Morning Overview

CNET survey finds many Americans still skip basic device security steps

A significant share of Americans still do not take basic steps to protect their phones, computers, and online accounts. In a recent survey, CNET reported that many users skip simple security measures like enabling screen locks, using unique passwords, or turning on multi-factor authentication. The gap between what people know about digital threats and what they actually do about them can increase the risk of account takeovers and data exposure.

What is verified so far

The most reliable data on how Americans handle personal security comes from a nationally representative survey published by the Pew Research Center examining how adults protect their online data and privacy. That report provides concrete statistics on smartphone security-feature use, password tracking behaviors, and adoption trends for password managers. It serves as a strong benchmark for evaluating any claims about consumer security habits, including those surfaced by CNET’s own polling.

Among the clearest findings: password management remains a weak point for most Americans. The Pew data shows that a meaningful share of adults still write down their passwords on paper or store them in unsecured digital notes. Password manager adoption has ticked upward in recent years, but it still lags far behind simpler, less secure methods of tracking login credentials. The pattern suggests that convenience consistently wins out over best practices, even when users are aware that reusing or poorly storing passwords increases their exposure to account takeovers.

Federal guidance reinforces why these habits matter. The Cybersecurity and Infrastructure Security Agency, commonly known as CISA, publishes specific recommendations on strong passwords. That guidance recommends using strong, hard-to-guess passwords and avoiding easily guessed personal details like birthdays or pet names. CISA also warns against using the same password across multiple accounts, a practice that lets attackers who breach one service quickly compromise others.

The disconnect between institutional advice and actual behavior is not new, but the scale of the problem is striking. Smartphones now function as digital wallets, health trackers, and primary communication devices. Skipping a screen lock or reusing a weak password on a phone effectively leaves all of that data exposed if the device is lost or compromised. When phone numbers are also used as recovery methods for email, banking, and social media, a single compromised device can cascade into multiple account takeovers.

Existing research also confirms that many people juggle dozens of logins across work, school, and personal life. In that environment, the temptation to recycle one or two memorable passwords is understandable but risky. Once a password appears in a data breach, it can circulate for years in criminal marketplaces, fueling automated attacks that test the same credentials across hundreds of popular sites.

What remains uncertain

Several key questions about the CNET survey itself remain difficult to answer with the sources currently available. The full methodology behind CNET’s polling, including sample size, margin of error, and exact question wording, has not been independently verified through a primary dataset or published research document. Without that detail, it is hard to assess whether the survey’s findings reflect a nationally representative picture or a narrower slice of the population.

It is also unclear what specific adoption rates CNET found for individual security steps. The survey reportedly covers behaviors like enabling biometric locks, installing software updates promptly, and using two-factor authentication. But precise percentages for each behavior have not been confirmed through a primary source document accessible for independent review. Readers should treat any specific numbers attributed to the CNET survey with some caution until the underlying data is publicly available.

A related gap involves motivation. Why do so many people skip security steps they likely know exist? The Pew Research Center data documents the behavior itself but does not fully explain the reasoning behind it. One plausible factor is friction: enabling a password manager or setting up two-factor authentication takes time and introduces extra steps into daily routines. Another possibility, less often discussed, is that some users distrust third-party password managers themselves. If a person worries that a password vault could be breached, the perceived cure may feel as risky as the disease. No large-scale study in the current reporting block directly tests that hypothesis, but it represents a gap that future research could address through user focus groups or structured surveys comparing app trust levels with self-reported security behaviors.

Psychological distance may also play a role. Many people have heard about major breaches at large companies but have never personally experienced identity theft or a drained bank account. That can make the threat feel abstract, encouraging procrastination. Without longitudinal studies that track the same individuals over time, however, it is difficult to say how personal experience with a breach changes long-term security habits.

The broader threat environment also lacks precise, current documentation in the available sources. General reporting suggests ransomware attacks and credential-stuffing campaigns have increased, but specific federal statistics on how many incidents trace directly to poor consumer password practices are not confirmed through a primary government dataset here. Readers should be cautious about claims that draw a straight line from individual password reuse to specific breach totals without citing a named dataset. Correlation between weak consumer security and rising cybercrime is clear, but the exact contribution of any single behavior remains uncertain.

How to read the evidence

Not all sources carry equal weight when evaluating claims about American security habits. The Pew Research Center report stands out because it uses a nationally representative survey methodology, meaning its findings can reasonably be generalized to the broader adult population. When a claim about password behavior or smartphone security aligns with Pew’s data, it rests on solid ground. CISA’s password guidance, while not a survey, represents the official position of the federal agency responsible for civilian cybersecurity. Together, these two sources form the strongest available foundation for understanding both the problem and the recommended response.

The CNET survey adds a useful layer of recent attention to the topic, but it functions more as a prompt for discussion than as a primary research document in this context. Until its full methodology and dataset are publicly accessible, its findings are best treated as directional rather than definitive. That does not mean the survey is wrong. It means readers should look for corroboration from sources like Pew before accepting specific numbers at face value. When headlines highlight a single dramatic statistic, it is worth asking how that number compares with more established research.

One common assumption in coverage of consumer security is that awareness automatically leads to action. The evidence tells a different story. Even as media coverage of data breaches has intensified and companies have made security features easier to enable, adoption of basic protections has moved slowly. The Pew data on password manager trends illustrates this clearly: growth is real but modest, and large portions of the population still rely on memory, paper notes, or repeated passwords. The gap is not primarily about ignorance. It is about the friction between knowing what to do and actually doing it, especially when the perceived risk feels abstract until a breach happens personally.

A useful way to think about the evidence is in three tiers. At the top sit primary research reports with transparent methodology, like the Pew study, and official federal guidance from agencies like CISA. In the middle sit survey-based reports from credible outlets like CNET, which offer timely snapshots but may lack the methodological rigor of academic or government research. At the bottom sit anecdotal reports, social media commentary, and opinion pieces, which can reflect real sentiment but should never serve as proof of a statistical trend.

For anyone reading about this topic and wondering what to do, the practical takeaway is straightforward. The security steps most Americans skip are also the ones most strongly recommended by federal guidance and supported by research: use long, unique passwords for important accounts, store them in a reputable password manager or another secure system, turn on multi-factor authentication wherever it is offered, and lock every device with a PIN, passcode, or biometric check. None of these measures is perfect, but together they make it significantly harder for routine attacks to succeed.

Consumers do not need to wait for more studies or clearer statistics to act on what is already known. The existing evidence is strong enough to show that simple changes in everyday behavior can dramatically reduce exposure to common threats. The remaining uncertainties around survey methods and precise adoption rates matter for policymakers and researchers, but they do not change the core message: most people can meaningfully improve their digital safety with a handful of basic, well-documented steps.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.