SlideShare a Scribd company logo
1
UK Cyber Survey
Key findings – General
public
April 2019
2
Introduction
▪ Quantitative findings from a study of UK individuals to measure and understand
awareness and attitudes towards cyber security, and related behaviours.
▪ The findings are part of a wider research project to provide insight to inform HM
Government’s approach to encourage positive behaviour amongst the public in
protecting themselves against cyber threats.
Background
▪ 1,350 telephone interviews with general public aged 16+
▪ 12 November 2018 - 9 January 2019
▪ Quotas set and data weighted to represent UK population
Method
3
Summary
4
Summary of key findings
▪ Only 15% say they know a great deal about how to protect themselves online. Younger and
more affluent respondents are more aware and more likely to take protective actions.
• Almost half (46%) agree most information about how to be secure online is confusing.
• 80% say cyber security is a high priority, though this does not mean they take action; some
groups most likely to say it is a priority are least likely to take protective action.
▪ Prevalence of always/often taking protective behaviours ranges from 21% saving passwords
using a password manager, to 75% who use password/passcode/PIN to unlock devices.
▪ The most prevalent online security considerations are protecting privacy and avoiding
money being stolen (52% and 51% respectively, thinking about these ‘a lot’ when online).
▪ 70% believe they will likely be a victim of at least one specific type of cyber crime over the
next two years, and most feel there would be a big personal impact.
▪ Just over one in three (37%) agree that losing money or personal details over the internet is
unavoidable these days.
▪ One in three (34%) rely to some extent on friends/family for help on cyber security; older
people aged 65+ are particularly reliant.
5
Engagement and
capability
6
15
53
23
7 1
Q. Overall, how much, if anything, would you say you know about how best to protect yourself from harmful
cyber activity?
% A great
deal
% A fair
amount
% Not very
much
% Nothing at all
Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI
68%
Know great deal/
fair amount
Two-thirds say they know at least a fair amount about how to protect themselves from harmful cyber activity
(68%), but only 15% know a ‘great deal’. Older and less affluent respondents are less likely to say they know
how to protect themselves and are subsequently also less likely to take action currently.
% a great deal
24
11
17
5
26
26
15
A/B social grade
Not working
Working
65+
25-34
16-24
All
Only 15% say they know a great deal about how to protect themselves online,
which relates to current protective behaviours. The lack of awareness is
particularly prominent amongst older people.
7
18
28
14
26
10
4
Q. To what extent, if at all, do you agree or disagree … Most information on how to be secure online is confusing
% strongly
agree
% tend to
agree
% neither/
nor
% tend to
disagree
% strongly
disagree
Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI
Confusion is likely more a reflection of general lack of awareness, rather than driven by specific
contradictions in messaging/advice, though clarity of advice is still clearly essential moving forwards.
% strongly agree
46%
AGREE
18
2
10
29
28
12
41
10
All
16-24
25-34
65+
DE
AB
No formal qualifications
Degree level or more
Almost half (46%) agree that most information about how to be secure online is
confusing, though this falls to 18% who agree strongly.
8
50
30
12
4
4 1
Q. How high or low a priority is cyber security to you? Would you say it is...
% very high
priority
% fairly high
priority
% medium
priority
% fairly low
priority
% very low
priority
% very high priority
Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI
80%
HIGH PRIORITY
Stated priority is highest amongst respondents aged 55-64 and lowest amongst 16-24 year olds. Conversely,
younger respondents cite greater capabilities and are more likely to take positive behaviours.
50
60
57
35
50
Working
Wales
55-64
16-24
All
Half (50%) claim cyber security is a very high priority to them, with more citing it
a high priority in the workplace. However, stating it is a priority is not a strong
predictor of positive behaviour; capability and other factors are key.
9
Prevalence of always/often
taking the current protective
behaviours ranges from 21%
who save passwords using a
password manager on
smartphone or tablet, to 75%
who use password/ passcode/
PIN to unlock smartphones
or tablets.
10
Behaviours are typically more prevalent amongst 16-54 year olds, with drop off amongst those aged 55+.
There are also variations by social grade, with more affluent respondents more likely to take actions. These
variations are at the overall level and will reflect levels of internet usage and device ownership.
13%
14%
21%
25%
29%
35%
46%
49%
55%
70%
12%
7%
10%
10%
20%
19%
17%
12%
12%
5%
17%
10%
16%
11%
17%
16%
16%
6%
8%
5%
12%
9%
14%
8%
13%
9%
6%
5%
7%
3%
42%
53%
32%
37%
17%
15%
11%
23%
10%
11%
4%
6%
6%
9%
5%
6%
3%
6%
7%
5%
Save passwords for websites when given the option in the web
browser (i.e. Google, Firefox, etc)
Save passwords using a password manager on smartphone or
tablet
Report any phishing emails by hitting the Spam or 'Report
phishing' button
Turn on and use two-factor authentication (2FA) for your main
email account
Back up your most important data
