{"id":1893,"date":"2006-10-04T00:00:00","date_gmt":"2006-10-04T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/04\/ca-national-cyber-security-alliance-survey-reveals-consumers-engage-in-risky-online-behavior-on-so\/"},"modified":"2021-12-30T11:40:15","modified_gmt":"2021-12-30T11:40:15","slug":"ca-national-cyber-security-alliance-survey-reveals-consumers-engage-in-risky-online-behavior-on-so","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/04\/ca-national-cyber-security-alliance-survey-reveals-consumers-engage-in-risky-online-behavior-on-so\/","title":{"rendered":"CA \/ National Cyber Security Alliance Survey Reveals Consumers Engage in Risky Online Behavior on So"},"content":{"rendered":"<p>CA (NYSE: CA) and the National Cyber Security Alliance (NCSA) today announced results of the first social networking study examining the link between specific online behaviors and the potential for becoming a victim of cyber-crime.  Although 57 percent of people who use social networking sites admit to worrying about becoming a victim of cyber-crime, they are still divulging information that may put them at risk.  For example 74 percent have given out some sort of personal information, such as their e-mail address, name and birthday.  51 percent of parents aware of their children social networking do not restrict their children&#8217;s profiles so only friends can view, leaving their child&#8217;s profiles unrestricted to potential predators.  Furthermore, 36 percent of these parents surveyed do not monitor their children on social networking sites at all.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In contrast to the popular perception that social networking is an activity enjoyed almost exclusively by tweens and teens, the CA\/NCSA social networking research study reveals a large number of adults (48 percent), 18 plus, social network.  The growing number of adults using social networking sites is an indicator of the increasing popularity-and potential security risks-of these sites.<\/p>\n<p>&#8220;Although the general community thinks most social networking users are teens, the CA\/NCSA survey showed the popularity of these sites is extending beyond young early adopters to other segments of the population,&#8221; said Ron Texeria, executive director of NCSA.  &#8216;Giving out a social security number, paired with a birthday and name, could provide enough ammunition for criminals to hack into financial records and compromise users&#8217; personal information.&#8221;<\/p>\n<p>The CA\/NCSA survey also revealed users of social networking sites are not only giving out potentially harmful information, but they are also engaging in other risky behaviors, such as downloading unknown files and responding to unsolicited emails and instant messages, all of which may lead to identity theft, computer spyware, viruses and other risks.<\/p>\n<p>Of the parents that know their children under 17 use social networking sites, 64 percent monitor their children&#8217;s profiles and 49 percent have only allowed their children&#8217;s profile to be seen by his\/her friends.<\/p>\n<p>http:\/\/ccbn.compuserve.com\/releasetext.asp?ticker=ca&#038;coid=83100&#038;client=compuserve&#038;release=911888<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1893","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1893"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1893\/revisions"}],"predecessor-version":[{"id":4380,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1893\/revisions\/4380"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}