Consumers still fail to secure mobile data

0

People take care to protect data but forget to get basics right on mobiles and PCs

While most respondents have good security practices when going online from mobile devices and computers, they still engage in high risk behaviours that could enable hackers to breach their data, shows a new study.

The research, from Varonis, provider data governance software, stated that mobile security is high on users agenda, with more than three out of four (77%) password protecting their phone and almost half (47%) even using two-factor authentication for their personal email and online services.

Unfortunately, Varonis also found that there are some troubling bad habits. While respondents are dutifully password protecting their phones, 61% of those questioned always or frequently use the same password across multiple websites or applications putting personal information across their accounts in danger.

Two thirds of respondents (67%) admit to or suspect having sent unencrypted personal information to a business in an email.

The study revealed that 91% of respondents assume businesses protect their personal data and online identities despite reported data breaches for 93% of large organisations and 87% of small businesses in 2013.

Overall, the study shows that data security is highly valued, with 97% more willing to do business with a company that protects data and more than half (54%) would pay a premium if they feel a company is protecting their data.

The respondents exhibited several online security habits that would score fairly high on any security report card. The study found that 71% look at the fine print of the end user license agreements and terms of service.

David Gibson, vice president at Varonis, explained: 'It is encouraging that people are seeking out companies that are better at securing their data. However, the vast number of breaches occurring on an almost daily basis indicates that businesses, just like individuals, are still struggling to get the basics right in securing their data.'

Share.

About Author

Comments are closed.