Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

12/19/2018
02:55 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Harris Poll Reveals American Attitudes Towards Cybersecurity and Privacy

Harris Poll Reveals American Attitudes Towards Cybersecurity and Privacy

San Jose, California, Dec. 19, 2018 (GLOBE NEWSWIRE) -- SAN JOSE, Calif. — Dec. 19, 2018 ­— Dtex Systems, the leader in user behavior intelligence and insider threat detection, today published the Dtex 2018 Privacy & Cybersecurity Index. The index reveals that a majority of Americans believe it is acceptable for organizations spanning multiple industries to conduct user digital activity and behavior monitoring when it is done to provide defense against threats and breaches. It also shows that a vast majority of Americans would lose trust in organizations that conceal monitoring programs. To compile the index, Dtex commissioned The Harris Poll to conduct an online survey that polled more than 2,000 Americans.*

“Scandals are consuming Facebook and other companies that collect massive data volumes. These are causing a surge in privacy demands and regulations that security and risk professionals need to contend with,” said Rajan Koo, SVP of Customer Engineering, Dtex Systems. “They are now looking for new and innovative ways to monitor human behaviors and activities without violating privacy or trust. This report will help them to do both.”   

The survey revealed many key findings, including:    

  • Social Media: When asked if it is ever acceptable for social media companies to conduct digital activity monitoring over users to provide defense against threats and data breaches, 51 percent of Americans indicate it is.

 

  • Banks: When asked if it is ever acceptable for banks to conduct digital activity monitoring over customers to provide defense against threats and data breaches, 65 percent of Americans indicate it is.

 

  • Government: When asked if it is ever acceptable for government organizations to conduct digital activity monitoring over citizens to provide defense against threats and data breaches, 61 percent of Americans indicate it is.

 

  • Retail: When asked if it is ever acceptable for retail companies to conduct digital activity monitoring over shoppers to provide defense against threats and data breaches, 60 percent of Americans indicate it is.

 

  • Deception: 79 percent of Americans would trust a company less if they discovered that it was monitoring consumers’ digital activities without their knowledge.

 Access the full report: Dtex 2018 Privacy & Cybersecurity Index (https://www2.dtexsystems.com/2018-dtex-harris-privacy-security-index)

Earlier this year, Dtex released findings from the same poll. It revealed how American employees feel about employer digital activity monitoring programs. Those results are summarized at the end of the index. 

*Survey Methodology

This survey was conducted online within the United States by The Harris Poll on behalf of Dtex Systems from June 14 to 18, 2018 among 2,024 U.S. adults ages 18 and older, among whom 833 are employed full-time. This online survey is not based on a probability sample and therefore no estimate of theoretical sampling error can be calculated. For complete survey methodology, including weighting variables and subgroup sample sizes, please contact Joe Franscella.

Visit the new website: www.dtexsystems.com  
Follow Dtex on Twitter: https://twitter.com/DtexSystems
Join Dtex on LinkedIn: https://www.linkedin.com/company/dtex-systems
Like Dtex on Facebook: https://www.facebook.com/Dtex-Systems-297181017056254  

About Dtex Systems

Dtex turns employees, executives, contractors and partners into trusted insiders. The award-winning Dtex Advanced User Behavior Intelligence Platform reduces insider threat risk by providing intelligence about behaviors and activities across massive numbers of distributed users. Dtex combines the largest library of known malicious and negligent behaviors, machine learningand advanced analytics. This gives the platform the power to detect insider threats in near real time, reduce false positives, and free security and risk professionals from having to spend time analyzing overwhelming volumes of data and logs. Dtex is scalable and deploys quickly. It only collects light-weight data needed to identify risky behaviors, which never slows network, endpoint or user performance. Patented anonymization capabilities protect privacy and ensure compliance. Investors include Wing Venture Capital and Norwest Venture partners. Customers include the world’s leading banks, manufacturers, healthcare organizations, government agencies, and law firms. The Defense Information Systems Agency (DISA) and Williams Formula 1 Racing are among customers using Dtex to reduce insider threat risk. https://www.dtexsystems.com/

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13272
PUBLISHED: 2019-07-17
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a pare...
CVE-2019-13446
PUBLISHED: 2019-07-17
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2019-9848
PUBLISHED: 2019-07-17
LibreOffice has a feature where documents can specify that pre-installed scripts can be executed on various document events such as mouse-over, etc. LibreOffice is typically also bundled with LibreLogo, a programmable turtle vector graphics script, which can be manipulated into executing arbitrary p...
CVE-2019-9849
PUBLISHED: 2019-07-17
LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed wh...
CVE-2019-13623
PUBLISHED: 2019-07-17
In NSA Ghidra through 9.0.4, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis r...