2026³â 04¿ù 28ÀÏ È­¿äÀÏ
 
 
  ÇöÀçÀ§Ä¡ > ´º½ºÁö´åÄÄ > Science & Technology

·£¼¶¿þ¾îºÎÅÍ µÅÁöµµ»ì±îÁö... ³ë·ÃÇØÁø »ç±âÇà°¢

 

Á¤Ä¡

 

°æÁ¦

 

»çȸ

 

»ýȰ

 

¹®È­

 

±¹Á¦

 

°úÇбâ¼ú

 

¿¬¿¹

 

½ºÆ÷Ã÷

 

ÀÚµ¿Â÷

 

ºÎµ¿»ê

 

°æ¿µ

 

¿µ¾÷

 

¹Ìµð¾î

 

½Å»óǰ

 

±³À°

 

ÇÐȸ

 

½Å°£

 

°øÁö»çÇ×

 

Ä®·³

 

Ä·ÆäÀÎ
Çѻ츲 ¡®¿ì¸®´Â ÇѽҸ²¡¯ ½Ò ¼Òºñ Ä·ÆäÀÎ ½Ã...
1000¸¸¿øÂ¥¸® Àΰø¿Í¿ì, °Ç°­º¸Çè Áö¿ø ¡®Æò...
- - - - - - -
 

Despite Increasing Cybersecurity Attacks, People Still Believe Antiquated Username and Passwords Are Strong Enough

Results from a new study by Yubico show the need for education and taking a more holistic approach to cybersecurity at both work and home
´º½ºÀÏÀÚ: 2024-10-12

SANTA CLARA, CALIF. & STOCKHOLM -- In the era of uncertainty with AI and an increase in cybersecurity breaches, Yubico, the leading provider of hardware authentication security keys, shared the results of its 2024 Global State of Authentication survey, just in time for Cybersecurity Awareness Month kicking off next week.

Conducted by Talker Research, the survey polled 20,000 people from around the world, including Australia, France, Germany, India, Japan, Poland, Singapore, Sweden, the United Kingdom and the United States, to gauge perceptions and understanding of the global impact of cybersecurity both personally and in the corporate realm, explore the risks posed by inadequate security practices, the potential threat of technology like Artificial Intelligence (AI), and the impact this has on both personal and organizational safety.

The results of the survey uncovered concerning patterns and behaviors when it comes to personal and workplace cybersecurity, including the extensive underutilization of multi-factor authentication (MFA) and a generally reactive approach to addressing cyber threats. Key global findings include:

· Despite being the least secure form of authentication, the most common method of authentication is username and password.
- 58% use username and password to login to personal accounts
- 54% use username and password to login to work accounts

· With the rapid advancements of artificial intelligence, respondents said that online scams and phishing attacks have become more sophisticated (72%) and successful (66%).

· Respondents show a lack of awareness of best practices for authentication
- 39% think username and password are the most secure and 37% think mobile SMS based authentication is the most secure, both of which are highly susceptible to phishing attacks.

· 40% don’t think or aren’t sure if the online apps and services they are using are doing enough from a security standpoint to protect their data, accounts and personal information. Even with this uncertainty, 22% have never done a personal cybersecurity audit (e.g., removing personal data from the internet, installing or updating cybersecurity software on their devices, changing compromised passwords, etc.) to better protect themselves online.

· Respondents report the most commonly compromised passwords are on the apps and services that hold their most confidential, financial and personal information. These include:
- ​​Social media account - 44%
- Payment app - 24%
- Online retailer account - 21%
- Messaging app - 17%
- Banking app - 13%

· For employees, even with security breaches increasing every year, 40% of respondents have never received cybersecurity training from the organization they work for and only a small fraction (27%) believe the security options that their organization has in place are very secure.

· When looking at the security aspect of onboarding employees, over 1/3 (34%) of respondents said they did not receive instructions to secure their work accounts with more than just a username and password when they first started at the company they work for.

· Despite the fact that every employee in an organization is a potential target, 41% said security measures and requirements differ based on role and title at their company, leaving room for bad actors to infiltrate within several levels of an organization.

“The findings highlight the need for a holistic cybersecurity strategy that encompasses both home and work environments,” said Derek Hanson, vice president standards and alliances at Yubico. “This includes adopting stronger authentication methods to become phishing-resistant, fostering a culture of security awareness through consistent employee training, and more. Ultimately, building a unified front against cyber threats requires a concerted effort to bridge the gap between perceived and actual security. By integrating advanced security measures into all aspects of our digital lives, we can better protect ourselves, our data, and our organizations.”

Cybersecurity breaches and phishing schemes aren't solely a worry for IT departments or tech-savvy individuals; they also pose serious risks to the general public, especially in the era of Artificial Intelligence (AI). As cyber attacks and online scams become increasingly sophisticated, it is more important than ever for everyone to stay vigilant in both their personal and professional lives.

“When individuals fail to secure their personal accounts, they also put their workplaces at risk. This is why it’s crucial for enterprises to adopt a holistic approach to cybersecurity that considers the security of both work and personal environments,” Hanson continued.



 Àüü´º½º¸ñ·ÏÀ¸·Î

MariaDB Completes GridGain Acquisition to Power the Next Generation of Agentic AI
Rubedo Life Sciences Reports Positive Phase 1 Results for RLS-1496 in Psoriasis, Dermatitis, and Skin Aging
Frankfurt Higher Regional Court upholds BESREMi¢ç arbitral award in favor of AOP Health
Riskified Launches Dispute Resolve for Shopify to Automate Chargeback Management and Help Merchants Recover Lost Revenue
NTT DATA Validates AI Consumer Agents in Kao¡¯s R&D, Boosting Efficiency and Advancing Product Development
Lenovo Partners with Eva Longoria to Launch Global Search for Business ¡°Twins¡±
China Smartphone Shipments Fell 1% in First Quarter of 2026 as Rising Costs Pushed Up Device Prices

 

Agileo Automation Launches Agil¡¯EDA to Accelerate SEMI EDA Adoption f...
Invivoscribe¢ç Expands IVDR Portfolio with IdentiClone¢ç Dx IGH Assay ...
Secure Code Warrior Launches Trust Agent: AI to Enable Safe, Scalable ...
Miro Acquires Reforge to Help Organizations Navigate the Transition to...
Horse Powertrain Reveals Lightweight Hybrid V6 System at Beijing Auto ...
Miro Announces Asia Hub in Singapore to Accelerate Growth Across the R...
NetApp Unveils New High-Performance EF-Series Models

 


°øÁö»çÇ×
´º½ºÁö Áß¹®Ç¥±â´Â À½Â÷ Ç¥±â¹æ½Ä '纽ÞÙó¢ ´Ï¿ì½ÃÁö'
'º£³×ÀÍ' Áß¹® Ç¥±â 宝Ò¬ìÌ, 'À̺ñÁî: ÀÌÁö' Áß¹® Ç¥±â æ¶币òª...
¹Ìµð¾î¾Æ¿ì¾î Mediaour ØÚ体ä²们 ØÚô÷ä²Ùú MO ¿¥¿À ØÚä² ØÚä²
¾Ë¸®À¯ºñ Alliuv ä¹备: ä¹êó备, ¾Ë¶ã Althle ä¹÷åìÌ
¾Ë¸®¾Ë Allial Áß¹® Ç¥±â ä¹××尔 ä¹××ì³
´ºÆÛ½ºÆ® New1st Áß¹® Ç¥±â 纽ììãæ(¹øÃ¼ Òïììãæ), N1 纽1
¿£ÄÚ½º¸ð½º : À̾¾ 'EnCosmos : EC' Áß¹® Ç¥±â ì¤ñµ
¾ÆÀ̵ð¾î·Ð Idearon Áß¹® Ç¥±â ì¤îè论 ì¤îèÖå
¹ÙÀÌ¿ÀÀÌ´Ï Bioini Áß¹® Ç¥±â ù±药研 ù±å·æÚ
¿À½ºÇÁ·Ò Ausfrom 奥ÞÙÜØ, À£ÇÁ·Ò Welfrom 卫ÜØ
¿¡³ÊÀ¯ºñ Eneruv 额Òöêó备 äþÒöêóÝá
¾ËÇÁ·Ò Alfrom Áß¹® Ç¥±â ä¹尔ÜØ ä¹ì³ÜØ

 

ȸ»ç¼Ò°³ | ÀÎÀçä¿ë | ÀÌ¿ë¾à°ü | °³ÀÎÁ¤º¸Ãë±Þ¹æÄ§ | û¼Ò³âº¸È£Á¤Ã¥ | Ã¥ÀÓÇѰè¿Í ¹ýÀû°íÁö | À̸ÞÀÏÁÖ¼Ò¹«´Ü¼öÁý°ÅºÎ | °í°´¼¾ÅÍ

±â»çÁ¦º¸ À̸ÞÀÏ news@newsji.com, ÀüÈ­ 050 2222 0002, ÆÑ½º 050 2222 0111, ÁÖ¼Ò : ¼­¿ï ±¸·Î±¸ °¡¸¶»ê·Î 27±æ 60 1-37È£

ÀÎÅͳݴº½º¼­ºñ½º»ç¾÷µî·Ï : ¼­¿ï ÀÚ00447, µî·ÏÀÏÀÚ : 2013.12.23., ´º½º¹è¿­ ¹× û¼Ò³âº¸È£ÀÇ Ã¥ÀÓ : ´ëÇ¥ CEO

Copyright ¨Ï All rights reserved..