Top 10 'Riskiest' Online Cities of 2012 - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Top 10 'Riskiest' Online Cities of 2012-5 Next

Residents of Atlanta and Boston, which ranked fourth and fifth respectively, share high rankings among the cyber crime data. In particular, Atlanta recorded the highest per-capita number of spamming IP addresses.

Norton teamed up with independent research firm Sperling's BestPlaces to uncover the nation's top 10 cities that have the highest number of cyber crime risk factors. This year marks the second time Norton and Sperling's BestPlaces have collaborated to highlight the various factors that contribute to potential risk. Cities with the greatest risk factors do not necessarily correlate with the highest infection rates, reflecting the fact that many consumers are taking precautions to keep themselves safe.

"In our examination of the riskiest online cities, we've considered a number of factors that can potentially affect online safety," said Bert Sperling, founder of Sperling's BestPlaces and lead researcher for the analysis. "By looking at data from consumer lifestyle habits as well as cyber crime data provided by Symantec, maker of Norton products, we're able to provide a holistic view of the various factors that put a person at potential risk."

Sperling's BestPlaces determined the per-capita rankings by examining several consumer behaviors - from the prevalence of PCs and smartphones, to ecommerce, social networking and accessing potentially unsecured Wi-Fi hotspots, among others.

More Slideshows:


Seven Leadership Practices for Meeting Mission-critical Challenges Despite Declining Budgets Amid fiscal realities, key leadership attributes offer path to increased effectiveness and efficiency.

Consumer Privacy Insights and Trends - Q1 2012 Study highlights privacy concerns and sentiments of online U.S. adults and the impact on businesses.

How to 'Catch' and 'Keep' Tech-Savvy Consumers Cross-technology experiences "mash up" the virtual and physical worlds to create a new way to shop.

 

Related Topics : Transport Layer Security, Encryption, SEO, Switches

 
More Slideshows

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security118-190x128 5 Essential Incident Response Checklists

When a security breach occurs, IT teams that are armed with incident response checklists will be better prepared to execute a fast and effective response. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.