Check emails, texts or social media messages, including those
from known contacts, to see whether they are genuine
Install the latest software and app updates once you notice that
they are available
Manually lock screen or set computer screen to automatically
lock when stepping away
Use a strong and separate password for main email account
Use password/ passcode/PIN to unlock smartphones or tablets
Always Often Sometimes Rarely Never Doesn't apply/DK
Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI
Q. How regularly, if at all, do you do the following things?
11
Risks and
consequences
12
11%
19%
19%
23%
38%
51%
52%
14%
31%
30%
29%
34%
33%
30%
70%
46%
46%
44%
25%
13%
14%
5%
4%
5%
4%
3%
3%
4%
Avoiding being bullied online
Avoiding any potential wider impact on other people
and organisations
Avoiding losing photos
Avoiding embarrassment
Protecting my friends and family
Protecting my own privacy
Avoiding money being stolen
I think about it a lot I think about it sometimes Never think about it Not applicable/DK
Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI
Q. To what extent, if at all, do you think about the following things when going online?
The most prevalent security-related considerations when online are protecting
privacy and avoiding money being stolen
13
Perceived likelihood of being a victim of cyber crime in the next two years ranges from 42% who feel they will have
money stolen which is later reimbursed, through to 12% having information stolen and a ransom demanded.
Crimes are felt to have varying levels of impact; 91% feel that having money stolen without reimbursement would
have a big personal impact, compared to 51% feeling the same about apps being accessed without consent.
42%
30% 30% 29% 27%
21%
12%
69%
62%
51%
76%
91%
72%
66%
Having money stolen
which is then
reimbursed
Personal information
such as photos being
accessed in an
unauthorised way
Apps on your devices
such as Uber,
Deliveroo or
Instagram being
accessed without your
consent
Having a power cut in
your home because
your energy company
has suffered a cyber
attack
Having money stolen
which is not
reimbursed
Losing access to your
accounts such as your
backups or cloud
storage
Personal information
such as photos being
stolen and access
denied until a ransom
is paid
Likely to happen to you over next 2 years Very/fairly big impact
Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI
70% believe they will likely be a victim of at least one specific type of cyber crime
over the next two years, and most feel there would be a big personal impact
14
15
22
831
20
4
Q. To what extent, if at all, do you agree or disagree … Losing money or personal details over the internet is
unavoidable these days
% strongly
agree
% tend to
agree
% neither/
nor
% tend to
disagree
% strongly
disagree
Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI
% strongly agree
37%
AGREE
15
6
19
21
11
All
16-24
65+
No formal qualifications
Degree level or above
Just over one in three (37%) agree that losing money or personal details
over the internet is unavoidable these days
15
Responsibility and
Reliance
16
17
17
7
23
33
2
Q. To what extent, if at all, do you agree or disagree … I rely on friends and family for help on cyber security
% strongly
agree
% tend
to agree
% neither/
nor
% tend to
disagree
% strongly
disagree
Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI
Reliance is far greater amongst older people aged 65+.
% strongly agree
34%
AGREE
17
23
12
8
7
11
31
28
11
25
12
All
Female
Male
16-24
25-34
35-44
65+
No formal qualifications
Degree level or above
Not working
Working
One in three rely to some extent on friends and family for help on
cyber security
17
8%
14%
15%
16%
24%
44%
72%
60%
39%
4%
2%
1%
Creating online accounts for me
Checking the security settings on my devices
Getting advice and information on how to
be secure online
Fully reliant on others Partly reliant on others Not reliant at all Don’t know
Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019
Q. How reliant, if at all, are you on other people for the following things?
Six in ten (59%) say they are at least partly reliant on others for
advice and information about how to be secure online.
18
Children – and to a lesser extent friends and other family members – are identified as key
sources of help for actions such as creating online accounts and/or checking security settings on
devices.
16%
5% 5%
15%
22%
19%
13%
14%
15%
10%
6% 6%
8%
11%
14%
7%
6% 6%
5%
7% 7%
Getting advice and information on how to be
secure online
Creating online accounts for me Checking the security settings on my devices
Google or other search engine Children over the age of 16 Friend Work colleague My partner Other relative A sibling
Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI
19
This work was carried out in accordance with the requirements of the international quality
standard for market research, ISO 20252:2012 and with the Ipsos MORI Terms and Conditions
ashley.ames@ipsos.com
james.stannard@ipsos.com
dorothee.stellmacher@Ipsos.com
Technical note
The UK Cyber Survey was carried out by Ipsos MORI on behalf of the National Cyber
Security Centre and Department for Digital, Culture, Media and Sport (DCMS).
A telephone survey of 1,350 UK residents aged 16+ was undertaken from 12
November 2018 to 9 January 2019.The data have been weighted to be statistically
representative of the UK adult population.

