Who Are You in the Cloud?
We've taken a look at the most common behaviors of Internet users and come up with four different digital "personas": the Web Wiz, the Optimal Prime, the Chatter Bug, and the Virtual Jock. They all use the Internet to shop, research, and socialize, but they all have different prioritiesand different weaknesses when it comes to staying secure online.
Who are you in the cloudand what are the pitfalls that are most likely to trip you up?
The Web Wiz: You're a fearless researcher. You'll click on any link you get from a search engine. You'll share anything you find on a social network and you'll do it whenever the mood strikes you, whether it's at home on a secure network or on a free Wi-Fi network from an Internet cafe. Of course you bank online. Why wouldn't you?
The Optimal Prime: The Internet isn't the center of your life; it's a means to an end. It's a way to connect with other people who share your hobbies. Or, maybe you'll go online to book a plane ticket. You want a no-muss, no-fuss approach to the cloud, so you keep your privacy settings low and use the same password for multiple sites.
The Chatter Bug: Why go online if you aren't connecting with other people? You keep a public journal. You'll "friend" anybody who asks. You share openly about your life with people you've never met in person. You're always on the lookout for new and interesting sites, and will happily follow a link to a new destination just to see where it leads.
The Virtual Jock: You're in the cloud for one reason: Gaming. If you have to download pirated software to get the hot new game everyone's talking aboutfine. You'll use in-game messaging and sign up for game promos by email. You may or may not be an athlete in the "real world," but in the virtual world you're a star.
Read our e-Book to learn more about how each of these different types run into online risks, and what can happen if you don't take security seriously.
Tom Kellerman, a Trend Micro vice president, talks about why Apple computers are now being targeted by hackers. Watch now >
Trend Micro "Race to Security"
This year's Summer Olympics generated hundreds of online scams. The summer games may be over, but cybercriminals use most major sporting events to victimize unsuspecting fans. Our Security Guide to Major Sporting Events offers tips for staying ahead of the latest scams. Are you a sports fanatic? Loyal Supporter? Or just a curious observer? Take the test and find out which team you're part of!