{"id":6517,"date":"2025-08-01T11:02:57","date_gmt":"2025-08-01T16:02:57","guid":{"rendered":"https:\/\/us.rs-online.com\/expert\/?p=6517"},"modified":"2025-08-12T18:14:36","modified_gmt":"2025-08-12T23:14:36","slug":"cybersecurityreport2025","status":"publish","type":"post","link":"https:\/\/us.rs-online.com\/expert\/cybersecurityreport2025\/","title":{"rendered":"Study reveals more work needs to be done to combat workplace cybersecurity threats"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">New report examines the readiness of the workforce against the backdrop of rising cyber-threats and how more complex security measures are required to combat threats.<\/h3>\n\n\n\n<p>Our new report examines the readiness of the workforce against a range of cybersecurity risks, with data showing that cybersecurity threats are on the rise and set to cost the economy trillions of dollars.<\/p>\n\n\n\n<p>We surveyed 1,000 US-employed respondents across the country to find out how prepared employees are for this technological change, with the range and quantity of threats likely to increase in the coming years.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/mktg-allied-electronics-automation\/image\/upload\/f_auto,q_auto\/v1753983786\/Expert%20Advice\/ae-219-Feature_1_qu1ll2.jpg\" alt=\"\" style=\"width:681px;height:auto\"\/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Workers admit to questionable cybersecurity behavior<\/h2>\n\n\n\n<p>We asked employees a series of questions to see which behaviors they admit to in order to establish how widespread problems are.<\/p>\n\n\n\n<p>The study found that large portions of the population are not following best practices when it comes to online safety.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"388\" height=\"388\" src=\"https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber1.png\" alt=\"\" class=\"wp-image-6555\" style=\"width:388px;height:auto\" srcset=\"https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber1.png 388w, https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber1.png?resize=150,150 150w, https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber1.png?resize=300,300 300w\" sizes=\"auto, (max-width: 388px) 100vw, 388px\" \/><\/figure><\/div>\n\n\n<p>Almost half of those in employment (46%) admit to using the same password across multiple platforms, risking widespread issues should their password be compromised.<\/p>\n\n\n\n<p>Many are also falling for common phishing tactics, including opening unverified documents (18%) and clicking on unverified links (20%).<\/p>\n\n\n\n<p><strong>Common cybersecurity problems (% who admitted to doing this)<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Used the same password for multiple platforms (46%)<\/li>\n\n\n\n<li>Stored passwords on a work laptop, phone, or writing pad (31%)<\/li>\n\n\n\n<li>Left desk without locking\/logging out of\/shutting down computer (28%)<\/li>\n\n\n\n<li>Chosen to avoid using two-factor authentication for logins (26%)<\/li>\n\n\n\n<li>Failed to update software on time (25%)<\/li>\n\n\n\n<li>Used a password with name or birthday in it (24%)<\/li>\n\n\n\n<li>Worked from an unprotected Wi-Fi source (e.g. open Wi-Fi that is not password protected) (20%)<\/li>\n\n\n\n<li>Clicked on a link from an unverified source (20%)<\/li>\n\n\n\n<li>Opened a document from an unverified source (18%)<\/li>\n\n\n\n<li>Skipped or paid little attention to cybersecurity training (13%)<\/li>\n\n\n\n<li>Sent confidential data or files to the wrong recipient (9%)<\/li>\n\n\n\n<li>Failed to report a potential cybersecurity breach (8%)<\/li>\n<\/ol>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/mktg-allied-electronics-automation\/image\/upload\/f_auto,q_auto\/v1753983784\/Expert%20Advice\/ae-219-Feature_3_zzjoox.jpg\" alt=\"\" style=\"width:677px;height:auto\"\/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">How prepared is the workforce?<\/h2>\n\n\n\n<p>The survey also questioned employees about their feelings on how prepared they are for a potential cybersecurity threat, such as a hacking or phishing attempt.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"388\" height=\"388\" src=\"https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber2.png\" alt=\"\" class=\"wp-image-6556\" style=\"width:395px;height:auto\" srcset=\"https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber2.png 388w, https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber2.png?resize=150,150 150w, https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber2.png?resize=300,300 300w\" sizes=\"auto, (max-width: 388px) 100vw, 388px\" \/><\/figure><\/div>\n\n\n<p>Overall, one in ten (10%) said they feel \u201cunprepared\u201d for cybersecurity threats.