More Related Content

What's hot

Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 
2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey
4iQ
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
Meg Weber
 
What People Want: Accenture Public Service Citizen Survey - Wave 2
What People Want: Accenture Public Service Citizen Survey - Wave 2What People Want: Accenture Public Service Citizen Survey - Wave 2
What People Want: Accenture Public Service Citizen Survey - Wave 2
accenture
 
Managing reputation for US technology companies in the UK
Managing reputation for US technology companies in the UKManaging reputation for US technology companies in the UK
Managing reputation for US technology companies in the UK
Brunswick Group
 
Online reputation management survey presentation
Online reputation management survey presentationOnline reputation management survey presentation
Online reputation management survey presentationJosep Claret
 
Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...
Compliancy Group
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
EMC
 
Winning the Cybersecurity Battle
Winning the Cybersecurity BattleWinning the Cybersecurity Battle
Winning the Cybersecurity Battle
GovLoop
 
The software-security-risk-report
The software-security-risk-reportThe software-security-risk-report
The software-security-risk-report
Комсс Файквэе
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALPeggy Lawless
 
5 Interactive Marketing + Technology Trends
5 Interactive Marketing + Technology Trends5 Interactive Marketing + Technology Trends
5 Interactive Marketing + Technology Trends
Craig Pladson
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
Merry D'souza
 
3rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 20183rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 2018
NormShield
 
Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?
Guy Pearce
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
Entersoft Security
 
Emerging Social Media Trends You Need to Know
Emerging Social Media Trends You Need to KnowEmerging Social Media Trends You Need to Know
Emerging Social Media Trends You Need to Know
Richard Harrington
 
Online Safety Index for Parents
Online Safety Index for ParentsOnline Safety Index for Parents
Online Safety Index for Parents
- Mark - Fullbright
 

What's hot (18)

Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
What People Want: Accenture Public Service Citizen Survey - Wave 2
What People Want: Accenture Public Service Citizen Survey - Wave 2What People Want: Accenture Public Service Citizen Survey - Wave 2
What People Want: Accenture Public Service Citizen Survey - Wave 2
 
Managing reputation for US technology companies in the UK
Managing reputation for US technology companies in the UKManaging reputation for US technology companies in the UK
Managing reputation for US technology companies in the UK
 
Online reputation management survey presentation
Online reputation management survey presentationOnline reputation management survey presentation
Online reputation management survey presentation
 
Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
Winning the Cybersecurity Battle
Winning the Cybersecurity BattleWinning the Cybersecurity Battle
Winning the Cybersecurity Battle
 
The software-security-risk-report
The software-security-risk-reportThe software-security-risk-report
The software-security-risk-report
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINAL
 
5 Interactive Marketing + Technology Trends
5 Interactive Marketing + Technology Trends5 Interactive Marketing + Technology Trends
5 Interactive Marketing + Technology Trends
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
3rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 20183rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 2018
 
Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
Emerging Social Media Trends You Need to Know
Emerging Social Media Trends You Need to KnowEmerging Social Media Trends You Need to Know
Emerging Social Media Trends You Need to Know
 
Online Safety Index for Parents
Online Safety Index for ParentsOnline Safety Index for Parents
Online Safety Index for Parents
 

Similar to Uk Cyber Security Survey 2019

TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALPeggy Lawless
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
CheapSSLsecurity
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
blondellchancy
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
BHANU281672
 
