Tuesday, October 3, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • The MGM attack: What can be learned for your business
  • DEF CON 31 - Ben Nassi’s, Ofek Vayner’s ‘Video Based Cryptanalysis Extracting Keys From Power LEDs’
  • ReversingLabs A1000 Threat Analysis and Hunting Solution Update Drives SecOps Forward
  • AWS’ MadPot Honeypot Operation Corrals Threat Actors
  • Botmasters Unveiled: Exploring the Dual Role of Botnets in Today’s Digital Landscape
Careers Security Awareness Security Bloggers Network 

Home » Cybersecurity » Careers » Survey: Only Four Percent of U.S. Adults are Concerned about Cybersecurity during Summer Vacation

SBN

Survey: Only Four Percent of U.S. Adults are Concerned about Cybersecurity during Summer Vacation

by Tripwire Guest Authors on July 18, 2018

This summer, my family and I visited a few Arizona ghost towns, and the experience made me wonder what it might have been like to travel across the Old West with all your possessions in tow. What would it feel like to ride through mountains, deserts and territories with only a canvas-covered wagon protecting your valuables? I bet they were keenly aware of the many travel risks and threats. They had to be.

AWS Builder Community Hub

As we zoomed across the same highways, now in an air-conditioned SUV, I couldn’t help but contrast the relative safety and luxuries we enjoy today with the travel conditions then. But while the landscape and comforts have changed, some of the threats and vulnerabilities remain the same.

No, we don’t carry our valuables in a wooden cart, but we do carry digital devices capable of accessing bank accounts and personal information. Smartphones, laptops and IoT devices are portals that can access and direct the most intimate details of our lives. When we travel, we too should be aware of potential risks and take extra precautions to safeguard against them.

As cybersecurity professionals, we often are more informed than the average consumer on the methods malicious actors take to exploit vulnerabilities and compromise data. As a result, I believe we are accountable for educating and informing consumers of potential cybersecurity concerns.

This is especially important this time of year, when millions of Americans will be traveling for summer vacation. AAA reported that a record-breaking nearly 47 million Americans traveled at least 50 miles from their homes for Independence Day. Working in this industry, we are often aware of the potential cybersecurity risks travelers face when away from home.

However, a recent survey by University of Phoenix found that very few travelers consider their cyber safety while on summer vacation despite increased risk that comes from using unsecure public networks.

According to the survey, 83 percent of U.S. adults (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/featured/survey-four-percent-concerned-cybersecurity-summer-vacation/

July 18, 2018July 18, 2018 Tripwire Guest Authors Featured Articles, risks, Secuirty, Security Awareness, survey, Vacation
  • ← XKCD, Negative Results
  • Got Container Security? Make Sure to Secure Code and Supplemental Components →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Wed 11

ASPM: Leveling the AppSec Playing Field

October 11 @ 1:00 pm - 2:00 pm
Mon 16

Shadow Access: Where IAM Meets Cloud Security

October 16 @ 3:00 pm - 4:00 pm
Tue 17

Securing Cloud-Native Applications Across the Software Development Life Cycle

October 17 @ 11:00 am - 12:00 pm
Wed 18

Live Workshop on ‘SCA 2.0’: Using Runtime Analysis to Find High-Risk SCA Vulnerabilities

October 18 @ 12:00 pm - 1:30 pm
Thu 19

Managing Security Posture and Entitlements in the Cloud

October 19 @ 1:00 pm - 2:00 pm
Tue 24

When Seconds Matter: Real-Time Cloud Security With AWS and Sysdig

October 24 @ 11:00 am - 12:00 pm
Tue 24

Reporting From the Pipeline: The State of Software Security in DevOps

October 24 @ 1:00 pm - 2:00 pm
Thu 26

How to Shift Left the Right Way

October 26 @ 3:00 pm - 4:00 pm
Mon 30

Zero-Trust

October 30 @ 1:00 pm - 2:00 pm
Tue 31

AppSec 101: Complete Application Security Across the SDLC

October 31 @ 11:00 am - 12:00 pm

More Webinars

Subscribe to our Newsletters

TSTV Podcast

Most Read on the Boulevard

Don’t Say ‘Skynet’ — NSA’s AI Security Center is New Hub for Agency Efforts
Cryptomining Attacks: The Stealth Threat to Your Cloud Security
Boards are Finally Taking Cybersecurity Seriously
Federal Shutdown Raises Cybersecurity Risks, Experts Warn
How to Talk So Your CISO Will Listen
DEF CON 31 – Joseph Gabay’s ‘Warshopping- Phreaking Smart Shopping Cart Wheels Through RF Sniffing’
Methods To Protect Yourself From Identity Theft
2023 OWASP Top-10 Series: API10:2023 Unsafe Consumption of APIs
Google Chrome Heap Buffer Overflow Vulnerability (CVE-2023-5217) Notification
Avoid libwebp Electron Woes On macOS With positron

Download Free eBook

The State of Cloud Native Security 2020

Industry Spotlight

AWS’ MadPot Honeypot Operation Corrals Threat Actors
Cloud Security Cybersecurity Data Security Featured Incident Response Industry Spotlight Malware Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches 

AWS’ MadPot Honeypot Operation Corrals Threat Actors

October 3, 2023 Jeffrey Burt | Yesterday 0
Broken ARM: Mali Malware Pwns Phones
Analytics & Intelligence API Security Application Security AppSec Cybersecurity Data Privacy Data Security Deep Fake and Other Social Engineering Tactics Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight IOT IoT & ICS Security Malware Mobile Security Most Read This Week News Popular Post Securing the Edge Security at the Edge Security Awareness Security Boulevard (Original) Social Engineering Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

Broken ARM: Mali Malware Pwns Phones

October 3, 2023 Richi Jennings | Yesterday 0
Don’t Say ‘Skynet’ — NSA’s AI Security Center is New Hub for Agency Efforts
AI and Machine Learning in Security AI and ML in Security Analytics & Intelligence Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security Editorial Calendar Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight IOT IoT & ICS Security Malware Most Read This Week Network Security News Popular Post Regulatory Compliance Securing the Cloud Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Don’t Say ‘Skynet’ — NSA’s AI Security Center is New Hub for Agency Efforts

October 2, 2023 Richi Jennings | 1 day ago 0

Top Stories

Akamai Sees Surge of Cyberattacks Aimed at Financial Services
Analytics & Intelligence Application Security Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Incident Response Malware News Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Akamai Sees Surge of Cyberattacks Aimed at Financial Services

October 3, 2023 Michael Vizard | Yesterday 0
Threat Groups Accelerating the Use of Dual Ransomware Attacks
Analytics & Intelligence Cybersecurity Data Security Featured Identity & Access Malware Network Security News Security Boulevard (Original) Spotlight Threats & Breaches 

Threat Groups Accelerating the Use of Dual Ransomware Attacks

October 2, 2023 Jeffrey Burt | 1 day ago 0
Network Security Firm IronNet Ends Operations, Plans for Bankruptcy
Cloud Security Cybersecurity Data Security Featured Network Security News Security Boulevard (Original) Spotlight 

Network Security Firm IronNet Ends Operations, Plans for Bankruptcy

October 2, 2023 Jeffrey Burt | 1 day ago 0

Security Humor

Randall Munroe’s XKCD ‘A Halloween Carol’

Randall Munroe’s XKCD ‘A Halloween Carol’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.