SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
© 2019 4iQ.com All rights reserved.© 2019 4iQ.com. All rights reserved.
2019 Identity Protection and Data Breaches Survey
1
© 2019 4iQ.com All rights reserved.© 2019 4iQ.com. All rights reserved.
4iQ recently surveyed over 2,300 U.S. adults on their
perceptions of data breaches and how they are personally
impacted, what kind of assistance they received in its
wake, and how prepared they are at protecting their own
personally identifiable information (PII).
2
© 2019 4iQ.com All rights reserved.
STOLEN PERSONALLY IDENTIFIABLE INFORMATION (PII)?
Nearly half of
respondents have been
notified that their PII was
stolen.
3
© 2019 4iQ.com All rights reserved.
OFFER & ENROLLMENT IN IDENTITY PROTECTION SERVICES
Among the victims, 84% were
offered identity protection
services.
More than half did not enroll in
credit monitoring services
offered by companies.
4
© 2019 4iQ.com All rights reserved.
IDENTITY PROTECTION SERVICES STICKINESS
38% respondents canceled
identity theft protection
services.
Out of which, 42% did not
see the value in continuing
credit monitoring services
after a breach.
5
11%
6%
42%
16%
13%
12%
© 2019 4iQ.com All rights reserved.
IS ID PROTECTION SERVICES A SUFFICIENT RESPONSE?
Audiences are split on
whether offering data
protection services is a
sufficient response to loss
of PII.
6
© 2019 4iQ.com All rights reserved.
However, younger
respondents
consider the offer
of Identity
Protection Services
a sufficient
response to a data
breach.
POST-MILLENNIALS
& MILLENNIALS
GENERATION X
BABY-BOOMERS
7
ID PROTECTION SERVICES, A SUFFICIENT RESPONSE BY AGE
© 2019 4iQ.com All rights reserved.
ARE YOU EFFECTIVE IN PROTECTING YOUR PII
70% believe they
are effective or
very effective at
protecting their PII.
8
© 2019 4iQ.com All rights reserved.
VICTIM OF FRAUD?
37% of individuals believe
they have been a victim of
fraud as a result of a
cybercrime incident
9
© 2019 4iQ.com All rights reserved.
PII IN THE HANDS OF CYBER CRIMINALS?
55% of respondents thinks
it’s likely that their PII is in
the “Hands of Criminals”
10
© 2019 4iQ.com All rights reserved.
CONCERNED ABOUT FUTURE FRAUD
63% of respondents are concerned that their identity could be used by someone
to commit fraud.
4% 33 % 46 % 17 %
Not at all concerned Not very concerned Concerned Very concerned
How *concerned* are you that your identity could be used by someone else to commit fraud
by leveraging your PII?
11
© 2019 4iQ.com All rights reserved.
SECURITY ERRORS AND EMPLOYMENT STATUS
More than half said they would expect their own online security error to
negatively or very negatively affect their standing with their employer.
Some - 28%
High - 24%
Very High - 23%
What level of impact upon your employment would you
expect from your employer if a mistake you make with
online security (i.e. password reuse, clicking on suspicious
links, downloading malware) creates a
pathway to access your employer’s systems?
No - 25%
IMPACT
12
© 2019 4iQ.com All rights reserved.
HOW EFFECTIVE IS YOUR EMPLOYER AT PROTECTING YOUR PII?
74% believe their
employers are effective or
very effective at protecting
their PII.
13
© 2019 4iQ.com All rights reserved.
LEVEL OF EMPLOYER’S RESPONSE
Over half of the
respondents believe their
employers’ would have a
significant response.
14
LEVELS DESCRIPTION
Significant
Security upgrades, proactive communications, identity
protection services offered.
Medium Security upgrades, proactive communications.
Low Minimal communications, security upgrades
Very Low
Reactive-only communications, no significant security
upgrades
© 2019 4iQ.com All rights reserved.
STANDARD EMPLOYMENT BACKGROUND CHECKS?
58% believe standard
employment background
checks should also check
for whether employees’
personally identifiable
information has been stolen
prior.
15
%
© 2019 4iQ.com All rights reserved.
“BLAME THE VICTIM” IN CYBERCRIME
60% of respondents believe there’s a “blame-the-victim”
problem with cybercrime.
No - 25%
16
© 2019 4iQ.com All rights reserved.
CURRENT LAWS INCLINATION WITH CYBERCRIME
71% of respondents
think the current laws
favor employers more
than employees.No - 25%
17
© 2019 4iQ.com All rights reserved.
GOVERNMENT PROTECTING YOUR PII
Only 42% respondents
believe government is
effective or very effective
at protecting their PII.
18
51%
© 2019 4iQ.com All rights reserved.
LEVEL OF GOVERNMENT RESPONSE
Over half of the
respondents expect
significant response from
government.
19
LEVELS DESCRIPTION
Significant
Security upgrades, proactive communications, identity
protection services offered.
Medium Security upgrades, proactive communications.
Low Minimal communications, security upgrades
Very Low
Reactive-only communications, no significant security
upgrades
© 2019 4iQ.com All rights reserved.
SURVEY AUDIENCE WORK INDUSTRIES
No - 25%
20
© 2019 4iQ.com All rights reserved.
SURVEY AUDIENCE AGE
No - 25%
21
© 2019 4iQ.com All rights reserved.
SURVEY AUDIENCE REGION
No - 25%
22
© 2019 4iQ.com All rights reserved.
SURVEY AUDIENCE GENDER
23
© 2019 4iQ.com All rights reserved.
ABOUT SURVEY
24
Results are based on a survey conducted through the use of an online research platform. The survey was
administered to 2,300 U.S. Adults 18+ in August 2019. Results were weighted for age within gender,
region, race/ethnicity, education, and income, where necessary to align them with their actual
proportions in the population.
info@4iq.com
© 2019 4iQ.com All rights reserved.© 2019 4iQ.com. All rights reserved.
IDTheft™ IDHunt
Identity Theft Protection Identity Intelligence &
Attribution Analysis.
25
4iQ IDLake™ is the world’s largest repository of
curated, breached identity records.
www.4iq.com

