Lack of awareness of privacy and security software
Posted on 24 September 2008.
Bookmark and Share
A survey conducted by Steganos, a provider of privacy software to more than two million consumers and SMEs worldwide, has found that many users are woefully unaware of the privacy and security software and settings on their computers. The survey was conducted in July 2008 among laptop and PC users in the US and UK. The aim was to find out the levels of awareness regarding privacy and security settings, including the installation of anti-virus, firewall, anti-spam and encryption software; and users’ knowledge of the privacy settings in their web browser.

The results show that an alarmingly high proportion of users did not know what software was running on their computers to ensure they had adequate protection from hackers, malware, viruses, ‘dirty’ websites, and other online threats. More than one-tenth of respondents (13%) said they did not have any anti-virus software installed on their machines at all, while a further 9% did not know if anti-virus was installed. Almost one-fifth of respondents (19%) did not know if they had firewalls installed.

Three-fifths of the respondents (60%) did not have privacy software installed, and a further quarter (25%) did not know whether they did or not.
When asked if they knew what the privacy settings were on their browser, over half (52%) admitted they didn’t know.

Less than half (46%) of all respondents, when asked: “do you think the privacy of information stored on your computer is adequate,” said they thought they had adequate protection for their online data and security.

The survey showed that some consumers are aware of online dangers and as well as having anti-virus, anti-span, firewall, and privacy software installed, they also had encryption software installed. Encryption software ensures that should anyone have access to a user’s computer – whether through dishonest means such as theft, or innocuous means such as sharing a home PC or work laptop – any files or content the user wishes to keep private are encrypted and protected. This can include photographs, important documents such as downloaded bank statements, and music.





Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //