SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Privacy & Security: The New Drivers of
Brand, Reputation and Action

Global Insights 2012
Data security and privacy have moved from
the backroom to the boardroom.
Data breaches, security incidents and      Edelman’s industry study shows, for the
privacy missteps are making headlines      first time, why managing data security
worldwide and have become a focal          and privacy impact business success.
point for social media discussions and     Our survey reveals:
legislation.
                                             The gap between consumer expectations
Managing data security and privacy           and what businesses are actually
effectively is essential to businesses       delivering.
today. The growing volume and                A relationship between effective data
sensitivity of information being shared,     protection and business success.
stored and used is driving demand for        That data security and privacy
greater transparency about how it is         considerations do impact purchasing
being managed and protected.                 decisions.
People care about the security of their
   personal information more than ever before.
   A majority of consumers are more concerned about data security and
   privacy than they were five years ago and sense they are powerless to
   exert control, leaving companies with the responsibility for protecting it.


                                                                      of global consumers are
                                                70%                  MORE CONCERNED
                                                                      than they were 5 years ago




                                                                      of global consumers feel they have
                                               68%                    LOST CONTROL
                                                                      over how their personal information
                                                                      is shared and used by companies




Base: All respondents (Global n=4,050)
Q12. Compared to five years ago, how has your level of concern regarding online data security and privacy changed?
Q15. Using a scale of 1 to 5, where 1 means “strongly disagree” and 5 means “strongly agree,” please indicate your level of agreement with the following
statements. (Summary of top 2 box scores shown)
These concerns present both a challenge and
  an opportunity for businesses.
  Consumers are fed up with the status quo and want companies to act,
  having seen either no change or a decline in the security of their data
  over the last five years.
                                                                                                   Security of Personal Information Online
                                                                                                    Compared to Five Years Ago (Global)

                            of global consumers feel their                                                               7%                       Much more secure

     32%                    online privacy is adequately
                            PROTECTED by business practices
                                                                                                                                                  Somewhat more secure
                                                                                                                                                  No Change
                                                                                                                        36%
                                                                                                                                                  Somewhat less secure
                                                                                                                                                  Much less secure
                            of global consumers feel companies
      85%                   need to take security & privacy                                                             23%
                                                                                                                                            57% of consumers report no
                            MORE SERIOUSLY                                                                                                   change or a decline in the
                                                                                                                                              security of their personal
                                                                                                                        25%                      information online

                                                                                                                         9%


Base: All respondents (Global n=4,050)
Q15. Using a scale of 1 to 5, where 1 means “strongly disagree” and 5 means “strongly agree,” please indicate your level of agreement with the following
statements. (Summary of top 2 box scores shown)
Q14. Compared to five years ago, how would you describe the security of your personal information online?
Adults are most concerned about information
   held by businesses they use most frequently.
   Online shopping and banking, which require the sharing of financial
   information, are the most common online activities. Understandably,
   consumers are most concerned about the security of their financial
   information.
  Most Common Online Activities                                                 Information of Greatest Concern Online (Global)
           (Global)
                                                                                                  Financial information                                           90%

                                                                                                  Personal information                                      78%

Online Shopping                              82%                                                                   Emails                           36%

                                                                                                     Health information                        28%

                                                                                 Frequent purchase / shopping data                            26%

                                                                          Content posted by you to social networks                       17%
Online Banking                               80%                       Content posted by others to social networks                     13%

                                                                                                       Browsing activity              12%

Base: All respondents (Global n=4,050)
Q1. Which of the following actions have you taken in the past three months?
Q3. What types of online personal information are you most concerned about? Please order the following types of information from least to most important.
Financial institutions and online retailers are
  not meeting the needs of their customers.
 A notable gap exists between the number of people who consider data
 security important in the finance and online retail industries and the
 number who actually trust them to protect personal information.

      23-point gap in expectations

                      51-point gap in expectations
 92%                                                                                                        Importance of privacy and security in each industry (global)
                  84%
                                  78%             77%                                                       Trust in each industry to protect personal information (global)
       69%                                                         69%
                                                                                   63%
                                        51%                                                        50%             50%
                                                        48%
                                                                                                                                    43%
                                                                                                                                                     37%
                        33%
                                                                                         27%                                                                      23%
                                                                       12%                              12%              9%              11%
                                                                                                                                                        6%

 Finance          Online   Medical & Government   Social   Technology                               News &        Automotive        Food &           Gaming   Utilities*
                Shopping & Healthcare           Networking                                           Media                          Grocery
                  Retail

NOTE: Q7: summary of top 2 box scores shown; Q8: top three industries selected
Base: All respondents (Global n=4,050)
Q7. How important is your privacy and security when doing business with the following industries? *NOTE: Utilities not included as a response code
Q8. Which industry do you trust most to adequately protect your personal information? Please select the top three industries.
Concern over businesses’ ability to protect
   information impacts engagement in activities
   important to online retailers and banks.
   Consumers report abstaining from frequent shopping or loyalty card
   programs and online banking to protect their personal information.
                              Consumers Taking Action to Protect their Online Information




                      ONE in FIVE adults
              do not join a frequent shopping                                           ONE in TEN adults
               card or loyalty card program                                               do not bank online


Base: All respondents (Global n=4,050)
Q4. Which of the following actions have you taken to protect your online information?
Consumers consider data security and privacy
   features when purchasing tech products.
  Nearly half of consumers reported that data security is among the top
  three factors they consider when purchasing a smartphone.

                                               Top Three Most Important Factors Considered
                                                  When Purchasing Smartphones (Global)
               69%
                                            61%

                                                                         48%                         47%
                                                                                                                                  40%
                                                                                                                                                           35%




               Price                     Ease of Use         Data Security & Privacy           Style & Design             Product Warranty          Physical Dimensions
                                                                                                                                                       (size, weight)



Base: All respondents (Global n=4,050)
Q5. In your opinion, when making a decision to purchase the types of products below, what factors are most important? Select up to three choices.
Security considerations also impact other
  purchasing decisions.
  For personal computers and tablets, security considerations are on par with
  style, design and physical dimensions of the product.
                                        Top Three Most Important Factors Considered
                                   When Purchasing Tablets and Personal Computers (Global)

                                           Price                                                                                                          71%
                                                                                                                                                                75%


                                  Ease of Use                                                                                                       59%
                                                                                                                                         53%


                     Data Security & Privacy                                                                            42%
                                                                                                                                      51%


                               Style & Design                                                                           42%
                                                                                                           34%


                            Product Warranty                                                                                 45%
                                                                                                                                           54%


       Physical Dimensions (size, weight)                                                                                 43%
                                                                                                           34%

Base: All respondents (Global n=4,050)                                Tablets        Personal Computers
Q5. In your opinion, when making a decision to purchase the types of products below, what factors are most important? Select up to three choices.
Security considerations also impact other
  purchasing decisions.
  Even shoppers of traditional mobile phones and videogame consoles feel
  security is a key concern.


                                                                    of global consumers consider
                                                                    DATA SECURITY AND PRIVACY
                                               29%                   among the top 3 most important factors
                                                                     when purchasing standard mobile phones




                                                                    of global consumers consider
                                               22%                  DATA SECURITY AND PRIVACY
                                                                     among the top 3 most important factors
                                                                     when purchasing videogame consoles




Base: All respondents (Global n=4,050)
Q5. In your opinion, when making a decision to purchase the types of products below, what factors are most important? Select up to three choices.
Smartphones are suffering from a trust gap.
  More customers take security into account when purchasing a smartphone
  than say they trust the security of the devices. Comparatively, smartphones
  are considered the least secure devices.
             Consumers selecting Data Security and Privacy among Top Three Most Important
                             Factors vs. Trust in Security of Devices (Global)

                                                              14-point difference in consumers considering security
                  58%                                        important and those that trust security for smartphones
          51%
                                                                  48%
                                                                                                      44%
                                      42%
                                              37%                                                                                 37%
                                                                          34%
                                                                                              29%
                                                                                                                          22%
                                                                                                                                                         17%




    Personal Computers                   Tablets                 Smartphones               Standard Mobile           Videogame Console Digital Music Player*
                                                                                               Phones
          Consumers selecting Data Security & Privacy among Top Three Important Factors                                 Trust in Security of Device

Base: All respondents (Global n=4,050)
Q5. In your opinion, when making a decision to purchase the types of products below, what factors are most important? Select up to three choices.
Q6.Please indicate your level of trust in the security of the following types of products. *NOTE: Digital music player not included as a response code
The premium on security translates to adoption
   and retention of consumers.
  Consumers indicate willingness to leave online services if personal
  information was accessed without permission and are most concerned
  about services that involve financial information.
                     Consumers Likely to Switch Providers or Stop Using Services Entirely if Personal
                               Information was Accessed Without Permission (Global)
       80%          79%         77%          75%         75%
                                                                      67%         67%          65%         63%          59%         55%          55%         54%            50%




Base: All respondents (Global n=4,050)
Q9. For the following types of companies, if your personal information was accessed without your permission, how likely would you be to switch to a different provider or
stop using these services entirely, if they did have personal information on you? Please use a scale of 1-5, where 1 is “not at all likely” and 5 is “very likely.”
Businesses must manage security and
   privacy like a line of business and will lose
   customers if they do not.
  Data shows that inaction on issues of data security and privacy will put
  businesses are risk of losing their customer base.
                                         Consumers that have Left or Avoided Companies because of
                                                 Security Issues they have had in the Past
                                                                          58%
                                                     55%                                                53%     52%
           46%
                                41%
                                                                                                  36%
                                                                                                                        31%




          Global                 US                  Brazil               China              Germany    India   Korea   UK


Base: All respondents (Global n=4,050)
Q16. Have you ever left or avoided companies because they have had security issues in the past?
Consumers indicate they will act to protect their
    privacy if businesses don’t.
   In the wake of a data breach, individuals are even willing to abandon the
   companies they trust most. Data breaches may also impact reputation
   due to the strong tendency of victims to share their experiences.


  Americans proved most loyal to the                                                              Actions Taken following Data Breach Events
companies they do business with, yet
  ONE in TWO say they are likely to                                                                                                    of global consumers
   change brands after a data breach                                                                          39%                      TOLD A FRIEND
                                                                                                                                       about their experience

                                  of global consumers would

           71%                    SWITCH PROVIDERS                                                                                     of global consumers
                                  after a company they rarely
                                  used suffered a data breach
                                                                                                               29%                     POSTED ONLINE
                                                                                                                                       about their experience


 Base: All respondents (Global n=4,050)
 Q10. If the brand you trust most and use most loyally suffered a data breach, how likely would you be to switch brands?
 Q11. If a brand you rarely use (but still has your personal data) suffered a data breach, how likely would you be to switch brands?
 Q21. Did you take any action following these events?

Mais conteúdo relacionado

Mais procurados

Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesThe Economist Media Businesses
 
The way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of ThingsThe way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of ThingsThe Economist Media Businesses
 
Building Trust Through Social Media
Building Trust Through Social MediaBuilding Trust Through Social Media
Building Trust Through Social MediaMandi Bishop
 
2016 Edelman Trust Barometer New Zealand
2016 Edelman Trust Barometer New Zealand2016 Edelman Trust Barometer New Zealand
2016 Edelman Trust Barometer New ZealandDavid Brain
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FinTech Belgium
 
Europe and the Internet: It’s complicated
Europe and the Internet: It’s complicatedEurope and the Internet: It’s complicated
Europe and the Internet: It’s complicatedBrunswick Group
 
How Data Empowers the Member-Centric Enterprise (AHIP Presentation)
How Data Empowers the Member-Centric Enterprise (AHIP Presentation)How Data Empowers the Member-Centric Enterprise (AHIP Presentation)
How Data Empowers the Member-Centric Enterprise (AHIP Presentation)Mandi Bishop
 
Improving the Efficacy of Root Cause Analysis
Improving the Efficacy of Root Cause AnalysisImproving the Efficacy of Root Cause Analysis
Improving the Efficacy of Root Cause AnalysisCognizant
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast- Mark - Fullbright
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information securityBee_Ware
 
Infographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyInfographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyCheapSSLsecurity
 
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)Data Driven Innovation
 
Global insurers lack commitment to digital ambitions insurance networking news
Global insurers lack commitment to digital ambitions   insurance networking newsGlobal insurers lack commitment to digital ambitions   insurance networking news
Global insurers lack commitment to digital ambitions insurance networking newsDigital Insurance News
 
5 things digital media companies need to do now
5 things digital media companies need to do now5 things digital media companies need to do now
5 things digital media companies need to do nowGrant Thornton LLP
 
A change manifesto for the CIO: A business perspective by Hugh Terry
A change manifesto for the CIO: A business perspective by Hugh Terry A change manifesto for the CIO: A business perspective by Hugh Terry
A change manifesto for the CIO: A business perspective by Hugh Terry The Digital Insurer
 

Mais procurados (20)

Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breaches
 
The way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of ThingsThe way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of Things
 
Building Trust Through Social Media
Building Trust Through Social MediaBuilding Trust Through Social Media
Building Trust Through Social Media
 
2016 Edelman Trust Barometer New Zealand
2016 Edelman Trust Barometer New Zealand2016 Edelman Trust Barometer New Zealand
2016 Edelman Trust Barometer New Zealand
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
Europe and the Internet: It’s complicated
Europe and the Internet: It’s complicatedEurope and the Internet: It’s complicated
Europe and the Internet: It’s complicated
 
Cloud complexity: the need for resilience
Cloud complexity: the need for resilienceCloud complexity: the need for resilience
Cloud complexity: the need for resilience
 
How Data Empowers the Member-Centric Enterprise (AHIP Presentation)
How Data Empowers the Member-Centric Enterprise (AHIP Presentation)How Data Empowers the Member-Centric Enterprise (AHIP Presentation)
How Data Empowers the Member-Centric Enterprise (AHIP Presentation)
 
Improving the Efficacy of Root Cause Analysis
Improving the Efficacy of Root Cause AnalysisImproving the Efficacy of Root Cause Analysis
Improving the Efficacy of Root Cause Analysis
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 
Executive summary - App nations
Executive summary - App nationsExecutive summary - App nations
Executive summary - App nations
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information security
 
Infographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyInfographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management Study
 
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
 
Smart Data Infographic
Smart Data InfographicSmart Data Infographic
Smart Data Infographic
 
Global insurers lack commitment to digital ambitions insurance networking news
Global insurers lack commitment to digital ambitions   insurance networking newsGlobal insurers lack commitment to digital ambitions   insurance networking news
Global insurers lack commitment to digital ambitions insurance networking news
 
5 things digital media companies need to do now
5 things digital media companies need to do now5 things digital media companies need to do now
5 things digital media companies need to do now
 
A change manifesto for the CIO: A business perspective by Hugh Terry
A change manifesto for the CIO: A business perspective by Hugh Terry A change manifesto for the CIO: A business perspective by Hugh Terry
A change manifesto for the CIO: A business perspective by Hugh Terry
 

Semelhante a Data Security Drives Brand Trust

2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational GapPing Identity
 
The State of Privacy Report
The State of Privacy ReportThe State of Privacy Report
The State of Privacy ReportFigLeaf
 
Mis tue sponsored breakfast trus te
Mis tue sponsored breakfast   trus teMis tue sponsored breakfast   trus te
Mis tue sponsored breakfast trus teMediaPost
 
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...Capgemini
 
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSAUS Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSATrustArc
 
TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALPeggy Lawless
 
2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 4iQ
 
2012 12, asparna report - online privacy in 2012 - highlights
2012 12, asparna report - online privacy in 2012 - highlights2012 12, asparna report - online privacy in 2012 - highlights
2012 12, asparna report - online privacy in 2012 - highlightsEtamar Laron
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Ipsos UK
 
The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security complianceFindWhitePapers
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & ThievesLorena Magee
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Echoworx
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian_US
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicPing Identity
 
Survey results: The age of unbounded data
Survey results: The age of unbounded dataSurvey results: The age of unbounded data
Survey results: The age of unbounded dataMoxie Insight
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBsCarbonite
 

Semelhante a Data Security Drives Brand Trust (20)

2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
The State of Privacy Report
The State of Privacy ReportThe State of Privacy Report
The State of Privacy Report
 
Mis tue sponsored breakfast trus te
Mis tue sponsored breakfast   trus teMis tue sponsored breakfast   trus te
Mis tue sponsored breakfast trus te
 
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
 
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSAUS Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
 
TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINAL
 
2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey
 
2012 12, asparna report - online privacy in 2012 - highlights
2012 12, asparna report - online privacy in 2012 - highlights2012 12, asparna report - online privacy in 2012 - highlights
2012 12, asparna report - online privacy in 2012 - highlights
 
State of Security
State of SecurityState of Security
State of Security
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
 
The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security compliance
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
Presentation bip sidibe group
Presentation bip sidibe groupPresentation bip sidibe group
Presentation bip sidibe group
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | Infographic
 
