Who Practices Digital Safety Better, Mac Or Windows Users?

Despite ever-evolving changes in the cyber security landscape, many people still hold outdated digital ideas about digital  safety. One example is a belief that computer viruses primarily target Windows machines, but not Mac devices. While this may have been partially true in the past, it certainly isn’t today.

Researchers form All About Cookies (AAC) surveyed people to see if there are any other noticeable differences between Windows and Mac users on cyber security measures. Here is a summary of what they found: 

Key Findings

  • PC and Mac users report computer issues at the same rate, including viruses, malware, and major computer repairs.
  • Mac users are significantly less likely than Windows users to use antivirus software (34% of Mac users vs. 57% of Windows users).
  • Mac users are also significantly less likely than Windows users to use anti-spyware software (9% of Mac users vs. 20% of Windows users).
  • Windows users are more likely to feel unsafe on public Wi-Fi (52%) than Mac users (44%).
  • Mac users are significantly more likely than Windows users to use autofill for passwords, personal info, and financial info.

Safety Measures Using Operating Systems

While most devices and operating systems come with built-in safety and security features, there are additional ways that users can increase the safety and security of their devices. Mac users are more likely than Windows users to opt in to features like two-factor authentication, fingerprint recognition, facial recognition, and regular device back-ups.

One thing all these features have in common is how easy it is for Apple users to implement them. Things like Touch ID (fingerprint recognition), Face ID (facial recognition), and iCloud back-ups come standard on most Apple devices. Plus, two-factor authentication is incredibly easy to implement on Apple’s operating system.

However, Windows users are more likely to implement more powerful security tools, especially antivirus software: 57% of Windows users use it compared to just 34% of Mac users. Similarly, Windows users use firewalls at a rate 11 points higher than Mac users (34% vs. 23%), and they also use anti-spyware software more than twice as often.

Regardless of your preferred operating system, it’s always a good idea to keep your software up to date. System updates frequently include bug fixes, improvements, and security patches. Outdated software can be more vulnerable to attack.

On this front, Windows users are better at staying on top of things than their Mac counterparts. Nearly half of Windows users (48%) tend to update their systems as soon as possible compared to just over one third of Mac users (34%).

Online Safety by Operating System

While the internet is an incredible resource, it also allows cybercriminals to target your information and devices. That includes your passwords and browser autofill data. Your browser’s built-in password storage and autofill functionality makes it easy to enter login information, credit card details, and other personal info when you buy something online or fill out a form. While this seems convenient, it can become another target for cybercriminals.

Despite that risk, more than two thirds of both Windows and Mac users use browser autofill tools to save passwords. Mac users are notably more likely to use them for that purpose.

In fact, Mac users are more likely to use browser autofill to store every single kind of data available, including nearly half of Mac users (48%) who report storing their credit or debit card information on their browser. That rate is 11 points higher than Windows users (37%).

Public Wi-Fi has become an important amenity in our increasingly connected world. And while it can be convenient to go online at coffee shops and bookstores, connecting to an unsecured Wi-Fi network is a risk. Because of that, more than half of Windows users (52%) indicate they feel unsafe on public wireless networks, while 44% of Mac users say they feel the same way.

Operating System Digital Safety Headaches

While many users of both Windows and Mac operating systems take advantage of some available safety features, there is no way to guarantee your device’s security unless you refuse to connect it to the Internet. Almost half of Mac (49%) and Windows (47%) users report that they have gotten a computer virus on their device. Given old-school thoughts about Macs’ resistance to viruses, it is notable that virus rates are incredibly similar on both operating systems.

And given AAC's earlier findings about how many people use antivirus software, it’s even more notable that Mac users report viruses at a slightly higher rate than Windows users.

Phishing Attempts by Email Provider

Phishing is an incredibly common method cybercriminals use in an attempt to gain access to people’s personal information. It is so common, in fact, that the AAC survey found that the average person encounters 13 phishing attempts every week - mostly in their email inboxes.

Beyond operating systems, AAC wanted to see if someone’s preferred email provider impacts how often they receive phishing attempts. As it happens, it does.

While the number of weekly phishing attempts that both Gmail (12) and Yahoo Mail (9) users encounter is below our calculated average, people who rely on Microsoft Outlook get 16 phishing attempts per week. That’s 33% more than Gmail users and almost double Yahoo users.

No matter which email provider or operating system someone uses, a key way to combat phishing is to report it to email providers, IT personnel, and law enforcement.

Unfortunately more than half of people (55%) say they rarely or never report these kinds of messages, while just 28% say they report them most of the time, or every time, they encounter them.

How to Improve your Digital Security

No matter which OS you use, your device safety is critical to protecting yourself online. Here are some tips for your next login:

  • Understand that viruses are very common. Decide which antivirus software is right for you so you can prevent threats and tailor your antivirus program to your preferred hardware.
  • Protect yourself on public Wi-Fi networks. Subscribe to one of the best VPNs and use it while you're on public Wi-Fi networks to protect your data.
  • Learn about the risk of potential malware. While you may not always be able to prevent malware from coming in, using good malware removal software is crucial to make sure there won’t be long-term impacts from a malware attack.
  • Protect yourself from identity theft. More often than not, there is a way to prevent identity theft. Read up on ways you can protect yourself from identity theft, and how to recover if your info becomes compromised.

To Read the full AAC Report please click Here.                      Image: Tranmautritam

You Might Also Read: 

Security Patching As A Service:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Crime Claims Repeat Victims
A Cyber Security Plan For Digital Currency »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CERT-In

CERT-In

CERT-In is a functional organisation of the Ministry of Information & Electronics Technology, Government of India, with the objective of securing Indian cyber space.

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

ControlScan

ControlScan

ControlScan is a Managed Security Services Provider (MSSP) - our primary focus is protecting your business and securing your sensitive data.

OPSWAT

OPSWAT

OPSWAT is a software company that provides solutions to secure and manage IT infrastructure.

CONCERT

CONCERT

CONCERT is a Computer Emergency Response Team and cyber security information sharing network for companies, institutes and government in Korea.

National Cyber Security Agency (NACSA) - Malaysia

National Cyber Security Agency (NACSA) - Malaysia

NACSA is the leading government agency in Malaysia responsible for the development and implementation of national cyber security management policie and strategies.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

Curricula

Curricula

Curricula's cyber security awareness training delivers short relatable security stories to your employees. We make learning cyber security simple and fun.

CNS Group

CNS Group

CNS Group provides industry leading cyber security though managed security services, penetration testing, consulting and compliance.

Leidos

Leidos

Leidos is a recognized leader in cybersecurity across the federal government, bringing more than a decade of experience defending cyber interests globally.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

Intaso

Intaso

Intaso are a boutique head hunting and talent solution firm with specialist Cyber and Information Security expertise.

WhiteJar

WhiteJar

WhiteJar offers an innovative approach to modern cybersecurity needs, empowering Ethical Hackers within its unique crowd platform.

Blackrock Cyber

Blackrock Cyber

Blackrock Cyber consults on critical security decisions, oversees compliance for your payment initiatives, and details cyber security training for your entire organization and board reporting.

Oxford Information Labs (OXIL)

Oxford Information Labs (OXIL)

Oxford Information Labs brings together world-class software programmers and policy experts to provide a unique mix of expertise and hands on technical solutions.

Infosec Ventures

Infosec Ventures

Infosec Ventures incubates and scales cyber security innovators that solve inefficiencies in cyber security.