Homepage / Technology / The worst five states for data security
test Due Diligence Blog Digital Data Rooms for the Netherlands Board Room Apps Secure Board Management With Secure Board Portals What Happens at Board of Directors Meetings? Board Room Software Review How to Prepare Board Rooms for Effective Board Meetings Board Room Software Boosts Performance and Communication Selecting a Secure Data Room Review Local Data Room Service Review How to Find the Best Virtual Data Room Review What to Look for in a Data Room uk Provider Document Storage and Distribution Software Everything About VDRs Corporate Software Advantages How to Choose a Virtual Data Room Provider The Most Secure Way to Transfer Files How to Manage Online Board Meetings Benefits Virtual Data Room Solutions – Must-Haves for M&A and Due Diligence Best Data Room Functions for the Different Types of Industries How to Choose a VDR Software Provider How to Choose an Online Board Portal The Benefits of a Boardroom Review Board Room Online Solutions – How to Get the Most Out of Your Board Meetings Why You Need a Board Room How a Board Room Blog Can Transform Your Business Choosing the Best Board Room Format How to Have Productive and Engaging Board Directors Meetings Choosing the Right Virtual Data Room How to Keep Safe Documents Storage Teaching Kids About Online Safety Avoid Costly Mistakes With Free Data Room Services Corporate Virtual Data Secure Online Data Rooms Solutions How to Keep Share, Edit and Delete Your Data Safe Virtual Data Room Software Secrets for M&A Due Diligence What to Look For in Boardroom Providers Board of Directors Blog Posts How to Deliver Value at Your Board Meetings How to Have Effective Board Meetings Responsibilities of Board Members Deal Management – How to Effectively Manage a Complex Sales Pipeline Data Rooms For Mergers And Acquisitions How to Have a Successful Board Room Meeting Choosing a Board Room Service Provider What is a Board Room Service? Board Room Software Review – Choosing the Best Portal for Mother Board Meetings Why a Board Room Providers Review Is Important What Is a Board Room Review? Venture Software for VC Firms What Is an Assessment Report? The Importance of a Tech Audit Popular Business Applications What to Look For in a Data Room App What Are Business Applications? How to Choose a Virtual Data Room How to Plan a Data Room Review Coronavirus Guide What is a Virtual Data Room? What Is Data Science? What Is an Operating System? Turbotax Small Business Review How Online VDRs Are Used in M&A Deals Why Choose VDR Software? The Power of Business Software The Benefits of a Software Board Online Data Room Review The Importance of Tech Knowledge Improving Accuracy of Financial Data Online Business Records – How to Keep Your Online Business Records Accurate and Secure What is a Board Portal De? DealRoom Review – A Review of VDR Software M&A Due Diligence for Private Companies The Virtual Data Room Review Why Companies Use a Data Room Review to Facilitate M&A Transactions The Best File Sharing Services How Online VDRs Are Used in M&A Deals Best Virtual Data Room How to Choose a Best Board Room Provider Choosing a Data Room for Due Diligence What Is a Data Room Business Software? Best Data Room Providers Review Data Room Providers Review Mostbet Tr Resmî Web Sitesinde Giriş Ve Kayıt Olm Kumar Oynamak Için En Iyi Yerdir The Benefits of Cloud Data Services for Enterprises Online Data Room and SSL How to Build a Diverse Board of Directors Best Virtual Data Review A Data Room Service Review How Runn Makes Project Data Accessible, Accurate and Shareable Five Pillars of Information Protection The Importance of Online Business Reports Benefits of Colocation Services Virtual Data Rooms Guide Choosing a Business Virtual Data Room Choosing the Right VDR Service Review How to Conduct a Virtual Data Room Review Glory Online Casino Türkiye En Iyi Oyunları Ve Bahisleri Olan Kumarhane

Technology

The worst five states for data security

Do you use the same password for multiple accounts? Have you ever lost a phone or laptop? Do you skip installing malware or antivirus software?

If you do, you have poor “cyber hygiene” — the steps you should take to maintain device health and improve online security. It also could make you a target for a cyber attack.

Most Americans do not have safe cyber habits, which includes monitoring bank and credit card statements, updating online account passwords and watching carefully for email phishing attempts.

Fewer than 1 in 4 Americans routinely practice factors that increase online security, according to a report from Webroot, a cybersecurity company, and Ponemon Research.

The company asked 4,290 respondents across the country about their online habits and ranked each state according to a cyber hygiene index. Of the 50 states and Washington, D.C., only six had good cyber hygiene scores. More than half of the states were classified as risky.

“Regardless of the region, the riskiest states index shows that many people in the U.S. are jeopardizing their safety with inadequate cyber security practices,” said David Dufor, vice president of engineering and cyber security at Webroot.

Cyber security has become increasingly important, especially after the Equifax data breach exposed 143 million Americans. Such breaches take a financial toll: in 2017 alone, $16.8 billion was stolen by identity theft scams, according to a report by by Javelin Strategy and Research.

The five states with the worst cyber hygiene rankings were Florida, Wyoming, Montana, New Mexico and Illinois. In those states, 72 percent of respondents to Webroot’s survey said that they share their passwords, and nearly half never back up their data.

These statistics were surprising to Tyler Moffitt, a senior threat research analyst at Webroot. “I did not think that sharing passwords would be that bad,” he said.

The states with the worst data security practices also had the most dire consequences: Those states had the highest average number of people who experienced more than 10 malware infections in a single year.

Many people do not realize the importance of good security practices online until they get a virus or their identity is stolen.

“People don’t take care or think about it until after they are a victim, and that’s the wrong attitude to have,” said Moffitt.

In Webroot’s survey, respondents reported that they suffered personally, professionally and financially after becoming a victim of identity theft. These consequences can be largely avoided by taking a few simple steps proactively.

To make sure that you don’t fall victim to a cyber attack, here are Webroot’s suggestions for keeping your data safe online.

  • Use antivirus software. Paid software will work better than free software, but “it’s better to run something over nothing,” said Moffitt.
  • Don’t use the same password for multiple accounts, especially your email, and make sure your passwords are unique and strong. No more using “password” as a password.
  • Don’t share passwords. Ever.
  • Watch out for phishing attempts in your email inbox. Don’t click links or open attachments from people you don’t know. Delete emails that seem fishy.
  • Keep up to date with applications and operating system. Hackers are always coming up with new ways to scam people and steal identities.

“If you aren’t practicing good cyber hygiene, you’re not practicing good identity hygiene,” said Eva Velasquez, president and CEO of the Identity Theft Resource Center.

Most people only think to protect their passport, driver’s license and Social Security numbers, but “if you think about your identity as a puzzle, the edges keep growing,” Velasquez said, pointing out that online behavior and biometrics are now included. “We’re creating that data, but we are not the owners of it.”

Webroot’s Moffitt said it’s just as important to protect your mobile device as your laptop or desktop. He said that ultimately, hackers create ransomware for the largest pools, so he expects to see a shift towards mobile devices as they grow in popularity and use.

“In the next couple of years we’re going to see a full-fledged ransomware on phones,” he said. “It’s something to definitely watch out for on the horizon.”

More from Personal Finance
These are the ways student loans stop people from buying a house
Student loan nightmare: Some borrowers have to start over
People with massive student debt hope Trump will let them declare bankruptcy

Source: Tech CNBC
The worst five states for data security

Comments are closed.