2014 Executive Breach Preparedness Research Report
2014 Executive Breach Preparedness Research Report2014 Executive Breach Preparedness Research Report
2014 Executive Breach Preparedness Research Report
 
Survey results: The age of unbounded data
Survey results: The age of unbounded dataSurvey results: The age of unbounded data
Survey results: The age of unbounded data
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBs
 

Mais de Edelman

2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.Edelman
 
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBALEdelman
 
2019 Edelman-LinkedIn B2B Thought Leadership Impact Study
2019 Edelman-LinkedIn B2B Thought Leadership Impact Study2019 Edelman-LinkedIn B2B Thought Leadership Impact Study
2019 Edelman-LinkedIn B2B Thought Leadership Impact StudyEdelman
 
2018 Federal Cabinet Shuffle
2018 Federal Cabinet Shuffle2018 Federal Cabinet Shuffle
2018 Federal Cabinet ShuffleEdelman
 
The Edelman Perspective - 2018 Federal Cabinet Shuffle
The Edelman Perspective - 2018 Federal Cabinet ShuffleThe Edelman Perspective - 2018 Federal Cabinet Shuffle
The Edelman Perspective - 2018 Federal Cabinet ShuffleEdelman
 
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World 2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World Edelman
 
Edelman Trust Barometer – U.S. Natural Gas Industry Perceptions
Edelman Trust Barometer – U.S. Natural Gas Industry PerceptionsEdelman Trust Barometer – U.S. Natural Gas Industry Perceptions
Edelman Trust Barometer – U.S. Natural Gas Industry PerceptionsEdelman
 
2017 Edelman Trust Barometer Special Report: Institutional Investors
2017 Edelman Trust Barometer Special Report: Institutional Investors2017 Edelman Trust Barometer Special Report: Institutional Investors
2017 Edelman Trust Barometer Special Report: Institutional InvestorsEdelman
 
2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary
2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary
2017 Edelman Trust Barometer Special Report: Investor Trust Executive SummaryEdelman
 
8 Trends That Will Shape Travel in 2018
8 Trends That Will Shape Travel in 20188 Trends That Will Shape Travel in 2018
8 Trends That Will Shape Travel in 2018Edelman
 
The Edelman Perspective - Ontario Budget 2018
The Edelman Perspective - Ontario Budget 2018The Edelman Perspective - Ontario Budget 2018
The Edelman Perspective - Ontario Budget 2018Edelman
 
2018 Edelman Trust Barometer Special Report: Trust in Brand China
2018 Edelman Trust Barometer Special Report:  Trust in Brand China2018 Edelman Trust Barometer Special Report:  Trust in Brand China
2018 Edelman Trust Barometer Special Report: Trust in Brand ChinaEdelman
 
2018 Edelman Trust Barometer - Italy Report
2018 Edelman Trust Barometer - Italy Report 2018 Edelman Trust Barometer - Italy Report
2018 Edelman Trust Barometer - Italy Report Edelman
 
Tendências em Viagens e Turismo na América Latina em 2018
Tendências em Viagens e Turismo na América Latina em 2018Tendências em Viagens e Turismo na América Latina em 2018
Tendências em Viagens e Turismo na América Latina em 2018Edelman
 
2018 Edelman Trust Barometer - UAE
2018 Edelman Trust Barometer - UAE2018 Edelman Trust Barometer - UAE
2018 Edelman Trust Barometer - UAEEdelman
 
2018 Edelman Trust Barometer - Malaysia Report
2018 Edelman Trust Barometer - Malaysia Report2018 Edelman Trust Barometer - Malaysia Report
2018 Edelman Trust Barometer - Malaysia ReportEdelman
 
2018 Edelman Trust Barometer - Australia Results
2018 Edelman Trust Barometer - Australia Results2018 Edelman Trust Barometer - Australia Results
2018 Edelman Trust Barometer - Australia ResultsEdelman
 
2018 Edelman Trust Barometer - South Africa Report
2018 Edelman Trust Barometer - South Africa Report2018 Edelman Trust Barometer - South Africa Report
2018 Edelman Trust Barometer - South Africa ReportEdelman
 
2018 Edelman Trust Barometer - Brasil Report
2018 Edelman Trust Barometer - Brasil Report2018 Edelman Trust Barometer - Brasil Report
2018 Edelman Trust Barometer - Brasil ReportEdelman
 
Edelman 2018 Federal Budget Update
Edelman 2018 Federal Budget UpdateEdelman 2018 Federal Budget Update
Edelman 2018 Federal Budget UpdateEdelman
 

Mais de Edelman (20)

2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_U.S.
 
