Survey reveals apathy surrounding anti-malware protection

Posted by   Virus Bulletin on   Nov 18, 2010

Inconvenient subscription models preventing UK consumers from protecting their PCs adequately.

A survey conducted in the UK by security firm GFI Software has revealed that 40% of respondents would rather let their anti-malware software lapse at the end of the initial subscription period than pay to renew the subscription, while 15.3% said that they would probably let their subscription lapse due to the renewal process being too difficult or inconvenient.

35% of those surveyed could not recall when their existing anti-malware subscription was due to expire, while 20% said they had already decided not to renew their subscription when the current one expires.

The survey - commissioned by GFI as part of the company's marketing strategy for its GFI VIPRE Lifetime Edition - asked respondents whether they would be prepared to replace their existing anti-malware solution with one that offered lifetime coverage for a one-off fee (the model offered by the VIPRE Lifetime Edition) and 40% of users claimed that they would.

While this piece of research is obviously part of a vendor marketing ploy, it does call into question the value of the paid subscription model for consumers - and whether the industry should, in fact, be making it as effortless as possible for end-users to secure their machines and avoid compromise.

It has long been recognized that the user is the weakest link in the security chain. Learn practical ways to strengthen the weakest link in your organization at the VB Seminar 25 Nov, London.

The free VB Seminar takes place at the IET London, UK from 9am to 4pm on 25 November 2010. Secure your place by booking online now.

Posted on 18 November 2010 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 call for papers - now open!

Have you analysed a new online threat? Do you know a new way to defend against such threats? Are you tasked with securing systems and fending off attacks? The call for papers for VB2019 is now open and we want to hear from you!

VB2018 paper: Unpacking the packed unpacker: reversing an Android anti-analysis library

Today, we publish a VB2018 paper by Google researcher Maddie Stone in which she looks at one of the most interesting anti-analysis native libraries in the Android ecosystem. We also release the recording of Maddie's presentation.

VB2018 paper: Draw me like one of your French APTs – expanding our descriptive palette for cyber threat actors

Today, we publish the VB2018 paper by Chronicle researcher Juan Andres Guerrero-Saade, who argues we should change the way we talk about APT actors.

Book Review: Cyber Wars

VB Editor Martijn Grooten reviews Charles Arthur's Cyber Wars, which looks at seven prominent hacks and attacks, and the lessons we can learn from them.

VB2018 paper: Office bugs on the rise

At VB2018 Sophos researcher Gábor Szappanos provided a detailed overview of Office exploit builders, and looked in particular at the widely exploited CVE-2017-0199. Today we publish his paper and release the video of his presentation.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.