Increasingly risky computer behaviour blamed on user ‘security fatigue’

Computer users are increasingly turning to risky behaviour as a result of ‘security fatigue’, according to a new study

The US National Institute of Standards and Technology (NIST) found that the majority of their participants would often experience fatigue when forced to navigate computer security.

Users that are regularly confronted with verification steps, asked to accept numerous agreements or forced to remember multiple passwords complain of weariness and develop a lack of interest in cyber-security, findings suggest.

"I don't pay attention to those things anymorePeople get weary from being bombarded by watch out for this or watch out for that'," said one study participant.

Speaking to NIST, computer scientist and co-author Mary Theofanos said: "Years ago, you had one password to keep up with at work. Now people are being asked to remember 25 or 30."

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

We haven't really thought about cyber-security expanding and what it has done to people," said Theofanos.

The study, published in IEEE IT Professional, collected qualitative data using participants from a variety of age groups, locations and occupations. The research panel assessed typical computer behaviour and found that the majority of subjects felt overwhelmed.

NIST also identified feelings of helplessness and resignation, particularly when large corporations are hacked and data is stolen. TalkTalk was recently given a record fine after a security breach in 2015 allowed hackers to access personal details of over 156,000 users.

Ed Macnair, CEO of CensorNet, told IT Pro thatThe security industry and businesses need to work to instil confidence in the public, as well as encourage them to make security a priority.

"Security might appear complex and time consuming, but it really isn't. The public needs to be educated on how simple and quick things like password managers are. More organisations need to force people to use these tools so that it becomes the new normal to use," said Macnair.

Featured Resources

How inkjet can transform your business

Get more out of your business by investing in the right printing technology

Download now

Journey to a modern workplace with Office 365: which tools and when?

A guide to how Office 365 builds a modern workplace

Download now

Modernise and transform your sales organisation

Learn how a modernised sales process can drive your business

Download now

Your guide to managing cloud transformation risk

Realise the benefits. Mitigate the risks

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/mobile/28299/how-to-use-chromecast-without-wi-fi
Mobile

How to use Chromecast without Wi-Fi

5 Feb 2020
Visit/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers
Security

The top ten password-cracking techniques used by hackers

10 Feb 2020
Visit/operating-systems/microsoft-windows/354739/windows-7-bug-blocks-users-from-shutting-down-their-pcs
Microsoft Windows

Windows 7 bug blocks users from shutting down their PCs

10 Feb 2020
Visit/hardware/354723/coronavirus-starts-to-take-its-toll-on-the-tech-industry
Hardware

Coronavirus starts to take its toll on the tech industry

6 Feb 2020