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL
2020 Edelman-LinkedIn B2B Thought Leadership Impact Study_GLOBAL
 
2019 Edelman-LinkedIn B2B Thought Leadership Impact Study
2019 Edelman-LinkedIn B2B Thought Leadership Impact Study2019 Edelman-LinkedIn B2B Thought Leadership Impact Study
2019 Edelman-LinkedIn B2B Thought Leadership Impact Study
 
2018 Federal Cabinet Shuffle
2018 Federal Cabinet Shuffle2018 Federal Cabinet Shuffle
2018 Federal Cabinet Shuffle
 
The Edelman Perspective - 2018 Federal Cabinet Shuffle
The Edelman Perspective - 2018 Federal Cabinet ShuffleThe Edelman Perspective - 2018 Federal Cabinet Shuffle
The Edelman Perspective - 2018 Federal Cabinet Shuffle
 
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World 2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World
2018 Edelman Trust Barometer: Attitudes Toward Energy in a Polarized World
 
Edelman Trust Barometer – U.S. Natural Gas Industry Perceptions
Edelman Trust Barometer – U.S. Natural Gas Industry PerceptionsEdelman Trust Barometer – U.S. Natural Gas Industry Perceptions
Edelman Trust Barometer – U.S. Natural Gas Industry Perceptions
 
2017 Edelman Trust Barometer Special Report: Institutional Investors
2017 Edelman Trust Barometer Special Report: Institutional Investors2017 Edelman Trust Barometer Special Report: Institutional Investors
2017 Edelman Trust Barometer Special Report: Institutional Investors
 
2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary
2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary
2017 Edelman Trust Barometer Special Report: Investor Trust Executive Summary
 
8 Trends That Will Shape Travel in 2018
8 Trends That Will Shape Travel in 20188 Trends That Will Shape Travel in 2018
8 Trends That Will Shape Travel in 2018
 
The Edelman Perspective - Ontario Budget 2018
The Edelman Perspective - Ontario Budget 2018The Edelman Perspective - Ontario Budget 2018
The Edelman Perspective - Ontario Budget 2018
 
2018 Edelman Trust Barometer Special Report: Trust in Brand China
2018 Edelman Trust Barometer Special Report:  Trust in Brand China2018 Edelman Trust Barometer Special Report:  Trust in Brand China
2018 Edelman Trust Barometer Special Report: Trust in Brand China
 
2018 Edelman Trust Barometer - Italy Report
2018 Edelman Trust Barometer - Italy Report 2018 Edelman Trust Barometer - Italy Report
2018 Edelman Trust Barometer - Italy Report
 
Tendências em Viagens e Turismo na América Latina em 2018
Tendências em Viagens e Turismo na América Latina em 2018Tendências em Viagens e Turismo na América Latina em 2018
Tendências em Viagens e Turismo na América Latina em 2018
 
2018 Edelman Trust Barometer - UAE
2018 Edelman Trust Barometer - UAE2018 Edelman Trust Barometer - UAE
2018 Edelman Trust Barometer - UAE
 
2018 Edelman Trust Barometer - Malaysia Report
2018 Edelman Trust Barometer - Malaysia Report2018 Edelman Trust Barometer - Malaysia Report
2018 Edelman Trust Barometer - Malaysia Report
 
2018 Edelman Trust Barometer - Australia Results
2018 Edelman Trust Barometer - Australia Results2018 Edelman Trust Barometer - Australia Results
2018 Edelman Trust Barometer - Australia Results
 
2018 Edelman Trust Barometer - South Africa Report
2018 Edelman Trust Barometer - South Africa Report2018 Edelman Trust Barometer - South Africa Report
2018 Edelman Trust Barometer - South Africa Report
 
2018 Edelman Trust Barometer - Brasil Report
2018 Edelman Trust Barometer - Brasil Report2018 Edelman Trust Barometer - Brasil Report
2018 Edelman Trust Barometer - Brasil Report
 
Edelman 2018 Federal Budget Update
Edelman 2018 Federal Budget UpdateEdelman 2018 Federal Budget Update
Edelman 2018 Federal Budget Update
 

Último

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Último (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Data Security Drives Brand Trust

