Connect with us

Hi, what are you looking for?

HEADLINES

McAfee study reveals disparity between consumer cybersecurity concerns and behaviors

Recent McAfee research reveals that 33% of consumers rank protecting their identity as their number one cybersecurity priority ahead of protecting privacy, connected devices, data, and connected home devices.

IMAGE FROM PIXABAY.COM

McAfee revealed findings from its survey, New Security Priorities in An Increasingly Connected World, showing that despite awareness of the need for cybersecurity, many consumers are not taking proactive steps to keep their personal information protected from identity theft. With the increased volume of attacks and breaches, 61% of consumers surveyed claimed that they are more worried about cybersecurity today than they were five years ago.

IMAGE FROM PIXABAY.COM

Recent McAfee research reveals that 33% of consumers rank protecting their identity as their number one cybersecurity priority ahead of protecting privacy, connected devices, data, and connected home devices.

“2017 was a big year for cybercriminals taking advantage of security holes in corporate networks and downloading lots of personally identifiable information about consumers, and there’s no sign of these attacks slowing down,” said Gary Davis, chief consumer security evangelist, McAfee. “It is now more important than ever for consumers to stay vigilant and take the necessary precautions to help safeguard their online identity and digital lives.”

Despite the growing risk of identity theft and fraud, only 37% of consumers have signed up for an identity theft protection solution. Additionally, 28% of consumers claim that they have no plans to sign up for a service that monitors and helps protect their identity and personal information.

Research indicates that the primary ways consumers rely on monitoring their identity include, checking online bank and credit card accounts for unauthorized charges (67%), checking social media for fraudulent posts (43%), and using credit monitoring services (37%). While these methods can be effective at monitoring, consumers need to understand that they are still vulnerable, and should take advantage of services that not only monitor but also protect against fraud, should it occur. When considering an identity theft protection solution consumers should look for a product that offers cyber monitoring of the dark web, and protection from change of address fraud.

Advertisement. Scroll to continue reading.

Tips to Stay Safe Online and Protect What Matters Most

  • Do the little things. Cybercriminals don’t have to be great at what they do to steal your personal information. Minor tactics like changing default passwords right away, and using unique password can go a long way to prevent your personal information from being stolen.
  • Research before you buy. Look up products and the manufacturer before you buy. This simple step could save you from purchasing a product with a security vulnerability. If you find a manufacturer isn’t taking security seriously, then it’s best to avoid.
  • Use identity theft protection. An identity theft protection service helps monitor use of your personally identifying information, alerts you of potential problems, and provides insurance against financial losses and recovery tools in the event of ID theft or fraud.
  • Keep devices up to date. Updating device and application software when it becomes available from the manufacturer is an important step in personal security. Many new versions of software or operating systems contain specific security updates designed to protect the user.
  • Review your account info. Regular reviews of online bank and credit account transactions can help you spot suspicious activities or purchases. If you see something suspicious report it to your financial institution and law enforcement.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

Among the primary risks are inadequate security measures and insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT...

HEADLINES

The campaigns show attackers are capitalizing on people’s increasing familiarity with completing multiple authentication steps online – a trend HP calls ‘click tolerance’. 

White Papers

IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on...

HEADLINES

Kaspersky participated in 95 independent tests and reviews, with its products being awarded first place 91 times and 92 TOP3 finishes, achieving the highest results among...

HEADLINES

‘Wangiri’ originated in Japan in the early 2000’s. The term describes the modus. ‘Wan’ is a play on the word ‘one’ while ‘giri’ means...

HEADLINES

Smart and its value brand TNT do not send text messages with clickable links. If you receive one—even if it looks like it’s from...

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

Advertisement