{"id":38429,"date":"2025-01-02T13:45:00","date_gmt":"2025-01-02T13:45:00","guid":{"rendered":"https:\/\/www.lifeandnews.com\/articles\/?p=38429"},"modified":"2025-01-05T16:57:54","modified_gmt":"2025-01-05T16:57:54","slug":"selling-fear-marketing-for-cybersecurity-products-often-leaves-consumers-less-secure","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/selling-fear-marketing-for-cybersecurity-products-often-leaves-consumers-less-secure\/","title":{"rendered":"Selling fear: Marketing for cybersecurity products often leaves consumers less&nbsp;secure"},"content":{"rendered":"\n<p><a href=\"https:\/\/theconversation.com\/profiles\/doug-jacobson-809162\">Doug Jacobson<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/iowa-state-university-1322\">Iowa State University<\/a><\/em><\/p>\n\n\n\n<p>You have likely seen multiple ads for products and services designed to make you more secure online. When you turn on your television, see online ads, or even when you get in-app notifications, you are likely to encounter cybersecurity technology marketed as the ultimate solution and the last line of defense against digital threats.<\/p>\n\n\n\n<p>Cybersecurity <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2023-09-28-gartner-forecasts-global-security-and-risk-management-spending-to-grow-14-percent-in-2024\">is big business<\/a>, and tech companies often sell their products <a href=\"https:\/\/doi.org\/10.2307\/1251038\">based on fear<\/a>. These campaigns are often rooted in what I call the technology vs. user cycle, a feedback loop that creates more problems than it solves.<\/p>\n\n\n\n<p>It works like this: Cybersecurity companies often market their products using tactics that emphasize fear (\u201cHackers are coming for your data!\u201d), blame (\u201cIt\u2019s your fault if something happens!\u201d) and complexity (\u201cOnly our advanced solution can protect you\u201d). They perpetuate the idea that users are inherently not savvy enough to manage security independently and that the solution is to <a href=\"https:\/\/www.antwerpmanagementschool.be\/en\/blog\/fud-fails-bad-prevails-digital-security\">adopt the latest product or service<\/a>.<\/p>\n\n\n\n<p>As a <a href=\"https:\/\/scholar.google.com\/citations?hl=en&amp;user=KkGR-BwAAAAJ&amp;view_op=list_works&amp;sortby=pubdate\">cybersecurity researcher<\/a>, I find that this approach often has unintended, <a href=\"https:\/\/doi.org\/10.1109\/eCrime47957.2019.9037589\">harmful consequences for people<\/a>. Rather than feeling empowered, users feel helpless, convinced that cybersecurity is beyond their understanding. They may even develop <a href=\"https:\/\/doi.org\/10.1016\/j.chbr.2024.100475\">techno-stress<\/a>, overwhelmed by the need to keep up with constant updates, new tools and never-ending warnings about threats.<\/p>\n\n\n\n<p>Over time, this can breed apathy and resentment. Users might disengage, believing that no matter what they do, they\u2019ll always be at risk. Ironically, this mindset makes them more vulnerable as they begin to overlook simple, practical steps they could take <a href=\"https:\/\/www.nist.gov\/publications\/users-are-not-stupid-six-cyber-security-pitfalls-overturned\">to protect themselves<\/a>.<\/p>\n\n\n\n<p>The cycle is self-perpetuating. As users feel less secure, they are more likely to demand new technology to solve their problem, further fueling the very marketing tactics that created their insecurity in the first place. Security providers, in turn, double down on promises of fix-all solutions, reinforcing the narrative that people can\u2019t manage security without their products.<\/p>\n\n\n\n<p>Ironically, as people grow dependent on security products, they can become less secure. They start ignoring basic practices, become apathetic to constant warnings, and put blind trust in solutions they don\u2019t understand.<\/p>\n\n\n\n<p>The result is users remain stuck in a loop where they depend on technology but lack the confidence to use it safely, creating even more opportunities for people with malicious intent to exploit them.<\/p>\n\n\n\n<h2>Cybercrime evolution<\/h2>\n\n\n\n<p>I\u2019ve worked in cybersecurity since the early 1990s and witnessed the field evolve over the decades. I\u2019ve seen how adversaries adapt to new defenses and exploit people\u2019s growing reliance on the internet. Two key shifts, in particular, stand out as pivotal moments in the evolution of cybercrime.<\/p>\n\n\n\n<p>The first shift came with the realization that cybercrime could be immensely profitable. As society moved from paper checks and cash transactions to digital payments, criminals found that accessing and stealing money electronically was relatively easy. This transition to digital finance created opportunities for criminals to <a href=\"https:\/\/doi.org\/10.1108\/JFC-11-2021-0242\">scale up their attacks<\/a>, bypassing physical barriers and targeting the systems that underpin modern payment methods.<\/p>\n\n\n\n<p>The second shift emerged over a decade ago as criminals targeted individuals directly rather than just going after businesses or governments. While attacks on companies, ransomware campaigns and critical infrastructure breaches still make headlines, there has also been a <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2023_IC3Report.pdf\">rise in attacks<\/a> on everyday users. Cybercriminals have learned that people are often less prepared and more trusting than organizations, and so present lucrative opportunities.