Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

The current state of consumers' cybersecurity awareness

By Chris Clements
Campus Security Moves to the Fore at Colleges and Universities
July 10, 2020

With the second anniversary of GDPR on the horizon, the topic of data security is as pertinent as ever. Despite the proliferation of connected devices and the personal information and sensitive data they harbor, many consumers are unaware of just how susceptible their pocket-sized computers are to cyberattack. In fact, some of the most severe cybersecurity threats originate from a lack of consumer awareness, especially when it comes to securing personal data. With this in mind, here are some of the most common security misnomers facing the average consumer, and advice to help you stay on the right side of a data breach.    

Email

If you were to ask the average consumer what account is the most important for them to keep safe and secure, you might expect them to say their bank account, PayPal, or perhaps a government portal login. However, while highly sensitive, these accounts don’t pose the greatest danger. In reality, it’s something far more ubiquitous and open to attack: your personal email account.

This is because, primary email addresses are often linked to a multitude of essential accounts, each with varying degrees of sensitivity. For example, if a hacker were able to obtain access to a consumer’s email address and password from a dark web database, they could attempt to use that information to access a series of accounts on other sites. This is for two reasons. First, the average consumer lacks proper password hygiene practices and will often reuse memorable passwords between accounts to enable a more seamless online experience. It’s absolutely essential that consumers come to understand the consequences of such online habits and begin to deploy security conscious password etiquette. Second, if a primary email has been compromised, it’s possible to covertly reset passwords to practically any account linked to the user’s primary email and delete the evidence before they notice.

IoT

As the Internet of Things (IoT) market grows, and the amount of data and personal information accumulated through personal devices multiplies, so too will the severity and variety of attack vectors looking to exploit it. Due to the ultra-sensitive information recorded by IoT devices, such as geolocation, personal health information (PHI) and biographical data, it’s essential that consumers are aware of exactly what they are bringing into their homes. As IoT devices become more popular, the market will become flooded with devices built to economies of scale; prioritizing affordability over security. In order to prevent some of the many attack vectors facing IoT devices, users should implement a unique ID and a strong password. This will greatly reduce the threat of password-related breaches; however, this will not make you immune. The first step to ensuring cybersecurity is to understand just how much is on the line and taking all of the recommended steps to protect yourself and the information that you generate.

Bluetooth

Like IoT devices, any system with Bluetooth capabilities can present a serious risk to users. Bluetooth is a weak shortrange signal meaning, which means you have to be in close proximity with another user device in order to interact with it/ them. This, you would think, poses a significant barrier to attackers trying to compromise Bluetooth devices. However, with specialized radio systems they can overcome this by sending and receiving Bluetooth signals from long distances. Social engineering techniques also mean that a determined cybercriminal could track you down and end up sitting close enough to you to hack your Bluetooth enabled device and exfiltrate sensitive information.

Think about how much data you have on your phone. All of it is, potentially, at risk. And, short of disabling Bluetooth, there is no clear way to protecting it. However, with the rise of Bluetooth-enabled devices, such as earphones, cars and watches, this is simply not an option for millions of users. This means the onus is on the manufacturer to secure the device. You may be able to detect suspicious Bluetooth events by examining activity logs; however, this can be bypassed and even if not, then there is a chance that it will be too late.

Wi-Fi

Wireless Internet has facilitated the rise of digital culture. It’s everywhere: from your home to your favorite coffee shop, and practically everywhere in-between. Public Wi-Fi networks have been the center of security discussion for a very long time, and for good reason. Networks that aren’t secured with Wi-Fi Protected Access (WPA) encryption essentially act as a radio to broadcast your information to anyone in broadband reach. Recently there has been a tremendous push to move network traffic to be encrypted by Transport Layer Security (TLS) so that it’s unreadable even by someone with network access. However, there are attack vectors, such as “Man-in-the-Middle” attacks, that allow criminals to bypass this security measure and target users.

Even private networks present an opportunity for cyberattack. Are you aware of exactly how many devices are connected to your private network? If so, are you 100 percent sure that they are secure? Take for example, an employee working from home. Even if their computer has the most stringent security protocols in place, if there’s an unprotected phone connected to a sensitive network then they open themselves to the possibility of being targeted by a savvy cybercriminal.

One thing ties all these threat vectors together: the human factor. We are the weakest link in the cybersecurity chain, so it’s up to all of us to ensure we are doing the best we can to ensure we’re best protected from external threats. This begins with education. Only by acquiring and sharing knowledge, and by utilizing third-party products, will we be able to maintain security at all levels, from the office to the home and everywhere in between. After all, cybersecurity is a culture not a product, so we should do everything in our power to make sure that we are protecting our own information by fostering a culture of security conscious consumers.

KEYWORDS: cyber security GDPR information security insider threats network security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chris clements

Chris Clements, CISSP, CCSA, CCSE, CCSE+, CCSI, CCNA, CCNP, MCSE, Network+, A+, began working in the information security field in 2001, and has a wide range of experience with information security technologies. Clements is the Vice President of Solutions Architecture at Cerberus Sentinel.

He has worked to secure hundreds of customers across North America, from fortune 500 companies with billions in revenue to small businesses with just a few users. He has developed in-depth security auditing and penetration testing product and service offerings and engaging end-user security awareness programs. Chris also enjoys teaching, and has lead courses on information security for hundreds of students. With his unique skill set and background in both technical operations and business management, Chris has strengths in business management, sales, and product and service delivery. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • enterprise cyber security

    Questions to improve enterprise cybersecurity awareness

    See More
  • internet of things

    IoT: The Internet of Threats and how users can defend themselves

    See More
  • cybersecurity and phishing

    The High-Stakes Game of Cybersecurity Awareness Training

    See More

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing