Visualizing the 5 Most Common Cybersecurity Mistakes

Published

37 seconds ago

on

May 20, 2024 Article/Editing:

See this visualization first on the Voronoi app.

The 5 Most Common Cybersecurity Mistakes

This was originally posted on our Voronoi app. Download the app for free on iOS or Android and discover incredible data-driven charts from a variety of trusted sources.

Cyber attacks are becoming more prevalent with increasingly damaging outcomes, presenting new cybersecurity risks to users.

But in spite of the ever-evolving threat landscape, many of the best defenses remain the same. This includes the basics like creating strong passwords and avoiding malicious links. Yet often, people take unnecessary risks due to convenience, among other factors.

This graphic shows the top cybersecurity mistakes in 2023, based on data from Proofpoint.

The Most Common Mistakes Made by Users

Below, we rank the most common risky actions that people made online in 2023, based on a survey of 7,500 end users across 15 countries:

Risky Action / Cybersecurity MistakeShare of Users Who Reported Taking This Action Using work device for personal activities29% Reusing or sharing password26% Connecting without using a VPN at a public place26% Responding to a message from someone they don’t know24% Accessing inappropriate websites20%

Overall, 71% of respondents said they made a cybersecurity mistake, with the vast majority doing so knowingly.

As we can see, the most common error was using a work device for personal activities followed by reusing or sharing a password. These actions were shown to be motivated by convenience, time-saving benefits, or urgency across users.

Ranking in third was connecting to WiFi networks in public spaces without using a virtual private network (VPN). This presents risks, because when a user connects to public WiFi, it exposes them to unsecured networks. These networks allow cybercriminals to intercept sensitive information, such as login credentials and personal messages.

By using a VPN, it prevents malicious actors from stealing personal information through creating an encrypted tunnel that hides a user’s location and other personal data.

Top Cybersecurity Risks, According to Professionals

While the above data deals with the most common risks taken by users, the same report by Proofpoint also highlights the professional view around what risks are actually the most dangerous.

According to