Weitere ähnliche Inhalte

Was ist angesagt?

The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime SecureAuth
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyMark Albala
 
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Ipsos UK
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad BotsDistil Networks
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule GeneralTeo Leonard
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Narayan Makaram
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Kevin Duffey
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Ainsha Noordin (Umie)
 
Unisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Corporation
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Entersoft Security
 
TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALPeggy Lawless
 

Was ist angesagt? (20)

Criminal Alert Notice (myPay)
Criminal Alert Notice (myPay)Criminal Alert Notice (myPay)
Criminal Alert Notice (myPay)
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economy
 
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
Unisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: Netherlands
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINAL
 

Ähnlich wie 2019 Identity Protection and Data Breaches Survey

2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational GapPing Identity
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FinTech Belgium
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & ThievesLorena Magee
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSilicon Valley Bank
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicPing Identity
 
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...EY
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportFERMA
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Blair Gately
 
Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Kyriba Corporation
 
Driving Payments Security and Efficiency During COVID-19
Driving Payments Security and Efficiency During COVID-19Driving Payments Security and Efficiency During COVID-19
Driving Payments Security and Efficiency During COVID-19Kyriba Corporation
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemTransUnion
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...Capgemini
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 

Ähnlich wie 2019 Identity Protection and Data Breaches Survey (20)

2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | Infographic
 
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19
 
Driving Payments Security and Efficiency During COVID-19
Driving Payments Security and Efficiency During COVID-19Driving Payments Security and Efficiency During COVID-19
Driving Payments Security and Efficiency During COVID-19
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 

Kürzlich hochgeladen

What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
Mastering Project Planning with Microsoft Project 2016.pptx
Mastering Project Planning with Microsoft Project 2016.pptxMastering Project Planning with Microsoft Project 2016.pptx
Mastering Project Planning with Microsoft Project 2016.pptxAS Design & AST.
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jNeo4j
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdfAndrey Devyatkin
 