<\/p>\n\n\n\n<p>A further one in five (21%) said they felt neutral about their preparedness, suggesting that work could still be done to improve their readiness to deal with threats.<\/p>\n\n\n\n<p>Just over a third described themselves as \u201cvery prepared\u201d for any threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is the workforce trained in cybersecurity?<\/h2>\n\n\n\n<p>One element of preparation lies in training for the threat, so we asked the survey respondents how recently, if ever, they have been trained in cybersecurity.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"388\" height=\"388\" src=\"https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber3.png\" alt=\"\" class=\"wp-image-6558\" style=\"width:386px;height:auto\" srcset=\"https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber3.png 388w, https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber3.png?resize=150,150 150w, https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber3.png?resize=300,300 300w\" sizes=\"auto, (max-width: 388px) 100vw, 388px\" \/><\/figure><\/div>\n\n\n<p>Surprisingly, as many as a quarter (26%) of workers say they have never been trained on cybersecurity issues, leaving them open to potential hacks and scams.<\/p>\n\n\n\n<p>A further 6% of those surveyed haven\u2019t been trained in three years or longer, meaning their knowledge is likely out of date.<\/p>\n\n\n\n<p>Luckily, over half (56%) have received cybersecurity training in the past year.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/mktg-allied-electronics-automation\/image\/upload\/f_auto,q_auto\/v1753983785\/Expert%20Advice\/ae-219-Feature_6_ovaywr.jpg\" alt=\"\" style=\"width:678px;height:auto\"\/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Is working from home a problem?<\/h2>\n\n\n\n<p>Since the pandemic, the rate of workers spending at least some of their working week at home <a href=\"https:\/\/www.bls.gov\/opub\/btn\/volume-13\/remote-work-productivity.htm\" target=\"_blank\" rel=\"noreferrer noopener\">has increased<\/a>.<\/p>\n\n\n\n<p>This raises some questions from a cybersecurity perspective as workers will not benefit from automatic protections offered by using company internet in the office.<\/p>\n\n\n\n<p>Some of this relies on the worker joining a VPN, updating their system regularly, and ensuring that their internet connection is secure.<\/p>\n\n\n\n<p>We asked workers how vigilant they have been, with some mixed results.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"388\" height=\"388\" src=\"https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber4.png\" alt=\"\" class=\"wp-image-6559\" style=\"width:388px;height:auto\" srcset=\"https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber4.png 388w, https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber4.png?resize=150,150 150w, https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber4.png?resize=300,300 300w\" sizes=\"auto, (max-width: 388px) 100vw, 388px\" \/><\/figure><\/div>\n\n\n<p>Less than half of workers use a firewall (38%) or join their work VPN (33%) when working from home.<\/p>\n\n\n\n<p><strong>Common WFH problems (% who admitted to doing this)<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Use a firewall (38%)<\/li>\n\n\n\n<li>Join their work VPN (33%)<\/li>\n\n\n\n<li>Regularly change their Wi-Fi password (32%)<\/li>\n\n\n\n<li>Regularly update their router (30%)<\/li>\n\n\n\n<li>Disable remote access (20%)<\/li>\n<\/ol>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/mktg-allied-electronics-automation\/image\/upload\/f_auto,q_auto\/v1753983785\/Expert%20Advice\/ae-219-Feature_8_vq4l1d.jpg\" alt=\"\" style=\"width:672px;height:auto\"\/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Most Americans use their personal device for work purposes<\/h2>\n\n\n\n<p>Our study asked workers whether they were completing all their work on company equipment, or whether some were choosing to use their personal devices for work purposes.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"388\" height=\"388\" src=\"https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber5.png\" alt=\"\" class=\"wp-image-6560\" style=\"width:388px;height:auto\" srcset=\"https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber5.png 388w, https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber5.png?resize=150,150 150w, https:\/\/us.rs-online.com\/expert\/wp-content\/uploads\/2025\/08\/Cyber5.png?resize=300,300 300w\" sizes=\"auto, (max-width: 388px) 100vw, 388px\" \/><\/figure><\/div>\n\n\n<p>Almost three-quarters of workers (72%) said that they have used their personal devices for work in the past.