  • 1. Privacy & Security: The New Drivers of Brand, Reputation and Action Global Insights 2012
  • 2. Data security and privacy have moved from the backroom to the boardroom. Data breaches, security incidents and Edelman’s industry study shows, for the privacy missteps are making headlines first time, why managing data security worldwide and have become a focal and privacy impact business success. point for social media discussions and Our survey reveals: legislation. The gap between consumer expectations Managing data security and privacy and what businesses are actually effectively is essential to businesses delivering. today. The growing volume and A relationship between effective data sensitivity of information being shared, protection and business success. stored and used is driving demand for That data security and privacy greater transparency about how it is considerations do impact purchasing being managed and protected. decisions.
  • 3. People care about the security of their personal information more than ever before. A majority of consumers are more concerned about data security and privacy than they were five years ago and sense they are powerless to exert control, leaving companies with the responsibility for protecting it. of global consumers are 70% MORE CONCERNED than they were 5 years ago of global consumers feel they have 68% LOST CONTROL over how their personal information is shared and used by companies Base: All respondents (Global n=4,050) Q12. Compared to five years ago, how has your level of concern regarding online data security and privacy changed? Q15. Using a scale of 1 to 5, where 1 means “strongly disagree” and 5 means “strongly agree,” please indicate your level of agreement with the following statements. (Summary of top 2 box scores shown)
  • 4. These concerns present both a challenge and an opportunity for businesses. Consumers are fed up with the status quo and want companies to act, having seen either no change or a decline in the security of their data over the last five years. Security of Personal Information Online Compared to Five Years Ago (Global) of global consumers feel their 7% Much more secure 32% online privacy is adequately PROTECTED by business practices Somewhat more secure No Change 36% Somewhat less secure Much less secure of global consumers feel companies 85% need to take security & privacy 23% 57% of consumers report no MORE SERIOUSLY change or a decline in the security of their personal 25% information online 9% Base: All respondents (Global n=4,050) Q15. Using a scale of 1 to 5, where 1 means “strongly disagree” and 5 means “strongly agree,” please indicate your level of agreement with the following statements. (Summary of top 2 box scores shown) Q14. Compared to five years ago, how would you describe the security of your personal information online?
  • 5. Adults are most concerned about information held by businesses they use most frequently. Online shopping and banking, which require the sharing of financial information, are the most common online activities. Understandably, consumers are most concerned about the security of their financial information. Most Common Online Activities Information of Greatest Concern Online (Global) (Global) Financial information 90% Personal information 78% Online Shopping 82% Emails 36% Health information 28% Frequent purchase / shopping data 26% Content posted by you to social networks 17% Online Banking 80% Content posted by others to social networks 13% Browsing activity 12% Base: All respondents (Global n=4,050) Q1. Which of the following actions have you taken in the past three months? Q3. What types of online personal information are you most concerned about? Please order the following types of information from least to most important.
  • 6. Financial institutions and online retailers are not meeting the needs of their customers. A notable gap exists between the number of people who consider data security important in the finance and online retail industries and the number who actually trust them to protect personal information. 23-point gap in expectations 51-point gap in expectations 92% Importance of privacy and security in each industry (global) 84% 78% 77% Trust in each industry to protect personal information (global) 69% 69% 63% 51% 50% 50% 48% 43% 37% 33% 27% 23% 12% 12% 9% 11% 6% Finance Online Medical & Government Social Technology News & Automotive Food & Gaming Utilities* Shopping & Healthcare Networking Media Grocery Retail NOTE: Q7: summary of top 2 box scores shown; Q8: top three industries selected Base: All respondents (Global n=4,050) Q7. How important is your privacy and security when doing business with the following industries? *NOTE: Utilities not included as a response code Q8. Which industry do you trust most to adequately protect your personal information? Please select the top three industries.
  • 7. Concern over businesses’ ability to protect information impacts engagement in activities important to online retailers and banks. Consumers report abstaining from frequent shopping or loyalty card programs and online banking to protect their personal information. Consumers Taking Action to Protect their Online Information ONE in FIVE adults do not join a frequent shopping ONE in TEN adults card or loyalty card program do not bank online Base: All respondents (Global n=4,050) Q4. Which of the following actions have you taken to protect your online information?
