ESET survey highlights Internet users' greatest concerns and their protective measures : Suddenly strange reminders and debt collection demands appear in the mailbox for goods that the person concerned did not even order.
Identity theft and misuse of personal data are the biggest concern for almost half of internet users, according to a representative ESET survey. In second and third place are the infection of devices with malware (25.8 percent) and fraud in online purchases through fake shops (20.6 percent).
But what do the protective measures look like?
Is two-factor authentication (2FA) used to protect the online account? The current survey also provides answers to this.
“The theft of personal identity in particular is a horror scenario for Internet users and is becoming more and more of a problem. Contracts are concluded or goods are ordered in the name of the victim and by the time the fraud has been noticed, it is far too late.”
Michael Schröder, ESET – Manager of Security Business Strategy
“Protecting your own data is therefore extremely important. A password alone to protect the login is no longer enough today. A password manager enables the comfortable use of complex and secure passwords and should be part of the standard equipment. Two-factor authentication should also always be activated. This means cybercriminals have no chance.”
Identity theft is the biggest concern among internet users

45.5 percent of respondents are concerned that they could become victims of identity theft or misuse of their personal information. One in four (25.8 percent) fears infection with malware, and one in five fears fraud, for example through fake shops. Interestingly, ransomware plays a minor role among private users. Only 8.1 percent fear that they could be affected by such encryption Trojans.
2FA is being used more and more frequently

The importance of protecting access data seems to have become increasingly clear to Internet users: more than one in three (34.2 percent) rely on two-factor authentication at every opportunity. This is an increase of 6.4 percent compared to last year's survey. Furthermore, around half of those surveyed (45.8 percent) at least partially rely on “registration in two steps”. Only one in five people still completely avoid using 2FA to protect their access data. Compared to last year, this is a decrease of six percent.
Password managers are being used more and more frequently

The requirements for a secure password are growing. A password manager is a helpful tool for keeping track of the password jungle. A large number of passwords are difficult for Internet users to remember. One in three uses a password manager (30.6 percent) - that's an increase of five percent compared to the ESET survey 2022. 21.4 percent of Internet users use a classic notebook to write down their passwords. 32.2 percent of those surveyed said that they remember their passwords without any aids. Only 9.2 percent use the browser as a storage location for passwords. Only 6.6 percent use identical passwords for several online services.
Tips for protecting personal data
– Always be up to date: Whether operating system or apps – keep your digital companions such as smartphones, tablets and computers always up to date and install updates immediately.
– Outsource important data: Images, videos and other personal data should be outsourced to external storage media. This means they are secured and available even in the event of a failure. We recommend using network storage or cloud storage options for such backups. Especially in the cloud, sensitive data should be reliably encrypted.
– Effectively secure access data: Simply changing the password does not increase security. Using a password manager, like the one in ESET Smart Security Premium, reliably protects passwords and personal data. If possible, use two-factor authentication. In addition to the user name and password, there is another factor, such as a one-time code via SMS or app, fingerprint or facial recognition. Many services such as Facebook, Google or Apple offer this option.
– Use a security solution: A powerful security solution is part of the basic equipment for PCs, Macs and mobile devices. This should offer comprehensive protection against malware and reliably make everyday digital life easier with helpful functions such as parental controls, password managers, data encryption and theft protection.
– Delete unused accounts and profiles: Go through all your online access: Which accounts do you still use and which no longer? When you register, you usually receive a confirmation by email. These messages can also be easily combined with cleaning your email inbox.
About the survey : For the representative survey, ESET surveyed 1,000 men and women of different ages. The online survey was carried out by the market research institute Omniquest on behalf of the European IT security company.
Source: Eset
Related to the topic: Security tips on Facebook: Keep personal data on Facebook up to date
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )

