Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

12/19/2018
02:55 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Harris Poll Reveals American Attitudes Towards Cybersecurity and Privacy

Harris Poll Reveals American Attitudes Towards Cybersecurity and Privacy

San Jose, California, Dec. 19, 2018 (GLOBE NEWSWIRE) -- SAN JOSE, Calif. — Dec. 19, 2018 ­— Dtex Systems, the leader in user behavior intelligence and insider threat detection, today published the Dtex 2018 Privacy & Cybersecurity Index. The index reveals that a majority of Americans believe it is acceptable for organizations spanning multiple industries to conduct user digital activity and behavior monitoring when it is done to provide defense against threats and breaches. It also shows that a vast majority of Americans would lose trust in organizations that conceal monitoring programs. To compile the index, Dtex commissioned The Harris Poll to conduct an online survey that polled more than 2,000 Americans.*

“Scandals are consuming Facebook and other companies that collect massive data volumes. These are causing a surge in privacy demands and regulations that security and risk professionals need to contend with,” said Rajan Koo, SVP of Customer Engineering, Dtex Systems. “They are now looking for new and innovative ways to monitor human behaviors and activities without violating privacy or trust. This report will help them to do both.”   

The survey revealed many key findings, including:    

  • Social Media: When asked if it is ever acceptable for social media companies to conduct digital activity monitoring over users to provide defense against threats and data breaches, 51 percent of Americans indicate it is.

 

  • Banks: When asked if it is ever acceptable for banks to conduct digital activity monitoring over customers to provide defense against threats and data breaches, 65 percent of Americans indicate it is.

 

  • Government: When asked if it is ever acceptable for government organizations to conduct digital activity monitoring over citizens to provide defense against threats and data breaches, 61 percent of Americans indicate it is.

 

  • Retail: When asked if it is ever acceptable for retail companies to conduct digital activity monitoring over shoppers to provide defense against threats and data breaches, 60 percent of Americans indicate it is.

 

  • Deception: 79 percent of Americans would trust a company less if they discovered that it was monitoring consumers’ digital activities without their knowledge.

 Access the full report: Dtex 2018 Privacy & Cybersecurity Index (https://www2.dtexsystems.com/2018-dtex-harris-privacy-security-index)

Earlier this year, Dtex released findings from the same poll. It revealed how American employees feel about employer digital activity monitoring programs. Those results are summarized at the end of the index. 

*Survey Methodology

This survey was conducted online within the United States by The Harris Poll on behalf of Dtex Systems from June 14 to 18, 2018 among 2,024 U.S. adults ages 18 and older, among whom 833 are employed full-time. This online survey is not based on a probability sample and therefore no estimate of theoretical sampling error can be calculated. For complete survey methodology, including weighting variables and subgroup sample sizes, please contact Joe Franscella.

Visit the new website: www.dtexsystems.com  
Follow Dtex on Twitter: https://twitter.com/DtexSystems
Join Dtex on LinkedIn: https://www.linkedin.com/company/dtex-systems
Like Dtex on Facebook: https://www.facebook.com/Dtex-Systems-297181017056254  

About Dtex Systems

Dtex turns employees, executives, contractors and partners into trusted insiders. The award-winning Dtex Advanced User Behavior Intelligence Platform reduces insider threat risk by providing intelligence about behaviors and activities across massive numbers of distributed users. Dtex combines the largest library of known malicious and negligent behaviors, machine learningand advanced analytics. This gives the platform the power to detect insider threats in near real time, reduce false positives, and free security and risk professionals from having to spend time analyzing overwhelming volumes of data and logs. Dtex is scalable and deploys quickly. It only collects light-weight data needed to identify risky behaviors, which never slows network, endpoint or user performance. Patented anonymization capabilities protect privacy and ensure compliance. Investors include Wing Venture Capital and Norwest Venture partners. Customers include the world’s leading banks, manufacturers, healthcare organizations, government agencies, and law firms. The Defense Information Systems Agency (DISA) and Williams Formula 1 Racing are among customers using Dtex to reduce insider threat risk. https://www.dtexsystems.com/

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.