Who falls prey to cyber attacks? It’s not who you think…
Date: Jun 28, 2017
Think of an identity theft victim and a few stereotypes probably come to mind, however a new study* reveals that the majority of victims are anything but stereotypical.
It turns out, people who self-identified as “tech savvy” were 18 percent more likely to be victims of online identity theft than those who weren’t. Additionally, respondents with PhD’s were more frequently victims than high school graduates. And, Apple users were 22 percent more likely than Windows users to be victims of this breach.
Still, millennials were less likely than their older counterparts to have secure information stolen online, although this may be because they haven’t risked having their personal information compromised for as long as the other age groups, but here’s a twist: The biggest group of victims is Generation X. Boomers sit between the two
Who is most likely to have their identity stolen? According to the research it’s a Gen-X woman with a PhD who considers herself tech-savvy, owns a MacBook, and uses an Android phone.
When it comes to security, many people (millennials included) feel that today, someone has taken the appropriate steps to secure the system. However the users themselves and the ‘human factor’ are some of the most significant weakness in those systems.
In that sense, it isn’t really that surprising that a self-declared tech-savvy user would be more likely to fall prey to a hack: They may have confidence in excess of their actual technical knowledge, which can lead to some pretty poor decisions.
The same goes for Mac users: It’s a long-held belief that Apple machines are less susceptible to viruses and malware. While that may have been true in the past, the greater popularity of Apple products has led to more and more malware targeting macOS and iOS.
And malware isn’t the only problem: Social engineering attacks are increasingly common, and they affect everyone regardless of OS or device type because they target vulnerabilities in humans, not systems.
Turning this data into a set of actionable items is easy and echoes the findings of other security reports: Users need training on not only how to protect their personal info, but also the importance of adhering to best practice security policies and procedures.
Find out about Fully Managed Cyber Security Awareness & Training: http://www.infosec-cloud.com/security-awareness/
Source: CBT Nuggets