  • 8. Consumers consider data security and privacy features when purchasing tech products. Nearly half of consumers reported that data security is among the top three factors they consider when purchasing a smartphone. Top Three Most Important Factors Considered When Purchasing Smartphones (Global) 69% 61% 48% 47% 40% 35% Price Ease of Use Data Security & Privacy Style & Design Product Warranty Physical Dimensions (size, weight) Base: All respondents (Global n=4,050) Q5. In your opinion, when making a decision to purchase the types of products below, what factors are most important? Select up to three choices.
  • 9. Security considerations also impact other purchasing decisions. For personal computers and tablets, security considerations are on par with style, design and physical dimensions of the product. Top Three Most Important Factors Considered When Purchasing Tablets and Personal Computers (Global) Price 71% 75% Ease of Use 59% 53% Data Security & Privacy 42% 51% Style & Design 42% 34% Product Warranty 45% 54% Physical Dimensions (size, weight) 43% 34% Base: All respondents (Global n=4,050) Tablets Personal Computers Q5. In your opinion, when making a decision to purchase the types of products below, what factors are most important? Select up to three choices.
  • 10. Security considerations also impact other purchasing decisions. Even shoppers of traditional mobile phones and videogame consoles feel security is a key concern. of global consumers consider DATA SECURITY AND PRIVACY 29% among the top 3 most important factors when purchasing standard mobile phones of global consumers consider 22% DATA SECURITY AND PRIVACY among the top 3 most important factors when purchasing videogame consoles Base: All respondents (Global n=4,050) Q5. In your opinion, when making a decision to purchase the types of products below, what factors are most important? Select up to three choices.
  • 11. Smartphones are suffering from a trust gap. More customers take security into account when purchasing a smartphone than say they trust the security of the devices. Comparatively, smartphones are considered the least secure devices. Consumers selecting Data Security and Privacy among Top Three Most Important Factors vs. Trust in Security of Devices (Global) 14-point difference in consumers considering security 58% important and those that trust security for smartphones 51% 48% 44% 42% 37% 37% 34% 29% 22% 17% Personal Computers Tablets Smartphones Standard Mobile Videogame Console Digital Music Player* Phones Consumers selecting Data Security & Privacy among Top Three Important Factors Trust in Security of Device Base: All respondents (Global n=4,050) Q5. In your opinion, when making a decision to purchase the types of products below, what factors are most important? Select up to three choices. Q6.Please indicate your level of trust in the security of the following types of products. *NOTE: Digital music player not included as a response code
  • 12. The premium on security translates to adoption and retention of consumers. Consumers indicate willingness to leave online services if personal information was accessed without permission and are most concerned about services that involve financial information. Consumers Likely to Switch Providers or Stop Using Services Entirely if Personal Information was Accessed Without Permission (Global) 80% 79% 77% 75% 75% 67% 67% 65% 63% 59% 55% 55% 54% 50% Base: All respondents (Global n=4,050) Q9. For the following types of companies, if your personal information was accessed without your permission, how likely would you be to switch to a different provider or stop using these services entirely, if they did have personal information on you? Please use a scale of 1-5, where 1 is “not at all likely” and 5 is “very likely.”
  • 13. Businesses must manage security and privacy like a line of business and will lose customers if they do not. Data shows that inaction on issues of data security and privacy will put businesses are risk of losing their customer base. Consumers that have Left or Avoided Companies because of Security Issues they have had in the Past 58% 55% 53% 52% 46% 41% 36% 31% Global US Brazil China Germany India Korea UK Base: All respondents (Global n=4,050) Q16. Have you ever left or avoided companies because they have had security issues in the past?
  • 14. Consumers indicate they will act to protect their privacy if businesses don’t. In the wake of a data breach, individuals are even willing to abandon the companies they trust most. Data breaches may also impact reputation due to the strong tendency of victims to share their experiences. Americans proved most loyal to the Actions Taken following Data Breach Events companies they do business with, yet ONE in TWO say they are likely to of global consumers change brands after a data breach 39% TOLD A FRIEND about their experience of global consumers would 71% SWITCH PROVIDERS of global consumers after a company they rarely used suffered a data breach 29% POSTED ONLINE about their experience Base: All respondents (Global n=4,050) Q10. If the brand you trust most and use most loyally suffered a data breach, how likely would you be to switch brands? Q11. If a brand you rarely use (but still has your personal data) suffered a data breach, how likely would you be to switch brands? Q21. Did you take any action following these events?