Symantec: Most hacking victims blame themselves
IDG News Service - Just under two-thirds of all Internet users have been hit by some sort of cybercrime, and while most of them are angry about it, a surprisingly large percentage feel guilt too, according to a survey commissioned by Symantec.
In a cybercrime survey of just over 7,000 Internet users in 14 countries, researchers found that 65 percent of Internet users worldwide have already been victims. In the U.S., it's 73 percent, but things are worse in China (83 percent), Brazil (76 percent) and India (also 76 percent).
Those results stood out to Norton Internet Safety Advocate Marian Merritt, who tracks this type of data for a living. "What we were really surprised by was, first of all, how common it was that people are being victimized by cybercrime," she said.
Another surprise: how victims react to being hacked. "People do fee angry, but we also found that people feel pretty guilty," she said. "54 percent said they should have been more careful, when they responded to online scams."
A slightly higher percentage -- 58 percent -- said they felt angry.
When it came to identity theft victims, 12 percent said that the incident was entirely their fault, Symantec found.
Many people are in a pretty muddled state when it comes to dealing with the threat of online crime, however. They know that cybercrime is common, but they're unsure what to do to really prevent it, Merritt said.
"People are recognizing that they did something wrong in a variety of different ways, but they're not -- to a great extent -- changing their behavior," Merritt said. "There's such a lack of awareness and knowledge about who's doing that cybercrime that people really don't know what to do."
Of course, Symantec, an antivirus software vendor, thinks that keeping security software up to date is important, but security experts say that many of the latest threats are often undetected by antivirus products.
There are a lot of other things Internet users can do to keep safe, however. Users also need to be careful where they're going on the Web, double check the attachments they open, and be wary of any out-of-character messages sent from friends via Twitter, Web mail, or social networks.
And they also should do a better job of reporting cyber attacks to authorities, Merritt said. They can report cases to the U.S. Federal Bureau of Investigation's Internet Crime Complaint Center Web site, but also to local authorities. Reporting scams to local high tech crime units really can give law enforcement a better understanding of what the scammers are up to, Merritt said. "If multiple people are reporting the same crime, it will get referred," she said. "They're going to start noticing trends when they have the information available."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts