Survey finds gap between perceived and actual IT security

A survey released Monday to mark cyber-security awareness month in October shows that consumers are aware of security risks online, but there is a big gap in what they have done versus what they think they have done to protect themselves.

A McAfee survey found that 93 percent of people surveyed believe they have virus protection on their computers, but 48 percent have expired anti-virus programs. Another 61 percent think they have protection against unsolicited commercial e-mails, and computer checks showed that 21 percent did. Just 12 percent had software to combat "phishing" scams that use phony e-mails and Web sites, even though 27 percent thought they did.

"What we learned from the study is we've done a good job increasing awareness," said Bari Abdul, the vice president of consumer marketing for McAfee. But he said consumers need to better understand their real levels of protection and the threats their computers face.

Panelists at a national security awareness summit on Monday said the issue is important because weak security -- whether it's a person, business or government agency -- can affect everyone. Greg Garcia, the cyber security "czar" for the Homeland Security Department, said each person must take "reasonable precautions" to protect their corner of cyberspace.

A survey of business leaders released by the Business Roundtable showed that the private sector, which controls 80 percent of the nation's critical infrastructure, is not fully prepared for cyber threats, either. Tom Lehner, a security policy director at the group, said businesses are not fully aware of their dependence on the Internet, and they could use better real-time information on threats and analysis on trends that could grow into bigger threats.

The U.S. Computer Emergency Readiness Team had 37,000 reports of security incidents last year, compared with 24,000 the year before. Michael Witt, the deputy director of CERT, said 1 million users are now receiving CERT alerts as they are released. He also warned executives that their corporations are "highly likely" to be involved in some type of incident.

Witt said one problem is how little some businesses spend on security. He also said in some cases equipment is so old that data patches are not available for security fixes.

Garcia said the jump in security incidents for CERT shows an increase in both attacks and reporting, and the numbers will not grow smaller. He added that better cyber security is "something we can't afford not to do."

"It's vital to national security, public safety and economic prosperity," Garcia said.

Richard Pethia, the director of CERT's software engineering institute at Carnegie Mellon University, said CERT offers 400,000 hours in online security training in bite-sized packages. He said cyber crime is growing because the Internet has boosted productivity for the bad guys, too. "It makes them more efficient," Pethia said.

He said another big problem is that the Justice Department does not have enough online forensic investigators to bring charges against cyber criminals. "A lot of cases are being thrown out of court because the government can't do the investigation fast enough," Pethia said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.