Why The Home User Is Susceptible To Computer Security Vulnerabilities

Studies of computer security vulnerabilities show the home computer user is particularly susceptible to attack when online... and usually without the user's knowledge. Consider these statistics from independent surveys on how well home users guard privacy and online security...

1. 60-80% Of Home Users Are Infected With Spyware

Various studies show between 60-80 percent of all Internet-connected computers are infected with spyware.

What's more, over one-third of PCs contain the serious system monitors, such as a key logger, which records each keystroke, conveying confidential information, such as usernames, passwords and credit card numbers.

2. 80% Of Spam Comes From Home Zombie PCs

Up to eighty percent of spam emails are redirected through computer security vulnerabilities of unsuspecting home users. The computer vulnerability is from Remote Access Trojans, allowing spammers to control their PCs.

Security companies have shown that the majority of spam now emanates from these zombie PC networks, or 'BotNets'... and much of it comes from IP ranges allocated to the high-speed cable or ADSL accounts of home users.

In November 2008, McColo, an Internet Service Provider (ISP) which was providing service to botnet operators, was shut down and spam dropped 50%-75% Internet-wide!

The attacker can take full control of the home computer, as long as it is connected to the Internet. These attackers can steal information, read files, write files and send emails from that user's name -- it's as though the attacker has broken into the office or home and is sitting in front of that computer.

3. Crackers Love Home And Small Business Computers

Crackers favorite targets are the home and home office computers connected by broadband to the Internet. Because the connection is always open, there is more opportunity to locate these computers with their scanners.

Eighty per cent (we can't get away from the 80:20 rule with malware, can we!) of small businesses never recover from serious computer security vulnerabilities breached by a cracker. They are forced to close within the following 12 months -- a sobering thought for those of us running our own business.

Why Are Home/Home Office Computers Susceptible?

Spammers and crackers know that home users are notorious for not keeeping their computer security vulnerabilities fixed and up-to-date.

Studies, such as that from the AOL/National Cyber Security Alliance, show that the confidence of the perpetrators is justified. Their scans of home and home office computers showed that they typically lack effective protection to guard privacy and online security... so they are easy to compromise.

Users are unaware of their vulnerability to these risks. They are equally unaware of the potentially catastrophic impact these attacks may have on them and so they don't see the necessity of installing effective Internet security and privacy protection.

However, when our PCs are connected to the Internet, it is a two way connection. Not only can we access the Net, but the line is open for access to the home via the computer security vulnerabilities. And so, of course, we are also open to the Internet security risks that are present at all times... from cracker and Trojan attacks to infection with viruses, worms and spyware.

The effect could be an unworkable computer, identity theft, destruction or theft of client or other business information and external control of our computer by an intruder.

For a summary of these risks, see, Know These Computer Security Threats.

By acquiring a little knowledge of, Protection For Those Computer Security Vulnerabilities and Tips For Choosing Your Software, we can all connect to the Internet with complete peace of mind.

You are now on your way to doing just that!


Supporting Articles

  1. Know These Computer Security Threats For Internet Protection
  2. The Three Levels Of Internet Risk Protection
  3. See These Tips Before Choosing Your Software

Web www.guard-privacy-and-online-security.com

New! Comments

Have your say about what you just read! Leave me a comment in the box below.