Cyber Security Awareness Survey: India
Cyber Security Awareness Survey: IndiaCyber Security Awareness Survey: India
Cyber Security Awareness Survey: India
Ujjwal Singh
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
nirmal00776
 
Ccia internet security presentation fin
Ccia internet security presentation finCcia internet security presentation fin
Ccia internet security presentation finLiz Gannes
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
MindMake - Parenting & Education
 
Cyber Safety.Pdf[2]
Cyber Safety.Pdf[2]Cyber Safety.Pdf[2]
Cyber Safety.Pdf[2]guestd2eda2
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
Pew Research Center
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey
Experian_US
 
Doc handout
Doc handoutDoc handout
Doc handout
Nhật Anh Nguyễn
 
Digital-Civility-2020-Global-Report.pptx
Digital-Civility-2020-Global-Report.pptxDigital-Civility-2020-Global-Report.pptx
Digital-Civility-2020-Global-Report.pptx
S Kunto Adi Wibowo
 
Digital civility-2020-global-report
Digital civility-2020-global-reportDigital civility-2020-global-report
Digital civility-2020-global-report
Tống Bảo Hoàng
 
Not logging on, but living on
Not logging on, but living onNot logging on, but living on
Not logging on, but living on
Digital Policy and Law Consulting
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
Symantec
 
Sony Xperia Campaign Proposal
Sony Xperia Campaign ProposalSony Xperia Campaign Proposal
Sony Xperia Campaign Proposal
Maureen Mohan, M.A.
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
Echoworx
 

Similar to Uk Cyber Security Survey 2019 (20)

TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINAL
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
 
Cyber Security Awareness Survey: India
Cyber Security Awareness Survey: IndiaCyber Security Awareness Survey: India
Cyber Security Awareness Survey: India
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
 
Ccia internet security presentation fin
Ccia internet security presentation finCcia internet security presentation fin
Ccia internet security presentation fin
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
Cyber Safety.Pdf[2]
Cyber Safety.Pdf[2]Cyber Safety.Pdf[2]
Cyber Safety.Pdf[2]
 
Cyber Safety.Pdf[2]
Cyber Safety.Pdf[2]Cyber Safety.Pdf[2]
Cyber Safety.Pdf[2]
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey
 
Doc handout
Doc handoutDoc handout
Doc handout
 
Digital-Civility-2020-Global-Report.pptx
Digital-Civility-2020-Global-Report.pptxDigital-Civility-2020-Global-Report.pptx
Digital-Civility-2020-Global-Report.pptx
 
Digital civility-2020-global-report
Digital civility-2020-global-reportDigital civility-2020-global-report
Digital civility-2020-global-report
 
Not logging on, but living on
Not logging on, but living onNot logging on, but living on
Not logging on, but living on
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
Sony Xperia Campaign Proposal
Sony Xperia Campaign ProposalSony Xperia Campaign Proposal
Sony Xperia Campaign Proposal
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 

More from Ipsos UK

The Beat: 5 years on from the Brexit vote
The Beat: 5 years on from the Brexit voteThe Beat: 5 years on from the Brexit vote
The Beat: 5 years on from the Brexit vote
Ipsos UK
 
Bridging the gap: cyber security skills
Bridging the gap: cyber security skillsBridging the gap: cyber security skills
Bridging the gap: cyber security skills
Ipsos UK
 
The state of cyber resilience in the UK
The state of cyber resilience in the UKThe state of cyber resilience in the UK
The state of cyber resilience in the UK
Ipsos UK
 
Ipsos Global Advisor: The Perils of Perception: Environment and Climate Change
Ipsos Global Advisor:  The Perils of Perception: Environment and Climate ChangeIpsos Global Advisor:  The Perils of Perception: Environment and Climate Change
Ipsos Global Advisor: The Perils of Perception: Environment and Climate Change
Ipsos UK
 
Ipsos Community: Quotes following the events around the vigil for Sarah Everard
Ipsos Community: Quotes following the events around the vigil for Sarah EverardIpsos Community: Quotes following the events around the vigil for Sarah Everard
Ipsos Community: Quotes following the events around the vigil for Sarah Everard
Ipsos UK
 
Global Infrastructure Index 2020
Global Infrastructure Index 2020Global Infrastructure Index 2020
Global Infrastructure Index 2020
Ipsos UK
 
Women, work and COVID-19
Women, work and COVID-19Women, work and COVID-19
Women, work and COVID-19
Ipsos UK
 
US Election 2020 Webinar - Ipsos MORI
US Election 2020 Webinar - Ipsos MORIUS Election 2020 Webinar - Ipsos MORI
US Election 2020 Webinar - Ipsos MORI
Ipsos UK
 
Sexual orientation and attitudes to LGBTQ+ in Britain
Sexual orientation and attitudes to LGBTQ+ in BritainSexual orientation and attitudes to LGBTQ+ in Britain
Sexual orientation and attitudes to LGBTQ+ in Britain
Ipsos UK
 
COVID-19: Conspiracies and Confusions and the link with Social Media
COVID-19: Conspiracies and Confusions and the link with Social MediaCOVID-19: Conspiracies and Confusions and the link with Social Media
COVID-19: Conspiracies and Confusions and the link with Social Media
Ipsos UK
 
Solving the Cyber Security Skills Gap with DCMS
Solving the Cyber Security Skills Gap with DCMSSolving the Cyber Security Skills Gap with DCMS
Solving the Cyber Security Skills Gap with DCMS
Ipsos UK
 
Ipsos MORI Politial Pulse - April 2020
Ipsos MORI Politial Pulse - April 2020Ipsos MORI Politial Pulse - April 2020
Ipsos MORI Politial Pulse - April 2020
Ipsos UK
 
Ipsos MORI Political Monitor - March 2020
Ipsos MORI Political Monitor - March 2020Ipsos MORI Political Monitor - March 2020
Ipsos MORI Political Monitor - March 2020
Ipsos UK
 
International Women's Day 2020: What is acceptable behaviour in the workplace?
International Women's Day 2020: What is acceptable behaviour in the workplace?International Women's Day 2020: What is acceptable behaviour in the workplace?
International Women's Day 2020: What is acceptable behaviour in the workplace?
Ipsos UK
 
Coronavirus Opinion and Reaction - Ipsos MORI
Coronavirus Opinion and Reaction - Ipsos MORICoronavirus Opinion and Reaction - Ipsos MORI
Coronavirus Opinion and Reaction - Ipsos MORI
Ipsos UK
 
The Perils of Perception 2020: Causes of Death
The Perils of Perception 2020: Causes of DeathThe Perils of Perception 2020: Causes of Death
The Perils of Perception 2020: Causes of Death
Ipsos UK
 
Public Perception of Environmental Impact: Ipsos Omnibus Poll
Public Perception of Environmental Impact: Ipsos Omnibus PollPublic Perception of Environmental Impact: Ipsos Omnibus Poll
Public Perception of Environmental Impact: Ipsos Omnibus Poll
Ipsos UK
 
Ipsos MORI Social Media Britain November 2019
Ipsos MORI Social Media Britain November 2019Ipsos MORI Social Media Britain November 2019
Ipsos MORI Social Media Britain November 2019
Ipsos UK
 
Ipsos MORI 2019 General Election Campign Tracker - Housing
Ipsos MORI 2019 General Election Campign Tracker - HousingIpsos MORI 2019 General Election Campign Tracker - Housing
Ipsos MORI 2019 General Election Campign Tracker - Housing
Ipsos UK
 
Ipsos MORI Political Monitor - 6 December 2019
Ipsos MORI Political Monitor - 6 December 2019Ipsos MORI Political Monitor - 6 December 2019
Ipsos MORI Political Monitor - 6 December 2019
Ipsos UK
 

More from Ipsos UK (20)

The Beat: 5 years on from the Brexit vote
The Beat: 5 years on from the Brexit voteThe Beat: 5 years on from the Brexit vote
The Beat: 5 years on from the Brexit vote
 
Bridging the gap: cyber security skills
Bridging the gap: cyber security skillsBridging the gap: cyber security skills
Bridging the gap: cyber security skills
 
The state of cyber resilience in the UK
The state of cyber resilience in the UKThe state of cyber resilience in the UK
The state of cyber resilience in the UK
 
Ipsos Global Advisor: The Perils of Perception: Environment and Climate Change
Ipsos Global Advisor:  The Perils of Perception: Environment and Climate ChangeIpsos Global Advisor:  The Perils of Perception: Environment and Climate Change
Ipsos Global Advisor: The Perils of Perception: Environment and Climate Change
 
Ipsos Community: Quotes following the events around the vigil for Sarah Everard
Ipsos Community: Quotes following the events around the vigil for Sarah EverardIpsos Community: Quotes following the events around the vigil for Sarah Everard
Ipsos Community: Quotes following the events around the vigil for Sarah Everard
 
Global Infrastructure Index 2020
Global Infrastructure Index 2020Global Infrastructure Index 2020
Global Infrastructure Index 2020
 
Women, work and COVID-19
Women, work and COVID-19Women, work and COVID-19
Women, work and COVID-19
 
US Election 2020 Webinar - Ipsos MORI
US Election 2020 Webinar - Ipsos MORIUS Election 2020 Webinar - Ipsos MORI
US Election 2020 Webinar - Ipsos MORI
 
Sexual orientation and attitudes to LGBTQ+ in Britain
Sexual orientation and attitudes to LGBTQ+ in BritainSexual orientation and attitudes to LGBTQ+ in Britain
Sexual orientation and attitudes to LGBTQ+ in Britain
 
COVID-19: Conspiracies and Confusions and the link with Social Media
COVID-19: Conspiracies and Confusions and the link with Social MediaCOVID-19: Conspiracies and Confusions and the link with Social Media
COVID-19: Conspiracies and Confusions and the link with Social Media
 
Solving the Cyber Security Skills Gap with DCMS
Solving the Cyber Security Skills Gap with DCMSSolving the Cyber Security Skills Gap with DCMS
Solving the Cyber Security Skills Gap with DCMS
 
Ipsos MORI Politial Pulse - April 2020
Ipsos MORI Politial Pulse - April 2020Ipsos MORI Politial Pulse - April 2020
Ipsos MORI Politial Pulse - April 2020
 
Ipsos MORI Political Monitor - March 2020
Ipsos MORI Political Monitor - March 2020Ipsos MORI Political Monitor - March 2020
Ipsos MORI Political Monitor - March 2020
 
International Women's Day 2020: What is acceptable behaviour in the workplace?
International Women's Day 2020: What is acceptable behaviour in the workplace?International Women's Day 2020: What is acceptable behaviour in the workplace?
International Women's Day 2020: What is acceptable behaviour in the workplace?
 
Coronavirus Opinion and Reaction - Ipsos MORI
Coronavirus Opinion and Reaction - Ipsos MORICoronavirus Opinion and Reaction - Ipsos MORI
Coronavirus Opinion and Reaction - Ipsos MORI
 
The Perils of Perception 2020: Causes of Death
The Perils of Perception 2020: Causes of DeathThe Perils of Perception 2020: Causes of Death
The Perils of Perception 2020: Causes of Death
 
Public Perception of Environmental Impact: Ipsos Omnibus Poll
Public Perception of Environmental Impact: Ipsos Omnibus PollPublic Perception of Environmental Impact: Ipsos Omnibus Poll
Public Perception of Environmental Impact: Ipsos Omnibus Poll
 
Ipsos MORI Social Media Britain November 2019
Ipsos MORI Social Media Britain November 2019Ipsos MORI Social Media Britain November 2019
Ipsos MORI Social Media Britain November 2019
 
Ipsos MORI 2019 General Election Campign Tracker - Housing
Ipsos MORI 2019 General Election Campign Tracker - HousingIpsos MORI 2019 General Election Campign Tracker - Housing
Ipsos MORI 2019 General Election Campign Tracker - Housing
 
Ipsos MORI Political Monitor - 6 December 2019
Ipsos MORI Political Monitor - 6 December 2019Ipsos MORI Political Monitor - 6 December 2019
Ipsos MORI Political Monitor - 6 December 2019
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Uk Cyber Security Survey 2019