<\/p>\n\n\n\n<p>There is a generational divide here, as younger people (16\u201324-year-olds) are much more likely (78%) to use their personal devices for work, compared to 55+ year olds (60%).<\/p>\n\n\n\n<p>Personal devices are generally not as safe as work devices. Work devices typically restrict apps and software that can be downloaded, force software and security updates onto the user, and can be more easily monitored for suspicious activity.<\/p>\n\n\n\n<p>Workers using their personal devices are likely to leave their organization more vulnerable to cybersecurity threats, yet the vast majority of those surveyed admitted that they work on their personal phone, laptop, or tablet.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Our conclusion<\/h2>\n\n\n\n<p>All evidence points toward cybersecurity threats continuing to increase in scope, quantity, and harm in the coming years.<\/p>\n\n\n\n<p>Organizations stand to lose huge chunks of revenue if they are unprepared for potential threats, and the smart move will almost certainly be to invest further in training and extra measures to combat security threats.<\/p>\n\n\n\n<p><strong>Jared Parker, Security Compliance Manager at RS, concluded: <\/strong>\u201cSurveys of this nature play a vital role in evaluating the effectiveness of cybersecurity training programs currently implemented across organizations.<\/p>\n\n\n\n<p>\u201cAs work from home and Bring Your Own Device (BYOD) policies become increasingly prevalent, the threat landscape continues to evolve, making it imperative for companies to equip employees with up-to-date knowledge on emerging security threats and tactics employed by malicious actors.<\/p>\n\n\n\n<p>\u201cCybersecurity education can no longer be treated as a one-time annual compliance exercise as critical information is easily forgotten without regular reinforcement. Instead, organizations should adopt a continuous learning approach by delivering concise, easily digestible training nuggets throughout the year.<\/p>\n\n\n\n<p>\u201cThese micro-learning modules should focus on helping employees recognize and respond to the latest emerging threats, especially as adversaries leverage advancing technologies like artificial intelligence to refine their attack methods and techniques.\u201d<\/p>\n<div style='text-align:left' class='yasr-auto-insert-visitor'><\/div>","protected":false},"excerpt":{"rendered":"<p>New report examines the readiness of the workforce against the backdrop of rising cyber-threats and how more complex security measures are required to combat threats. Our new report examines the readiness of the workforce against a range of cybersecurity risks, with data showing that cybersecurity threats are on the rise and set to cost the [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":6520,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"BlogPosting","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[345,1067,1,826],"tags":[679,515,649,693,607],"class_list":{"0":"post-6517","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ask-the-expert","8":"category-cybersecurity","9":"category-expert-advice","10":"category-expert-insights","11":"tag-cybersecurity","12":"tag-expert-advice","13":"tag-rs","14":"tag-rs-americas","15":"tag-rs-group"},"yasr_visitor_votes":{"stars_attributes":{"read_only":false,"span_bottom":false},"number_of_votes":2,"sum_votes":10},"jetpack_featured_media_url":"https:\/\/res.cloudinary.com\/mktg-allied-electronics-automation\/image\/upload\/f_auto,q_auto\/v1753983784\/Expert%20Advice\/ae-219-Hero_Image_grlwdo.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/us.rs-online.com\/expert\/wp-json\/wp\/v2\/posts\/6517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/us.rs-online.com\/expert\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/us.rs-online.com\/expert\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/us.rs-online.com\/expert\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/us.rs-online.com\/expert\/wp-json\/wp\/v2\/comments?post=6517"}],"version-history":[{"count":10,"href":"https:\/\/us.rs-online.com\/expert\/wp-json\/wp\/v2\/posts\/6517\/revisions"}],"predecessor-version":[{"id":6561,"href":"https:\/\/us.rs-online.com\/expert\/wp-json\/wp\/v2\/posts\/6517\/revisions\/6561"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/us.rs-online.com\/expert\/wp-json\/wp\/v2\/media\/6520"}],"wp:attachment":[{"href":"https:\/\/us.rs-online.com\/expert\/wp-json\/wp\/v2\/media?parent=6517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/us.rs-online.com\/expert\/wp-json\/wp\/v2\/categories?post=6517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/us.rs-online.com\/expert\/wp-json\/wp\/v2\/tags?post=6517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}