Visualizing the 5 Most Common Cybersecurity Mistakes

Related stories

Breaking Down the West’s $146 Billion 2024 Defence Technology Investment

Advanced technologies like drones, sensors, and even artificial intelligence...

G7 vs. the World: GDP, Population, and Military Strength

Key Takeaways G7 countries represent 28.4% of global GDP...

US drillers cut oil and gas rigs for 10th week in a row, Baker Hughes says

U.S. energy firms this week cut the number of...

Tinubu Mourns, Pays Tribute to Legendary Super Eagles Goalkeeper Peter Rufai

By Abiola Olawale President Bola Ahmed Tinubu has expressed profound...

By Niccolo Conte

Cyber attacks are becoming more prevalent with increasingly damaging outcomes, presenting new cybersecurity risks to users.

But in spite of the ever-evolving threat landscape, many of the best defenses remain the same. This includes the basics like creating strong passwords and avoiding malicious links. Yet often, people take unnecessary risks due to convenience, among other factors.

This graphic shows the top cybersecurity mistakes in 2023, based on data from Proofpoint.

The Most Common Mistakes Made by Users

Below, we rank the most common risky actions that people made online in 2023, based on a survey of 7,500 end users across 15 countries:

Risky Action / Cybersecurity Mistake Share of Users Who Reported Taking This Action
Using work device for personal activities 29%
Reusing or sharing password 26%
Connecting without using a VPN at a public place 26%
Responding to a message from someone they don’t know 24%
Accessing inappropriate websites 20%

Overall, 71% of respondents said they made a cybersecurity mistake, with the vast majority doing so knowingly.

As we can see, the most common error was using a work device for personal activities followed by reusing or sharing a password. These actions were shown to be motivated by convenience, time-saving benefits, or urgency across users.

Ranking in third was connecting to WiFi networks in public spaces without using a virtual private network (VPN). This presents risks, because when a user connects to public WiFi, it exposes them to unsecured networks. These networks allow cybercriminals to intercept sensitive information, such as login credentials and personal messages.

By using a VPN, it prevents malicious actors from stealing personal information through creating an encrypted tunnel that hides a user’s location and other personal data.

Top Cybersecurity Risks, According to Professionals

While the above data deals with the most common risks taken by users, the same report by Proofpoint also highlights the professional view around what risks are actually the most dangerous.

According to a survey of 1,050 security professionals, clicking on links or downloading attachments from someone that they don’t know was considered the most risky action users could take. By downloading an infected file, it exposes users to computer viruses and malware that mine a computer or device for personal data.

In addition, reusing passwords posed the second-highest security threat, followed by accessing inappropriate websites.

Overall, there is a strong degree of overlap between the top cybersecurity mistakes and the most common risks taken by users. In this way, it highlights how many respondents may be unaware of the scale of risk they expose themselves to, and the importance of using the basic tools to avoid financial losses and unwanted outcomes.

Source: Visual Capitalist 

Hamilton Nwosa
Hamilton Nwosa
Hamilton Nwosa is an experienced, and committed communication, business, administrative, data and research specialist . His deep knowledge of the intersection between communication, business, data, and journalism are quite profound. His passion for professional excellence remains the guiding principle of his work, and in the course of his career spanning sectors such as administration, tourism, business management, communication and journalism, Hamilton has won key awards. He is a delightful writer, researcher and data analyst. He loves team-work, problem-solving, organizational management, communication strategy, and enjoys travelling. He can be reached at: hamilton_68@yahoo.com

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

NDN
Latest News
Breaking Down the West’s $146 Billion 2024 Defence Technology InvestmentG7 vs. the World: GDP, Population, and Military StrengthUS drillers cut oil and gas rigs for 10th week in a row, Baker Hughes saysExclusive! Tinubu Tips Late Ajimobi's Wife, Florence, Others for Ambassadorial PostsTinubu Mourns, Pays Tribute to Legendary Super Eagles Goalkeeper Peter RufaiNatasha vs Akpabio: Court Orders Senate President To Recall Senator NatashaHadi Sirika Denies Defection to ADC Coalition Rumors, Reaffirms Loyalty to Buhari, APCChina Snubs U.S. Crude for Third Month, Even as Ethane Trade RestartsHow Super Eagles Icon Peter Rufai passed Away at 61Dakuku Peterside’s Beneath the Surface Book Out in OctoberOil Prices Dip on Confirmation of Inventory BuildBuhari In Stable Condition - Ex-Aide ConfirmsBREAKING: Ex-President Buhari sick, hospitalised abroad2027: Abure, Usman Clash Over Peter Obi’s Rising Profile in ADC CoalitionMTN’s Dabengwa Tier III Cloud Data Centre: A New Era for West African Tech and AI
X whatsapp