Feeds

E-banking security provokes fear or indifference

Brits not bothered, or hot and bothered

Using blade systems to cut costs and sharpen efficiencies

A recent study by analyst Forrester Research has unearthed conflicting views about the safety or otherwise of online banking. The survey of 11,300 UK net users found that while many online banking consumers are complacent about security, a large minority have given up online banking as a direct result of security fears.

Most UK net users are aware of security threats like phishing and keystroke logging but are unfazed by these risks and expect their banks to deal with the problem - even though these attacks are thrown against consumer's PCs rather than a bank's own systems. Ideally users want banks to supply a blanket guarantee against fraud.

Based on responses to its survey, Forrester concludes that an estimated 600,000 from a total of 15m subscribers have ditched online banking as a direct result of security fears. Forrester reckons that users are confused and banks need to step up their efforts to educate customers about online fraud. Measures to restrict the functionality of some accounts (for example controlling how much money can be transferred on any day), stronger internet banking authentication and improved customer profiling are also needed to defend against security threats, it advises.

In addition to people who plan to drop net banking accounts as a result of security fears, another fifth of net users say that security fears will stop them ever banking online.

Benjamin Ensor, senior analyst of financial services at Forrester Research, said: "Net users don't know what to think about online banking security. Without the technical knowledge to judge the severity of security threats like keystroke logging and phishing or, frankly, much interest in acquiring that knowledge people struggle to reach a balanced judgment. The result is that about half of the UK's Net users are either complacent or paranoid about online banking security. So UK banks still face big communication and security problems." ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.