  • 1. 1 UK Cyber Survey Key findings – General public April 2019
  • 2. 2 Introduction ▪ Quantitative findings from a study of UK individuals to measure and understand awareness and attitudes towards cyber security, and related behaviours. ▪ The findings are part of a wider research project to provide insight to inform HM Government’s approach to encourage positive behaviour amongst the public in protecting themselves against cyber threats. Background ▪ 1,350 telephone interviews with general public aged 16+ ▪ 12 November 2018 - 9 January 2019 ▪ Quotas set and data weighted to represent UK population Method
  • 4. 4 Summary of key findings ▪ Only 15% say they know a great deal about how to protect themselves online. Younger and more affluent respondents are more aware and more likely to take protective actions. • Almost half (46%) agree most information about how to be secure online is confusing. • 80% say cyber security is a high priority, though this does not mean they take action; some groups most likely to say it is a priority are least likely to take protective action. ▪ Prevalence of always/often taking protective behaviours ranges from 21% saving passwords using a password manager, to 75% who use password/passcode/PIN to unlock devices. ▪ The most prevalent online security considerations are protecting privacy and avoiding money being stolen (52% and 51% respectively, thinking about these ‘a lot’ when online). ▪ 70% believe they will likely be a victim of at least one specific type of cyber crime over the next two years, and most feel there would be a big personal impact. ▪ Just over one in three (37%) agree that losing money or personal details over the internet is unavoidable these days. ▪ One in three (34%) rely to some extent on friends/family for help on cyber security; older people aged 65+ are particularly reliant.
  • 6. 6 15 53 23 7 1 Q. Overall, how much, if anything, would you say you know about how best to protect yourself from harmful cyber activity? % A great deal % A fair amount % Not very much % Nothing at all Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI 68% Know great deal/ fair amount Two-thirds say they know at least a fair amount about how to protect themselves from harmful cyber activity (68%), but only 15% know a ‘great deal’. Older and less affluent respondents are less likely to say they know how to protect themselves and are subsequently also less likely to take action currently. % a great deal 24 11 17 5 26 26 15 A/B social grade Not working Working 65+ 25-34 16-24 All Only 15% say they know a great deal about how to protect themselves online, which relates to current protective behaviours. The lack of awareness is particularly prominent amongst older people.
  • 7. 7 18 28 14 26 10 4 Q. To what extent, if at all, do you agree or disagree … Most information on how to be secure online is confusing % strongly agree % tend to agree % neither/ nor % tend to disagree % strongly disagree Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI Confusion is likely more a reflection of general lack of awareness, rather than driven by specific contradictions in messaging/advice, though clarity of advice is still clearly essential moving forwards. % strongly agree 46% AGREE 18 2 10 29 28 12 41 10 All 16-24 25-34 65+ DE AB No formal qualifications Degree level or more Almost half (46%) agree that most information about how to be secure online is confusing, though this falls to 18% who agree strongly.
  • 8. 8 50 30 12 4 4 1 Q. How high or low a priority is cyber security to you? Would you say it is... % very high priority % fairly high priority % medium priority % fairly low priority % very low priority % very high priority Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI 80% HIGH PRIORITY Stated priority is highest amongst respondents aged 55-64 and lowest amongst 16-24 year olds. Conversely, younger respondents cite greater capabilities and are more likely to take positive behaviours. 50 60 57 35 50 Working Wales 55-64 16-24 All Half (50%) claim cyber security is a very high priority to them, with more citing it a high priority in the workplace. However, stating it is a priority is not a strong predictor of positive behaviour; capability and other factors are key.
  • 9. 9 Prevalence of always/often taking the current protective behaviours ranges from 21% who save passwords using a password manager on smartphone or tablet, to 75% who use password/ passcode/ PIN to unlock smartphones or tablets.
  • 10. 10 Behaviours are typically more prevalent amongst 16-54 year olds, with drop off amongst those aged 55+. There are also variations by social grade, with more affluent respondents more likely to take actions. These variations are at the overall level and will reflect levels of internet usage and device ownership. 13% 14% 21% 25% 29% 35% 46% 49% 55% 70% 12% 7% 10% 10% 20% 19% 17% 12% 12% 5% 17% 10% 16% 11% 17% 16% 16% 6% 8% 5% 12% 9% 14% 8% 13% 9% 6% 5% 7% 3% 42% 53% 32% 37% 17% 15% 11% 23% 10% 11% 4% 6% 6% 9% 5% 6% 3% 6% 7% 5% Save passwords for websites when given the option in the web browser (i.e. Google, Firefox, etc) Save passwords using a password manager on smartphone or tablet Report any phishing emails by hitting the Spam or 'Report phishing' button Turn on and use two-factor authentication (2FA) for your main email account Back up your most important data Check emails, texts or social media messages, including those from known contacts, to see whether they are genuine Install the latest software and app updates once you notice that they are available Manually lock screen or set computer screen to automatically lock when stepping away Use a strong and separate password for main email account Use password/ passcode/PIN to unlock smartphones or tablets Always Often Sometimes Rarely Never Doesn't apply/DK Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI Q. How regularly, if at all, do you do the following things?
