• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Cyber Security Solutions, Compliance, and Consulting Services - IT Security

We offer It security management, data, network, & Information security services for protecting information & mitigating security risks to your organization.

  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • NETWORK SECURITY
    • CLOUD SECURITY
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Consumers Must Prioritize Safety Over Convenience

By kamran | At June 26, 2021

Jun 26 2021

Consumers Must Prioritize Safety Over Convenience

healthcare data security

Morning Consult recently conducted a global survey on behalf of IBM Security which recorded responses of around 22,000 individuals across 22 different markets. The survey highlighted the harmful effects that the pandemic had on consumer security behavior. As the work we do has shifted from physical to online platforms, it has become increasingly difficult to protect themselves from hackers who thrive in exploiting accounts through online facilities.  

IBM stated that during the pandemic, the average individual created 15 new online accounts, which combined together with the world’s population, amounts to billions of new and vulnerable accounts for hackers to choose from. IBM went on to say that 44% of people who created the new accounts did not plan on deleting or deactivating their new accounts. This will lead to those consumers leaving their digital footprints implanted on the web for years to come, further increasing their chances of falling prey to cyberattacks.   

Passwords become scrappier

The number of new accounts that each individual has to create for new websites has caused them to resort to taking shortcuts in order to make their lives easier. Most users tend to keep the same password or use an easily identifiable one when creating new accounts, as they do not want to go through the hassle of remembering each unique password. In fact, 82% of respondents said in the survey that they reused the same credentials, and many of them used log-in details that had been previously breached. 

This tactic may seem like it would help, but all it does is allow experienced hackers to easily access all of an individual’s accounts using the same credentials. 

The Global Managing Partner and Head of IBM Security X-Force, Charles Henderson, said that with passwords having less reliability due to their lack of airtight security, organizations must adapt to the environment to ensure that they do not have their digital security breached. One way in which organizations can do this, aside from using multi-factor authentication, is by adopting a zero-trust policy in which they use advanced AI and analytics to spot any potential threats rather than believing all users are trusted after authentication. 

Convenience is king

Consumers want an easy and seamless process when creating accounts. The IBM survey reported that 59% of adults expect the process of creating a new account to be less than five minutes. Due to this, consumers are likely to take cybersecurity lightly. 

To remember their password, 32% of people simply write it down on a piece of paper which is as effective as just trying to remember it from memory, which was the case with 44% of respondents.

Respondents to the survey even said that if they did not recall their password, they would try three or four possibilities and then choose to reset their password. This rest not only costs money for the company but is also a security threat if used for an already compromised email account.

Respondents are now starting to understand the importance of cybersecurity. Around 67% of them said that they began using multi-factor authentication a few weeks after being surveyed. This helps to double up on the security of accounts from being hacked and is the perfect starting point to combat the increase of cybercriminal activities we’ve seen in the pandemic. 

Written by kamran · Categorized: Cyber security news, Cyber security threats

Primary Sidebar

Recents post

Healthcare Cybersecurity Roundup: Hospitals, Labs, and RCM Firms Targeted

Ransomware groups continue to … [Read More...] about Healthcare Cybersecurity Roundup: Hospitals, Labs, and RCM Firms Targeted

New Cyber Threats for Law Firms: ICC Attack, Firm Breaches, and AI-Driven Risks

With confidential client … [Read More...] about New Cyber Threats for Law Firms: ICC Attack, Firm Breaches, and AI-Driven Risks

Healthcare Under Siege: 3 Major Data Breaches + the Rise of Bert Ransomware

From ransomware attacks … [Read More...] about Healthcare Under Siege: 3 Major Data Breaches + the Rise of Bert Ransomware

Categories

  • AI and cybersecurity (2)
  • blockchain (1)
  • Cloud security (29)
  • Compliance (25)
  • Cyber security news (108)
  • Cyber security threats (376)
  • Cyber security tips (370)
  • Data Security (3)
  • E-Commerce cyber security (3)
  • Education cyber security (1)
  • Enterprise cyber security (7)
  • Financial organizations cyber security (4)
  • General (22)
  • Government cyber security (4)
  • Healthcare cyber security (19)
  • Information Security (2)
  • Law Firms Cyber Security (9)
  • Network security (9)
  • Newsletter (1)
  • Privacy (1)
  • Ransomware (14)
  • remote work (1)
  • Risk assessment and management (6)
  • Security management and governance (9)
  • SME Cybersecurity (2)
  • Software Security (2)
  • Supply Chain Attacks (5)
  • System security (3)
  • Uncategorized (29)
  • Vendor security (14)

Archives

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (855) 444-6004

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • Healthcare Cybersecurity Roundup: Hospitals, Labs, and RCM Firms Targeted
  • New Cyber Threats for Law Firms: ICC Attack, Firm Breaches, and AI-Driven Risks
  • Healthcare Under Siege: 3 Major Data Breaches + the Rise of Bert Ransomware

Get Social

  • LinkedIn
  • Home
  • About Us
  • Solutions & Services
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Privacy Policy Terms of Use Acceptable Use

Copyright © 2025 | All right reserved