Research

More information

Mail Findings. Australia Post Consumer Survey. Research into consumer preferences of transactional communications

Mail Findings. Australia Post Consumer Survey. Research into consumer preferences of transactional communications Australia Post Consumer Survey Mail Findings August 2013 Australia Post Consumer Survey Mail Findings Research into consumer preferences of transactional communications Methodology The Australia Post Consumer

More information

Norton s My First Device Report. October 2018

Norton s My First Device Report. October 2018 Norton s My First Device Report By October 2018 Methodology Norton s My First Device Report is an online survey of 6,986 parents aged 18+ years old, with children aged 5-16 across 10 markets, commissioned

More information

Protecting from Attack in Office 365

Protecting  from Attack in Office 365 A hacker only needs one person to click on their fraudulent link to access credit card, debit card and Social Security numbers, names, addresses, proprietary information and other sensitive data. Protecting

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

Webomania Solutions Pvt. Ltd. 2017

Webomania Solutions Pvt. Ltd. 2017 The other name for link manipulation is Phishing or you can say link manipulation is type of phishing attack done generally to mislead the user to a replica website or a looka-like of some well-known site.

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS In order to better assist you with the transition to our new home banking service, we wanted to provide you with a list of anticipated questions and things that may need your

More information

IT & DATA SECURITY BREACH PREVENTION

IT & DATA SECURITY BREACH PREVENTION IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE Part 1: Reducing Employee and Application Risks CONTENTS EMPLOYEES: IT security hygiene best practice APPLICATIONS: Make patching a priority AS CORPORATE

More information

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk Ages 11-14 Donʼt Fall for : Activity 1 Don t bite that phishing hook! Children play a game where they study various emails and texts and try to decide which messages are legit and which are phishing scams.

More information

The State of the American Traveler TM

The State of the American Traveler TM The State of the American Traveler TM MOBILE EDITION Fall 2018 Volume 30 The Mobile Edition THIS FALL EDITION of The State of the American Traveler TM continues our ongoing exploration of travelers use

More information

ANNUAL SECURITY AWARENESS TRAINING 2012

ANNUAL SECURITY AWARENESS TRAINING 2012 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff ANNUAL SECURITY AWARENESS TRAINING 2012 NETWORK AND COMPUTER USE POLICY Users of information technology

More information

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: October Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of managed environments,

More information

Layer by Layer: Protecting from Attack in Office 365

Layer by Layer: Protecting  from Attack in Office 365 Layer by Layer: Protecting Email from Attack in Office 365 Office 365 is the world s most popular office productivity suite, with user numbers expected to surpass 100 million in 2017. With the vast amount

More information

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]

More information

Customers are Texting You

Customers are Texting You Customers are Texting You A Consumer Survey April 2016 Customers are Texting You A Consumer Survey, April 2016 About this Document Businesses that rely exclusively on voice calls and voicemails are out

More information

Newcomer Finances Toolkit. Fraud. Worksheets

Newcomer Finances Toolkit. Fraud. Worksheets Newcomer Finances Toolkit Fraud Worksheets Ottawa Community Loan Fund Fonds d emprunt Communautaire d Ottawa 22 O Meara St., Causeway Work Centre, Ottawa, ON K1Y 4N6 Tel: 613-594-3535 Fax: 613-594-8118

More information

JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN

JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN 1. Why did ESET undertake this survey? 2. Survey methodology 3. Key highlights 4. User confidence in protecting

More information

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION Introduction Why static passwords are insufficient Introducing two-factor Authentication Form Factors for OTP delivery Contact information OTP generating

More information

Multi-Factor Authentication FAQs

Multi-Factor Authentication FAQs General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart

More information

Panda Security 2010 Page 1

Panda Security 2010 Page 1 Panda Security 2010 Page 1 Executive Summary The malware economy is flourishing and affecting both consumers and businesses of all sizes. The reality is that cybercrime is growing exponentially in frequency

More information

Mail Engagement and Informed Delivery

Mail Engagement and Informed Delivery Mail Engagement and Informed Delivery February 2018 Mailers Technical Advisory Committee (MTAC) Dan Barrett Director, Customer Experience and Market Insights 1 Mail Volume Trends Between 2012 and 2017,

More information

Mobile Messaging Apps Study : India. August 2014

Mobile Messaging Apps Study : India. August 2014 Mobile Messaging Apps Study : India August 2014 Contents 1. Research Objectives & Methodology 2. Key Findings 3. Mobile Consumption Behavior 4. Message Apps Usage & Behaviors Download Intent App Awareness

More information

PBX Fraud Information

PBX Fraud Information PBX Fraud Information Increasingly, hackers are gaining access to corporate phone and/or voice mail systems. These individuals place long distance and international calls through major telecom networks