<\/p>\n\n\n\n<p>This combination of digital financial systems and direct user targeting has redefined cybersecurity. It\u2019s no longer just about protecting companies or critical infrastructure; it\u2019s about ensuring the average person isn\u2019t left defenseless. Yet, how cybersecurity technology is marketed and deployed often leaves users confused and feeling helpless.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img src=\"https:\/\/images.theconversation.com\/files\/639564\/original\/file-20241218-15-uu569w.jpg?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" alt=\"two women, one seated and one standing, look at a computer monitor\"\/><figcaption>Asking a knowledgeable friend or colleague is a good way to cut through the fear and confusion around cybersecurity. <a href=\"https:\/\/www.gettyimages.com\/detail\/photo\/female-computer-programmers-discussing-in-office-royalty-free-image\/1180183366\">Luis Alvarez\/DigitalVision via Getty Images<\/a><\/figcaption><\/figure>\n\n\n\n<h2>User empowerment<\/h2>\n\n\n\n<p>The good news is that you have more power than you think. Cybersecurity doesn\u2019t have to feel like an unsolvable puzzle or a job for experts alone. Instead of letting fear drive you into techno-stress or apathy, you can take matters into your own hands by leaning on trusted sources like community organizations, local libraries and tech-savvy friends.<\/p>\n\n\n\n<p>These trusted voices can simplify the jargon, provide straightforward advice and help you make informed decisions. Imagine a world where you don\u2019t have to rely on faceless companies for help but instead turn to a network of people who genuinely want to see you succeed.<\/p>\n\n\n\n<p>I believe that cybersecurity vendors should offer tools and education that are inclusive, accessible and centered on real user needs. At the same time, people should actively engage with community-driven initiatives, adopt thoughtful security practices and rely on trusted resources for guidance. People feel more confident and capable when they surround themselves with people willing to teach and support them. Users can then adopt technology thoughtfully rather than rushing to buy every new product out of fear or disengaging completely.<\/p>\n\n\n\n<p>This community-based approach goes beyond individual fixes. It creates a culture of <a href=\"https:\/\/www.nist.gov\/publications\/users-are-not-stupid-six-cyber-security-pitfalls-overturned\">shared responsibility and empowerment<\/a> and helps create a more secure and resilient digital ecosystem.<\/p>\n\n\n\n<h2>Resources<\/h2>\n\n\n\n<p>Knowing where to find reliable information and support is essential to take control of your cybersecurity and start building your confidence. The following resource list includes trusted organizations, community programs and educational tools that can help you better understand cybersecurity, protect yourself against threats and even connect with local experts or peers for guidance.<\/p>\n\n\n\n<p>Whether you\u2019re looking to secure your devices, learn how to spot scams or stay informed about the latest digital threats, these resources are a great place to begin. Empowerment starts with taking that first step toward understanding your digital world.<\/p>\n\n\n\n<ul><li>The U.S. Cybersecurity and Infrastructure Security Agency has excellent resources to <a href=\"https:\/\/www.cisa.gov\/secure-our-world\">help you understand security<\/a>.<\/li><li>The Federal Trade Commission has resources on <a href=\"https:\/\/consumer.ftc.gov\/\">consumer safety and privacy<\/a>.<\/li><li>The Cyber House Rock website provides fun videos to help you <a href=\"https:\/\/cyberhouserock.info\/\">understand security and privacy<\/a>.<\/li><li>To report a cyber incident, you can go to the FBI\u2019s <a href=\"https:\/\/www.ic3.gov\/\">Internet Crime Complaint Center<\/a>.<\/li><\/ul>\n\n\n\n<p><a href=\"https:\/\/theconversation.com\/profiles\/doug-jacobson-809162\">Doug Jacobson<\/a>, Professor of Electrical and Computer Engineering, <em><a href=\"https:\/\/theconversation.com\/institutions\/iowa-state-university-1322\">Iowa State University<\/a><\/em><\/p>\n\n\n\n<p>This article is republished from <a href=\"https:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/selling-fear-marketing-for-cybersecurity-products-often-leaves-consumers-less-secure-245351\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Doug Jacobson, Iowa State University You have likely seen multiple ads for products and services designed to make you more secure online. When you turn on your television, see online ads, or even when you get in-app notifications, you are likely to encounter cybersecurity technology marketed as the ultimate solution and the last line of [&hellip;]<\/p>\n","protected":false},"author":56,"featured_media":38430,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5,30,291,825,25,28,8],"tags":[614,612,9843,885,891,886,860,15882],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/38429"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/56"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=38429"}],"version-history":[{"count":2,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/38429\/revisions"}],"predecessor-version":[{"id":38453,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/38429\/revisions\/38453"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/38430"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=38429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=38429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=38429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}