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfZer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfmaor17
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingShane Coughlan
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogueitservices996
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
Understanding Plagiarism: Causes, Consequences and Prevention.pptx
Understanding Plagiarism: Causes, Consequences and Prevention.pptxUnderstanding Plagiarism: Causes, Consequences and Prevention.pptx
Understanding Plagiarism: Causes, Consequences and Prevention.pptxSasikiranMarri
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...kalichargn70th171
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
Advantages of Cargo Cloud Solutions.pptx
Advantages of Cargo Cloud Solutions.pptxAdvantages of Cargo Cloud Solutions.pptx
Advantages of Cargo Cloud Solutions.pptxRTS corp
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITmanoharjgpsolutions
 

Kürzlich hochgeladen (20)

What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
Mastering Project Planning with Microsoft Project 2016.pptx
Mastering Project Planning with Microsoft Project 2016.pptxMastering Project Planning with Microsoft Project 2016.pptx
Mastering Project Planning with Microsoft Project 2016.pptx
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
 
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfZer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdf
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
Understanding Plagiarism: Causes, Consequences and Prevention.pptx
Understanding Plagiarism: Causes, Consequences and Prevention.pptxUnderstanding Plagiarism: Causes, Consequences and Prevention.pptx
Understanding Plagiarism: Causes, Consequences and Prevention.pptx
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
Advantages of Cargo Cloud Solutions.pptx
Advantages of Cargo Cloud Solutions.pptxAdvantages of Cargo Cloud Solutions.pptx
Advantages of Cargo Cloud Solutions.pptx
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh IT
 