More information

Personal and business current account prompt pilot findings

Personal and business current account prompt pilot findings Personal and business current account prompt pilot findings Report Prepared for The Financial Conduct Authority Registered in London No. 2231083 Accent Marketing & Research Limited Registered Address:

More information

Verizon Enhanced Security Authentication

Verizon Enhanced Security Authentication Verizon Enhanced Security Authentication Overview Verizon introduced a new security process for Verizon s business portals to help maintain the security of your data. Over the next few months we will initiate

More information

CODE MAROON TEST SEPT. 30, 2011 SURVEY RESULTS

CODE MAROON TEST SEPT. 30, 2011 SURVEY RESULTS CODE MAROON TEST SEPT. 30, 2011 SURVEY RESULTS SMS (text) Message 1. Respondents were asked if they received the Code Maroon test by SMS (text) message. The responses indicate that 93% of the respondents

More information

Five Reasons It s Time For Secure Single Sign-On

Five Reasons It s Time For Secure Single Sign-On Five Reasons It s Time For Secure Single Sign-On From improved security to increased customer engagement, secure single sign-on is a smart choice. Executive Overview While cloud-based applications provide

More information

Paycards: Generational Trends Shaping the Future of Worker Pay

Paycards: Generational Trends Shaping the Future of Worker Pay Paycards: Generational Trends Shaping the Future of Worker Pay Exciting findings about generational perceptions of paycards and paycard features reveal appeal with Generation Z and Millennials Research

More information

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our

More information

It pays to stop and think

It pays to stop and think It pays to stop and think Protect yourself from financial fraud Together we thrive 2 In the first six months of 2018, over 34,000 people were scammed out of 145.4m At HSBC, we work hard to keep our customers

More information

How to recognize phishing s

How to recognize phishing  s Phishing email messages, websites, and phone calls are designed to steal money, steal data and/or destroy information. Cybercriminals can do this by installing malicious software on your computer or stealing

More information

WHAT S DRIVING CITIZENS CYBER INSECURITY?

WHAT S DRIVING CITIZENS CYBER INSECURITY? An Accenture Public Service Pulse Survey revealed that cyber insecurity is pervasive among U.S. citizens: Eight in 10 citizens (79 percent) express concern about the privacy and security of their personal

More information

Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS

Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS Topics Consumer identity why it is important How big a problem is identity fraud? What

More information

Local Search Insights

Local Search Insights Local Search Insights click The YP to edit Advantage master title style Summary of comscore Research November 2014 All surveys results data herein are from comscore YP Value Proposition study, September

More information

1 of 11 10/1/ :26 AM

1 of 11 10/1/ :26 AM 1 of 11 10/1/2010 12:26 AM About Us Careers Calculators Contact Us Search Home Your Money HQ ID Theft & Fraud FRAUD ALERT E-mail Scams ID Theft and Fraud Avoid Becoming a Victim What To Do If You Are a

More information

Whitepaper on AuthShield Two Factor Authentication with SAP

Whitepaper on AuthShield Two Factor Authentication with SAP Whitepaper on AuthShield Two Factor Authentication with SAP By AuthShield Labs Pvt. Ltd Table of Contents Table of Contents...2 1.Overview...4 2. Threats to account passwords...5 2.1 Social Engineering

More information

11/7/2018. Paycards: Generational Trends Shaping the Future of Worker Pay. In This Presentation We ll Cover... What is a Generation?

11/7/2018. Paycards: Generational Trends Shaping the Future of Worker Pay. In This Presentation We ll Cover... What is a Generation? Paycards: Generational Trends Shaping the Future of Worker Pay Exciting findings about generational perceptions of paycards and paycard features reveal appeal with Generation Z and Millennials Research

More information

REGULATED DOMESTIC ROAMING RESEARCH REPORT 2017

REGULATED DOMESTIC ROAMING RESEARCH REPORT 2017 REGULATED DOMESTIC ROAMING RESEARCH REPORT 2017 Researching the attitudes and perceptions of regional and remote Australians towards mobile providers and domestic roaming Vodafone Regional Roaming Research

More information

Close Your File Template

Close Your File Template In every sale there is always a scenario where I can t get someone to respond. No matter what I do. I can t get an answer from them. When people stop responding I use the Permission To. This is one of

More information

This study is brought to you courtesy of.

