Visualizing the 5 Most Common Cybersecurity Mistakes

Related stories

Details As Court Sentences Gospel Singer Osinachi’s Husband to Death by Hanging

By Abiola Olawale The Federal Capital Territory (FCT) High Court...

Putin Declares 72-Hour Ukraine Ceasefire for May 8-10 to Mark WW2 Victory Anniversary

By Abiola Olawale Russian President Vladimir Putin has announced a...

Abia 4% Votes:Tinubu Not Pleased With Me, Other Allies In Southeast

By Kolawole Ojebisi Former Abia State Governor and Senator representing...

Exam Schedules: Our Timeline Makes Space For Unexpected Outcome, JAMB Replies Obi Over Criticism

By Kolawole Ojebisi The Joint Admissions and Matriculation Board has...

By Niccolo Conte

Cyber attacks are becoming more prevalent with increasingly damaging outcomes, presenting new cybersecurity risks to users.

But in spite of the ever-evolving threat landscape, many of the best defenses remain the same. This includes the basics like creating strong passwords and avoiding malicious links. Yet often, people take unnecessary risks due to convenience, among other factors.

This graphic shows the top cybersecurity mistakes in 2023, based on data from Proofpoint.

The Most Common Mistakes Made by Users

Below, we rank the most common risky actions that people made online in 2023, based on a survey of 7,500 end users across 15 countries:

Risky Action / Cybersecurity Mistake Share of Users Who Reported Taking This Action
Using work device for personal activities 29%
Reusing or sharing password 26%
Connecting without using a VPN at a public place 26%
Responding to a message from someone they don’t know 24%
Accessing inappropriate websites 20%

Overall, 71% of respondents said they made a cybersecurity mistake, with the vast majority doing so knowingly.

As we can see, the most common error was using a work device for personal activities followed by reusing or sharing a password. These actions were shown to be motivated by convenience, time-saving benefits, or urgency across users.

Ranking in third was connecting to WiFi networks in public spaces without using a virtual private network (VPN). This presents risks, because when a user connects to public WiFi, it exposes them to unsecured networks. These networks allow cybercriminals to intercept sensitive information, such as login credentials and personal messages.

By using a VPN, it prevents malicious actors from stealing personal information through creating an encrypted tunnel that hides a user’s location and other personal data.

Top Cybersecurity Risks, According to Professionals

While the above data deals with the most common risks taken by users, the same report by Proofpoint also highlights the professional view around what risks are actually the most dangerous.

According to a survey of 1,050 security professionals, clicking on links or downloading attachments from someone that they don’t know was considered the most risky action users could take. By downloading an infected file, it exposes users to computer viruses and malware that mine a computer or device for personal data.

In addition, reusing passwords posed the second-highest security threat, followed by accessing inappropriate websites.

Overall, there is a strong degree of overlap between the top cybersecurity mistakes and the most common risks taken by users. In this way, it highlights how many respondents may be unaware of the scale of risk they expose themselves to, and the importance of using the basic tools to avoid financial losses and unwanted outcomes.

Source: Visual Capitalist 

Hamilton Nwosa
Hamilton Nwosa
Hamilton Nwosa is an experienced, and committed communication, business, administrative, data and research specialist . His deep knowledge of the intersection between communication, business, data, and journalism are quite profound. His passion for professional excellence remains the guiding principle of his work, and in the course of his career spanning sectors such as administration, tourism, business management, communication and journalism, Hamilton has won key awards. He is a delightful writer, researcher and data analyst. He loves team-work, problem-solving, organizational management, communication strategy, and enjoys travelling. He can be reached at: hamilton_68@yahoo.com

