CTIA Cybersecurity Consumer Research Survey

advertisement
Cybersecurity Research
Prepared for
January 2013
© Harris Interactive
1
Table of Contents
Methodology
3
Questionnaire Design Flow
4
Executive Summary
5
Detailed Findings
9
Appendix
33
© Harris Interactive
Methodology
• The research was conducted both over the phone and online within the United States
by Harris Interactive between November 20 - 28, 2012. The respondents comprised of
1,516 adults ages 18+ who own and use a cell phone or smart phone.
• Figures for education, age by gender, race/ethnicity, region, and household income
were weighted where necessary to bring them into line with the population of US
residents who own a cell phone or smart phone. For the online sample, our weighting
algorithm also included a propensity score which allows us to adjust for propensity to
be online. For the phone sample, our weighting also included variables to account for
the probability of selection.
• All sample surveys and polls, whether or not they use probability sampling, are
subject to multiple sources of error which are most often not possible to quantify or
estimate, including sampling error, coverage error, error associated with nonresponse, error associated with question wording and response options, and postsurvey weighting and adjustments. Therefore, Harris Interactive avoids the words
"margin of error" as they are misleading. All that can be calculated are different
possible sampling errors with different probabilities for pure, unweighted, random
samples with 100% response rates. These are only theoretical because no published
polls come close to this ideal.
© Harris Interactive
3
Questionnaire Design Flow
•Questions to screen for owners and users of cell or smartphone
Screener
Mobile Device
Behaviors
Cybersecurity
Issues
Industry
Messaging
© Harris Interactive
•Certain behaviors were asked of personal desktop, laptop, tablet, and smartphone:
•Use of a password, running of software updates, installing anti-virus software, app
to remote lock, locate, and/or erase data
•Online banking – use of encryption or security software
•Loss of device
•Perceptions of smartphone vs. computers
•Vulnerability of mobile device to attacks
•Review of bill for suspicious activity
•Who best equipped to write cybersecurity legislation
•Exposure to message statements to motivate action
•Who is responsible for keeping device safe
•Likelihood to take action in face of messaging
Executive Summary
• Cybersecurity is not a foreign concept for mobile devices but it is viewed
differently for mobile devices than with computers.
– Consumers overwhelmingly acknowledge that their mobile devices are vulnerable to
cyber attacks.
– Monthly they review their wireless bill for suspicious activity.
– However since smartphones are not seen as mini computers, cybersecurity is not
viewed the same on both devices.
– Nearly three-quarters of consumers access Wi-Fi Networks (which may or may not
be secure) with their smartphone or tablet.
© Harris Interactive
5
Executive Summary
• Consumers recognize their responsibility to keep their mobile device safe.
However, many are not taking all possible steps to do so.
– Three-quarters of consumers believe the responsibility to keep their mobile device
safe mostly falls to them.
– Updates are run as frequently on mobile devices as they are with computers – with
two-thirds running them as they are available.
– Approximately half use a password or PIN to access their smartphone or tablet, but
this is much less than with their computers.
– Of those that use their mobile device for online banking, only just over half encrypt
or use security software.
– Of the small percentage who have lost or had their smartphone stolen, almost half
contacted their provider to suspend service.
– Less than half have an app with remote lock, locate, and or erase functions on their
mobile device.
– Anti-virus software is the least likely to be installed on mobile devices – with less
than one-third taking this step with their smartphone or tablet.
– Consumers are more apt to protect themselves against tangible threats (like the loss
of a mobile device) versus intangible threats (such as hacking, malware, etc.)
© Harris Interactive
6
Executive Summary
• Consumers generally want to do what is needed to protect their mobile
devices, but don’t know specifically how.
– After being exposed to statements about cybersecurity, consumers are generally
motivated to take action to protect themselves.
– However when asked about specific actions (such as adding a password/PIN or
installing anti-virus software) consumers were no more persuaded than before.
– Personal stories and apps that remind consumers to update software, change their
PIN, etc. would help to prompt more specific actions.
• Compared to the federal government, consumers view the industry as being
the best equipped to write cybersecurity regulations.
© Harris Interactive
7
Executive Summary
• Those who lose or have devices stolen are by definition a vulnerable target for
cyber threats. Given this, they should be inclined to take more precautions
than those who don’t, but they don’t appear to be.
– Those who lose their smartphones or have them stolen are more likely to add a
PIN/password than those that don’t. However they are equally likely to take other
precautions (such as app to remote lock/erase or have anti-virus software) than
their counterparts.
– They don’t view their device as a mini computer and thus don’t see cybersecurity
the same on their smartphone as on their computer.
– They aren’t more likely to recognize their vulnerability and see the responsibility as
lying more with the industry than those who don’t lose their smartphones.
– However this audience is very receptive to information on the subject of
cybersecurity and are particularly motivated by those that emphasize how much
personal information is contained on their mobile device.
© Harris Interactive
8
Cybersecurity is not a foreign concept for mobile
devices but it is viewed differently than with
computers.
© Harris Interactive
Nearly all see mobile devices as vulnerable.
12%
85%
Base: All Respondents (n=1516)
Q805. How vulnerable do you think mobile devices are to cyber-attacks, including spam, malware, phishing, Trojans, botnets?
© Harris Interactive
10
Majority of consumers review their bills every month for suspicious
activity.
Base: All Respondents (n=1516)
Q825. How often do you review your monthly wireless bill to ensure there is no suspicious activity?
© Harris Interactive
11
Fewer than 1 in 5 see their smartphone as a mini computer.
• This perception may be the reason why they don’t readily have passwords or anti-virus
software on the device.
Base: All Respondents (n=1516)
Q800. Which of the following most closely describes how you think about smartphones in general?
© Harris Interactive
12
Only about half view cybersecurity the same way on a mobile device
as a computer.
Base: All Respondents (n=1516)
Q815. Do you think about cybersecurity on a mobile device the same way as on a personal computer (for example, applying anti-spam or antivirus tools)?
© Harris Interactive
13
For internet access, consumers often use Wi-Fi Networks
exclusively for their tablets whereas they use that as well as
a data plan for their smartphones.
Base: All Respondents Who Own a Mobile Device
Q1715. For each of the following, do you have a data plan for that device or do you access Wi-Fi networks with it?
© Harris Interactive
14
Consumers recognize responsibility but many
are not taking all possible steps to protect
themselves.
© Harris Interactive
Nearly three-quarters of consumers believe the task of keeping mobile
devices safe falls mostly on them.
Individual’s
Responsibility
Industry’s
Responsibility
74%
25%
Base: All Respondents (n=1516)
Q905. Who do you feel is responsible for keeping data on mobile devices safe?
© Harris Interactive
16
Consumers run updates on their mobile devices nearly as
frequently as on their computers.
Top 2 Box
72%
69%
67%
66%
Base: All Respondents Who Own Device
Q1725. When software updates are available (for applications, security, operating system, etc.), how frequently do you run them on each of
the following devices?
© Harris Interactive
17
Cell and smart phone consumers are more likely to use a
password on their computers than on their mobile devices.
Denotes significance over smartphone/tablet at the 95% confidence interval
Base: All Respondents Who Own Device
Q1720. For each of the following, please indicate if you use a password or pin to access that device.
© Harris Interactive
18
Although a strong majority still do online banking via computers,
around one-third do it on mobile devices.
• Only about half of those encrypts or uses security software.
32%
n=115
39%
n=234
63%
n=619
68%
n=554
Denotes significance over smartphone/tablet at the 95% confidence interval
Base: All Respondents Who Own a Mobile Device
Q1740. How much of your banking do you do via each of the following devices, if at all?
Base: Uses Mobile Banking
© Harris Interactive
Q1745. When banking on each of the following devices, do you encrypt or use security software to protect your information?
19
Nearly 1 in 5 consumers have lost their smartphone in the past year –
more than those who have lost their tablet or laptop.
• Action taken in response was to contact their provider to suspend service.
4%
n=13*
14%
n=72
1%
n=11*
Denotes significance over laptop/desktop at the 95% confidence interval
* Caution: Small base size
Base: All Respondents Who Own a Mobile Device
Q1750. In the past year, how many times, if at all, have you lost each of the following devices (either misplaced it or it was stolen)?
Base: Device Was Lost or Stolen
© Harris Interactive
Q1755. When you lost this device/these devices, did you do any of the following?
20
Although not a majority, many consumers have an app that
remote locks, locates, or erases devices.
• This is more than those who have lost their phone.
Denotes significance over laptop/desktop at the 95% confidence interval
Base: All Respondents Who Own a Mobile Device (n=1204)
Q1735. For each of the following, do you have any apps installed that can remote lock, locate and/or erase data on your device to protect it
from unauthorized users?
© Harris Interactive
21
Consumers are much more likely to protect their computers with
anti-virus programs than mobile devices.
Denotes significance over smartphone/tablet at the 95% confidence interval
Base: All Respondents Who Own Device (n=1424)
Q1730 For each of the following, please indicate if you have anti-virus programs installed on that device.
© Harris Interactive
22
Generally, concerns over physical security of the mobile device are
prioritized over cyber security.
• Even among respondents with a Remote Lock app, penetration of anti-virus software is still less than half.
• This speaks to the fact that people are more readily able to prepare for tangible security issues (such as the
loss of a device) rather than intangible security issues such as hacking.
Smartphone Owners
© Harris Interactive
Has Anti-Virus
Does not have AntiVirus
Has Remote Lock
21%
26%
Does not have
Remote Lock
13%
41%
Tablet Owners
Has Anti-Virus
Does not have AntiVirus
Has Remote Lock
19%
24%
Does not have
Remote Lock
14%
44%
23
Consumers generally want to do what is needed to
protect their devices but don’t know specifically how.
© Harris Interactive
Despite recognition that much of the responsibility to protect falls
to them, consumers don’t readily jump to take action.
Top 2 Box
Smartphone owner’s without
anti-virus software (n=499)
23%
Smartphone owner’s without
PIN (n=422)
36%
Tablet owner’s without antivirus (n=255)
22%
Tablet owners without PIN
(n=206)
31%
Base: Varies
Q910/Q920. You may have learned some new information in this survey. As a result, how likely are you to add a password or pin to your
personal tablet / personal smartphone in the next 30 days?
Q915/Q925. How likely are you to install anti-virus programs on your personal tablet / personal smartphone in the next 30 days?
© Harris Interactive
25
A personal story or convenient reminder may prompt action.
Base: Not likely to act (n=584)
Q930. Which of the following would make you more likely to add a password or install anti-virus software to your personal tablet or
smartphone?
© Harris Interactive
26
Industry viewed as best equipped to
write legislation.
© Harris Interactive
Two-thirds believe the mobile industry is best equipped to write
cybersecurity regulations vs. the federal government.
Base: All Respondents (n=1516)
Q830. Who do you think is better equipped to write cybersecurity regulations?
© Harris Interactive
28
Those who lose or have devices stolen are by
definition a vulnerable target for cyber threats.
Given this, they should be inclined to take more
precautions than those who don’t, but they do
not appear to be.
© Harris Interactive
Those who lost their smartphones are more likely to have a
PIN/password than those who have not, but aren’t significantly
more likely to take any other protective action.
Significantly
higher /
lower
than did not lose at the 95% confidence level
*Base size among those who lost smartphone and banks online less than 30; stat
testing not performed
© Harris Interactive
30
Those who have lost their smartphone are less likely to view their
device like a computer.
Significantly
higher /
lower
than did not lose at the 95% confidence level
Base: Smartphone owners (n=728)
Q815. Do you think about cyber-security on a mobile device the same way as on a personal computer?
Q800.©Which
of the following most closely describes how you think about smartphones in general?
Harris Interactive
31
Those who have lost their smartphones assign more responsibility
of data protection to the industry than to themselves.
Significantly
higher /
lower
than did not lose at the 95% confidence level
Base: Smartphone owners (n=728)
Q805. How vulnerable do you think mobile devices are to cyber-attacks, including spam, malware, phishing, Trojans, botnets?
Q905. Who do you feel is responsible for keeping data on mobile devices safe?
© Harris Interactive
32
Appendix
© Harris Interactive
Demographics
Total
Racial Background
Total
Gender
Male
Female
48%
52%
Age
18-24
25-34
35-49
50-64
65+
Mean
12%
15%
27%
27%
19%
47.6
Region
East
Midwest
South
West
21%
24%
33%
22%
White
Hispanic
Black
Asian or Pacific Islander
Native American or Alaskan Native
Some other race
Decline to Answer
75%
8%
8%
2%
1%
2%
3%
Employment
Employed full time
Employed part time
Self-employed
Not employed, but looking for work
Not employed and not looking for work
Retired
Not employed, unable to work due to a disability or illness
Student
Stay-at-home spouse or partner
42%
10%
6%
7%
2%
17%
4%
6%
7%
Household Income, 2011
Education
HS or Less
Less than $50k
38%
32%
$50k to less than $100k
32%
Attended college or college degree
50%
$100k or less than $249k
21%
Attended graduate school or graduate degree
14%
$250k or more
2%
Decline to answer
7%
© Harris Interactive
34
Download