This study is brought to you courtesy of. This study is brought to you courtesy of www.google.com/think/insights The Inside Look at the Travel Boomer Buff Google/Nielsen Online/Sterling U.S., September 2010 Study Scope and Methodology Survey Approach

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

Rapid Software Testing Guide to Making Good Bug Reports

Rapid Software Testing Guide to Making Good Bug Reports Rapid Software Testing Guide to Making Good Bug Reports By James Bach, Satisfice, Inc. v.1.0 Bug reporting is a very important part of testing. The bug report, whether oral or written, is the single most

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

Cyber Security Basics. Presented by Darrel Karbginsky

Cyber Security Basics. Presented by Darrel Karbginsky Cyber Security Basics Presented by Darrel Karbginsky What s to come In the following slides I am going to discuss amongst other things and in no particular order things to enlighten, frighten, educate,

More information

Who We Are! Natalie Timpone

Who We Are! Natalie Timpone Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who

More information

Cyber Security Guide for NHSmail

Cyber Security Guide for NHSmail Cyber Security Guide for NHSmail Version 3.0 February 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,

More information

Finance on mobile: Canada

Finance on mobile: Canada Finance on mobile: Canada Exploring how people use their smartphones for finance activities Commissioned: 2016 Q3 This is a title and it will Google has commissioned this study for Think with Google. We're

More information

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at Thanks! Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at jim@stickleyonsecurity.com Don t forget to checkout Stickley on Security and learn about our

More information

ONLINE SAFETY. Messaging, , Vlogging and Sexting

ONLINE SAFETY. Messaging,  , Vlogging and Sexting ONLINE SAFETY Messaging, email, Vlogging and Sexting www.eitts.co.uk Contents WhatsApp & Messaging Email Vlogging Sexting THE RISKS People online are not necessarily who they say they are or seem to be.

More information

Entertainment Services: The future is mobile White Paper December 2016

Entertainment Services: The future is mobile White Paper December 2016 Entertainment Services: The future is mobile White Paper December 2016 Entertainment Services: The future is mobile White Paper Published December 2016 Version 1.0 Report Number: 042016-07 igr 12400 W.

More information

Security and Fraud Awareness

Security and Fraud Awareness Security and Fraud Awareness Our Approach to Security When it comes to your financial information, your security is our top priority and when you access your e-money account, it is important that we know

More information

T H E S H I F T T O SMARTPHONE DOMINANCE

T H E S H I F T T O SMARTPHONE DOMINANCE T H E S H I F T T O SMARTPHONE DOMINANCE Background To understand mobile migration patterns and which factors will accelerate the shift to a mobile-first for consumers and advertisers W H A T S C O V E

More information

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any OWASP Top 10 Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any tester can (and should) do security testing

More information

LCNB National Bank mymobilemoneyaccess Quick Reference Guide. Getting Set Up

LCNB National Bank mymobilemoneyaccess Quick Reference Guide. Getting Set Up Getting Set Up If you have an Android or an iphone, please visit your app store and search for My Mobile Money Access. Download the app to your phone. Then follow these simple steps: Open the app and have

More information

Consumer Preferences in Narrowband Communications Research Report

Consumer Preferences in Narrowband Communications Research Report Consumer Preferences in Narrowband Communications Research Report Research Document Publication date: 19 March 9 Main Heading Contents Section Page 1 Executive summary 1 2 Methodology 5 3 Market context

More information

NANOS SURVEY NANOS SURVEY

NANOS SURVEY NANOS SURVEY Canadians are three times more likely to say Canada should ban than allow Huawei from participating in the 5G network in Canada National survey released August, 2018 Project 2018-1260A Summary Fifty-four

More information

Security Awareness. Presented by OSU Institute of Technology

Security Awareness. Presented by OSU Institute of Technology Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless

More information

2018 Mobile Security Report

2018 Mobile Security Report 2018 Mobile Security Report CONTENTS Introduction 3 Businesses suspect their mobile workers are being hacked 4 Cafés, airports and hotels: a hotspot for Wi-Fi related security incidents 5 BYOD: Bring Your

More information

. Account & Google Message Center Guide. January Prepared by: Angela Mars IT Education and Training

. Account & Google Message Center Guide. January Prepared by: Angela Mars IT Education and Training Email Account & Google Message Center Guide January 2019 Prepared by: Angela Mars IT Education and Training Table Of Contents Email Account Information Page 4 Safe Email Practices Page 5 Recommended Email

More information

The Money Is in the Square Cash Lets Users Funds to Friends

The Money Is in the  Square Cash Lets Users  Funds to Friends The Money Is in the Email Square Cash Lets Users Email Funds to Friends By: WALTER S. MOSSBERG October 15, 2013 Square now has a service that makes transferring money to a friend as easy as sending them

More information

CIBC FirstCaribbean Mobile App. FREQUENTLY ASKED QUESTIONS (FAQs) Page 1 of 9

CIBC FirstCaribbean Mobile App. FREQUENTLY ASKED QUESTIONS (FAQs) Page 1 of 9 CIBC FirstCaribbean Mobile App FREQUENTLY ASKED QUESTIONS (FAQs) 1. What is the CIBC FirstCaribbean Mobile App? A: The CIBC FirstCaribbean Mobile App allows you to complete everyday banking functions on

More information