2019 Identity Protection and Data Breaches Survey

  • 1. © 2019 4iQ.com All rights reserved.© 2019 4iQ.com. All rights reserved. 2019 Identity Protection and Data Breaches Survey 1
  • 2. © 2019 4iQ.com All rights reserved.© 2019 4iQ.com. All rights reserved. 4iQ recently surveyed over 2,300 U.S. adults on their perceptions of data breaches and how they are personally impacted, what kind of assistance they received in its wake, and how prepared they are at protecting their own personally identifiable information (PII). 2
  • 3. © 2019 4iQ.com All rights reserved. STOLEN PERSONALLY IDENTIFIABLE INFORMATION (PII)? Nearly half of respondents have been notified that their PII was stolen. 3
  • 4. © 2019 4iQ.com All rights reserved. OFFER & ENROLLMENT IN IDENTITY PROTECTION SERVICES Among the victims, 84% were offered identity protection services. More than half did not enroll in credit monitoring services offered by companies. 4
  • 5. © 2019 4iQ.com All rights reserved. IDENTITY PROTECTION SERVICES STICKINESS 38% respondents canceled identity theft protection services. Out of which, 42% did not see the value in continuing credit monitoring services after a breach. 5 11% 6% 42% 16% 13% 12%
  • 6. © 2019 4iQ.com All rights reserved. IS ID PROTECTION SERVICES A SUFFICIENT RESPONSE? Audiences are split on whether offering data protection services is a sufficient response to loss of PII. 6
  • 7. © 2019 4iQ.com All rights reserved. However, younger respondents consider the offer of Identity Protection Services a sufficient response to a data breach. POST-MILLENNIALS & MILLENNIALS GENERATION X BABY-BOOMERS 7 ID PROTECTION SERVICES, A SUFFICIENT RESPONSE BY AGE
  • 8. © 2019 4iQ.com All rights reserved. ARE YOU EFFECTIVE IN PROTECTING YOUR PII 70% believe they are effective or very effective at protecting their PII. 8
  • 9. © 2019 4iQ.com All rights reserved. VICTIM OF FRAUD? 37% of individuals believe they have been a victim of fraud as a result of a cybercrime incident 9
  • 10. © 2019 4iQ.com All rights reserved. PII IN THE HANDS OF CYBER CRIMINALS? 55% of respondents thinks it’s likely that their PII is in the “Hands of Criminals” 10
  • 11. © 2019 4iQ.com All rights reserved. CONCERNED ABOUT FUTURE FRAUD 63% of respondents are concerned that their identity could be used by someone to commit fraud. 4% 33 % 46 % 17 % Not at all concerned Not very concerned Concerned Very concerned How *concerned* are you that your identity could be used by someone else to commit fraud by leveraging your PII? 11
  • 12. © 2019 4iQ.com All rights reserved. SECURITY ERRORS AND EMPLOYMENT STATUS More than half said they would expect their own online security error to negatively or very negatively affect their standing with their employer. Some - 28% High - 24% Very High - 23% What level of impact upon your employment would you expect from your employer if a mistake you make with online security (i.e. password reuse, clicking on suspicious links, downloading malware) creates a pathway to access your employer’s systems? No - 25% IMPACT 12
  • 13. © 2019 4iQ.com All rights reserved. HOW EFFECTIVE IS YOUR EMPLOYER AT PROTECTING YOUR PII? 74% believe their employers are effective or very effective at protecting their PII. 13
  • 14. © 2019 4iQ.com All rights reserved. LEVEL OF EMPLOYER’S RESPONSE Over half of the respondents believe their employers’ would have a significant response. 14 LEVELS DESCRIPTION Significant Security upgrades, proactive communications, identity protection services offered. Medium Security upgrades, proactive communications. Low Minimal communications, security upgrades Very Low Reactive-only communications, no significant security upgrades
  • 15. © 2019 4iQ.com All rights reserved. STANDARD EMPLOYMENT BACKGROUND CHECKS? 58% believe standard employment background checks should also check for whether employees’ personally identifiable information has been stolen prior. 15 %
  • 16. © 2019 4iQ.com All rights reserved. “BLAME THE VICTIM” IN CYBERCRIME 60% of respondents believe there’s a “blame-the-victim” problem with cybercrime. No - 25% 16
  • 17. © 2019 4iQ.com All rights reserved. CURRENT LAWS INCLINATION WITH CYBERCRIME 71% of respondents think the current laws favor employers more than employees.No - 25% 17
  • 18. © 2019 4iQ.com All rights reserved. GOVERNMENT PROTECTING YOUR PII Only 42% respondents believe government is effective or very effective at protecting their PII. 18 51%
  • 19. © 2019 4iQ.com All rights reserved. LEVEL OF GOVERNMENT RESPONSE Over half of the respondents expect significant response from government. 19 LEVELS DESCRIPTION Significant Security upgrades, proactive communications, identity protection services offered. Medium Security upgrades, proactive communications. Low Minimal communications, security upgrades Very Low Reactive-only communications, no significant security upgrades
  • 20. © 2019 4iQ.com All rights reserved. SURVEY AUDIENCE WORK INDUSTRIES No - 25% 20
  • 21. © 2019 4iQ.com All rights reserved. SURVEY AUDIENCE AGE No - 25% 21
  • 22. © 2019 4iQ.com All rights reserved. SURVEY AUDIENCE REGION No - 25% 22
  • 23. © 2019 4iQ.com All rights reserved. SURVEY AUDIENCE GENDER 23
  • 24. © 2019 4iQ.com All rights reserved. ABOUT SURVEY 24 Results are based on a survey conducted through the use of an online research platform. The survey was administered to 2,300 U.S. Adults 18+ in August 2019. Results were weighted for age within gender, region, race/ethnicity, education, and income, where necessary to align them with their actual proportions in the population. info@4iq.com
  • 25. © 2019 4iQ.com All rights reserved.© 2019 4iQ.com. All rights reserved. IDTheft™ IDHunt Identity Theft Protection Identity Intelligence & Attribution Analysis. 25 4iQ IDLake™ is the world’s largest repository of curated, breached identity records. www.4iq.com