Risky Behaviors Linger Despite Online Privacy Being Threatened

Ninety percent of U.S. consumers who use a mobile device for work activities feel their online privacy is threatened, but many persist in putting their privacy and security at risk, according to a survey by global nonprofit IT association ISACA.

These risks pose challenges to employers during holidays, since respondents who use work-supplied devices expect to spend an average of nine hours shopping on them. Those who use their personal mobile devices for work expect to spend an average of 12 hours shopping from those devices.

According to the US consumer edition of ISACA’s 2012 IT Risk/Reward Barometer survey, employees who use work personal devices reported:

· For a 50 percent discount on a $100 item, 58 percent would reveal their email address, 22 percent would reveal the name of the street they grew up on and 15 percent would reveal their mother’s maiden name.

· 33 percent would be just as inclined to use their personal device for work purposes even if they knew their online activity could be tracked by their employer.

· 15 percent used location-based mobile applications.

More than half feel that sharing information online has become riskier, respondents still engage in those risky actions:

· 65 percent do not verify the security settings of online shopping sites.

· 36 percent have clicked on a link on a social media site from their work device.

· 12 percent stored work passwords on their personal device.

The Risk/Reward Barometer looked at online privacy for the first time. When asked about the greatest threats, respondents chose a company’s misuse of personal information they supplied online (26 percent); inadequate policies on social networking sites (13 percent); and use of cookies to track their web activities (10 percent). The annual IT Risk/Reward Barometer helps gauge attitudes and behaviors related to the risk and reward with the blurring boundaries between personal and work devices (BYOD), cloud computing, and increased enterprise risk related to online holiday employee behavior.

The study is based on September 2012 online polling of 4,512 ISACA members from 83 countries, including 1,407 members in the US. A separate online survey was fielded among 1,224 US consumers by M/A/R/C Research from 8–10 October 2012. At a 95 percent confidence level, the margin of error for the total sample is +/- 2.8 percent. To see the full results, visit www.isaca.org/risk-reward-barometer.

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.