  • 12. 12 11% 19% 19% 23% 38% 51% 52% 14% 31% 30% 29% 34% 33% 30% 70% 46% 46% 44% 25% 13% 14% 5% 4% 5% 4% 3% 3% 4% Avoiding being bullied online Avoiding any potential wider impact on other people and organisations Avoiding losing photos Avoiding embarrassment Protecting my friends and family Protecting my own privacy Avoiding money being stolen I think about it a lot I think about it sometimes Never think about it Not applicable/DK Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI Q. To what extent, if at all, do you think about the following things when going online? The most prevalent security-related considerations when online are protecting privacy and avoiding money being stolen
  • 13. 13 Perceived likelihood of being a victim of cyber crime in the next two years ranges from 42% who feel they will have money stolen which is later reimbursed, through to 12% having information stolen and a ransom demanded. Crimes are felt to have varying levels of impact; 91% feel that having money stolen without reimbursement would have a big personal impact, compared to 51% feeling the same about apps being accessed without consent. 42% 30% 30% 29% 27% 21% 12% 69% 62% 51% 76% 91% 72% 66% Having money stolen which is then reimbursed Personal information such as photos being accessed in an unauthorised way Apps on your devices such as Uber, Deliveroo or Instagram being accessed without your consent Having a power cut in your home because your energy company has suffered a cyber attack Having money stolen which is not reimbursed Losing access to your accounts such as your backups or cloud storage Personal information such as photos being stolen and access denied until a ransom is paid Likely to happen to you over next 2 years Very/fairly big impact Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI 70% believe they will likely be a victim of at least one specific type of cyber crime over the next two years, and most feel there would be a big personal impact
  • 14. 14 15 22 831 20 4 Q. To what extent, if at all, do you agree or disagree … Losing money or personal details over the internet is unavoidable these days % strongly agree % tend to agree % neither/ nor % tend to disagree % strongly disagree Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI % strongly agree 37% AGREE 15 6 19 21 11 All 16-24 65+ No formal qualifications Degree level or above Just over one in three (37%) agree that losing money or personal details over the internet is unavoidable these days
  • 16. 16 17 17 7 23 33 2 Q. To what extent, if at all, do you agree or disagree … I rely on friends and family for help on cyber security % strongly agree % tend to agree % neither/ nor % tend to disagree % strongly disagree Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI Reliance is far greater amongst older people aged 65+. % strongly agree 34% AGREE 17 23 12 8 7 11 31 28 11 25 12 All Female Male 16-24 25-34 35-44 65+ No formal qualifications Degree level or above Not working Working One in three rely to some extent on friends and family for help on cyber security
  • 17. 17 8% 14% 15% 16% 24% 44% 72% 60% 39% 4% 2% 1% Creating online accounts for me Checking the security settings on my devices Getting advice and information on how to be secure online Fully reliant on others Partly reliant on others Not reliant at all Don’t know Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Q. How reliant, if at all, are you on other people for the following things? Six in ten (59%) say they are at least partly reliant on others for advice and information about how to be secure online.
  • 18. 18 Children – and to a lesser extent friends and other family members – are identified as key sources of help for actions such as creating online accounts and/or checking security settings on devices. 16% 5% 5% 15% 22% 19% 13% 14% 15% 10% 6% 6% 8% 11% 14% 7% 6% 6% 5% 7% 7% Getting advice and information on how to be secure online Creating online accounts for me Checking the security settings on my devices Google or other search engine Children over the age of 16 Friend Work colleague My partner Other relative A sibling Base: 1,350 General Public, Aged 16+, UK, Fieldwork Dates : 12th November 2018 - 9th January 2019 Source: Ipsos MORI
  • 19. 19 This work was carried out in accordance with the requirements of the international quality standard for market research, ISO 20252:2012 and with the Ipsos MORI Terms and Conditions ashley.ames@ipsos.com james.stannard@ipsos.com dorothee.stellmacher@Ipsos.com Technical note The UK Cyber Survey was carried out by Ipsos MORI on behalf of the National Cyber Security Centre and Department for Digital, Culture, Media and Sport (DCMS). A telephone survey of 1,350 UK residents aged 16+ was undertaken from 12 November 2018 to 9 January 2019.The data have been weighted to be statistically representative of the UK adult population.