Story image

SURVEY: 70% of customers would leave a business after a breach

26 Mar 2018

A recent study from Gemalto proves it’s not just data that is lost following a breach – you’ll lose most of your customers too.

Consumers are evidently happy to relinquish the responsibility of protecting their data to a business, but are expecting it to be kept secure with no effort on their part. And this mentality is due to be enforced further in the face of imminent data regulations like GDPR.

According to Gemalto’s survey of 10,000 consumers around the world, 70 percent would stop doing business with a company if it experienced a data breach.

Despite this (and what is no doubt causing headaches in IT security departments worldwide), the survey revealed consumers are failing to properly secure themselves, with 56 percent still using the same password for multiple accounts.

Even in the cases where businesses offer robust security solutions like two-factor authentication, 41 percent of consumers admit ignoring the technology. This may be because the majority believe the business holding their data is ultimately responsible for its security.

This combination is resulting in an alarming amount of breaches – 80 percent – being caused by weak or previously stolen credentials.

Gemalto says quite simply, something must change or this is only going to get worse.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.