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

[tds_leads input_placeholder="Your email address" btn_horiz_align="content-horiz-center" pp_msg="SSd2ZSUyMHJlYWQlMjBhbmQlMjBhY2NlcHQlMjB0aGUlMjAlM0NhJTIwaHJlZiUzRCUyMiUyMyUyMiUzRVByaXZhY3klMjBQb2xpY3klM0MlMkZhJTNFLg==" pp_checkbox="yes" tdc_css="eyJhbGwiOnsibWFyZ2luLXRvcCI6IjMwIiwibWFyZ2luLWJvdHRvbSI6IjQwIiwiZGlzcGxheSI6IiJ9LCJwb3J0cmFpdCI6eyJtYXJnaW4tdG9wIjoiMTUiLCJtYXJnaW4tYm90dG9tIjoiMjUiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3NjgsImxhbmRzY2FwZSI6eyJtYXJnaW4tdG9wIjoiMjAiLCJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn0sImxhbmRzY2FwZV9tYXhfd2lkdGgiOjExNDAsImxhbmRzY2FwZV9taW5fd2lkdGgiOjEwMTksInBob25lIjp7Im1hcmdpbi10b3AiOiIyMCIsImRpc3BsYXkiOiIifSwicGhvbmVfbWF4X3dpZHRoIjo3Njd9" display="column" gap="eyJhbGwiOiIyMCIsInBvcnRyYWl0IjoiMTAiLCJsYW5kc2NhcGUiOiIxNSJ9" f_msg_font_family="downtown-sans-serif-font_global" f_input_font_family="downtown-sans-serif-font_global" f_btn_font_family="downtown-sans-serif-font_global" f_pp_font_family="downtown-serif-font_global" f_pp_font_size="eyJhbGwiOiIxNSIsInBvcnRyYWl0IjoiMTEifQ==" f_btn_font_weight="700" f_btn_font_size="eyJhbGwiOiIxMyIsInBvcnRyYWl0IjoiMTEifQ==" f_btn_font_transform="uppercase" btn_text="Unlock All" btn_bg="#000000" btn_padd="eyJhbGwiOiIxOCIsImxhbmRzY2FwZSI6IjE0IiwicG9ydHJhaXQiOiIxNCJ9" input_padd="eyJhbGwiOiIxNSIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMCJ9" pp_check_color_a="#000000" f_pp_font_weight="600" pp_check_square="#000000" msg_composer="" pp_check_color="rgba(0,0,0,0.56)" msg_succ_radius="0" msg_err_radius="0" input_border="1" f_unsub_font_family="downtown-sans-serif-font_global" f_msg_font_size="eyJhbGwiOiIxMyIsInBvcnRyYWl0IjoiMTIifQ==" f_input_font_size="eyJhbGwiOiIxNCIsInBvcnRyYWl0IjoiMTIifQ==" f_input_font_weight="500" f_msg_font_weight="500" f_unsub_font_weight="500"]

Latest stories

Latest News
Details As Court Sentences Gospel Singer Osinachi’s Husband to Death by HangingPutin Declares 72-Hour Ukraine Ceasefire for May 8-10 to Mark WW2 Victory AnniversaryAbia 4% Votes:Tinubu Not Pleased With Me, Other Allies In SoutheastCardinals Set To Elect Pope Francis's Successor As Conclave Kick-off On SoonExam Schedules: Our Timeline Makes Space For Unexpected Outcome, JAMB Replies Obi Over CriticismFULL LIST: Davido, Tems, Rema, Zerry DL, Others Bag Award at 17th Headies Awards 2025‘I’ll Be The Last Man Standing In APC,’ Kebbi Gov. Breaks Silence On Defection RumoursDrama As Bayelsa Gov., Pro-Wike Group Trade Blame Over Rally ShootingsWhy I Can't Associate With Tinubu Again -- Ex-LP Campaign Spokesman, OkonkwoGrowing Poverty:Sanwo-Olu Slams Peter Obi, Tells 2023 LP Presidential Candidate To Stop "De-marketing" Nigeria2027: Tinubu Unbeatable Without Coalition, LP Ex-spokesman, Okonkwo Warns Opposition PartiesA Pope's Funeral And New Leadership Paradigm, By Dakuku Peterside  Djebah Welcomes Oborevwori into the APC FamilyNDIC Commences N46.6 Billion Liquidation Dividend Payments to Heritage Bank DepositorsPresidency Breaks Silence, Says Defections to APC Driven by Free Will, Not Coercion
X whatsapp