SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
CONSUMER PERCEPTIONS
ON SECURITY:
DO THEY STILL CARE?
Consumer Perceptions on Security
In 2014, over 78 million records containing personal information have been
exposed in a breach1
. Even more alarming, nearly 520 million financial
records were stolen in the last 12 months2
. There has been an epidemic of
major data breaches in the last year, and with the increasing adoption of mobile and
social platforms, consumer concerns about online security have grown.
In a survey commissioned by RSA and conducted by the Ponemon Institute, consumers
generally perceive a loss of control over their personal information, however, they still
believe security is important and expect it across digital transactions they perform.
Despite high expectations for security, most consumers are still doing little to change
their behavior.
This ebook explores the impact of data breaches on consumers, the effects of mobile on
consumer behavior, and how consumers expect service providers to protect their digital
identities.
1
Identity Theft Resource Center, Data Breach Report, October 2014
2
U.S. Federal Bureau of Investigation
Consumer Perceptions on Security
101010101010101010101010101010101010101010 1010101010
0101010101010101010101010101010101010101010101010101
010101010101010 101010101010101010101010101010101010
10101010101010101010101010101010101010101010 10101010
0101010101010101010101010101010101010101010101010101
01010101010101010 1010101010101010101010101010101010
1010 101010101010101010101010101010101010101010 10101
0101010101010101010101010101010101010101010101010101
0101010101010101010 10101010101010101010101010101010
101010101010101010101010101010101010101010101010 1010
0101010101010101010101010101010101010101010101010101
010101010101010101010 101010101010101010101010101010
1010101010101010101010101010101010101010101010101010
DIGITAL IDENTITIES AT RISK
Consumer Perceptions on Security
One in two consumers has received a notification
that their personal information was lost or stolen
at least once in the last two years.
In addition, 77% of consumers state it is very
important or important that a service provider
promptly notify them if their personal data is lost
or stolen. Among the nearly one in four consumers
who felt notification was not important, the
majority, or 65%, cited the inability to stop fraud
or identity theft as the top reason.
Consumer Perceptions on Security
STOLEN DATA IN THE
BLACK MARKET
Just like a legitimate business, prices of stolen data in the
black market follow the traditional economic principles of
supply and demand. It is not uncommon to see the
prices of stolen payment cards drop significantly
after a major data breach. However, stolen data,
such as medical records that contain a wealth
of personal information, tend to command
a much higher price. Regardless of the
economics of the black market,
consumers still tend to place
the highest value on
financial information.
Personal information consumers
are most concerned about losing in
a data breach (Top 5)
Social Security Number 73%
Password or PIN Number 71%
Credit or Debit Card Number 62%
Health & Wellness
Information 48%
Names of Family
& Friends 41%
Consumer Perceptions on Security
RETAILERS: THE NEW
INDUSTRY TARGET
There has always been a general perception that
cyber crime is an issue only for the financial
industry. After a wave of high profile breaches
targeting retailers, opinions are starting to shift.
Changes are looming in the payment card industry
as the U.S. becomes the last of the G-20 countries
to embrace the EMV standard. With the wide
adoption of EMV-enabled cards, it is expected that
card-not-present fraud will grow exponentially.
Early adopters of EMV technology in Europe
experienced a high growth in card-not-present
transactions as most fraud migrated to the online
channel. The U.S. will be no exception. In fact, it is
expected that card-not-present fraud will grow to
$6.4 billion by 20183
.
3
Card Not Present Fraud in a Post-EMV Environment, Aite Group, June 2014
Consumer Perceptions on Security
E-COMMERCE FRAUD CONTINUES
TO BE PREVALENT
The payment card industry will undergo
significant changes in the next three years,
which will have consequences for both
retailers and financial institutions.
However, e-commerce fraud is still a
problem today with some merchants more
affected than others.
Cyber criminals find it enjoyable to use
stolen payment cards to indulge
themselves with vacations, cash, and
computers – and even to pay their monthly
household bills. The following chart
represents the top merchants affected by
fraudulent transactions in 2014.
0%
10%
20%
30%
40%
50%
46%
16%
13%
9%
5%
1% 1% 1% 1% 1%
Money Transfer
Airlines
Computers/Electronics
General Retail
Clothing
Travel
Gaming
Toys
Jewelry
Bill Payments
Source: RSA Anti-Fraud Command Center
Consumer Perceptions on Security
BREACHES DO NOT PACK A PUNCH
WITH CONSUMERS
Consumers have remained relatively
unaffected by the wave of retail data
breaches involving the theft of payment
card data in the last 12 months. Forty-five
percent of consumers state recent
breaches have not affected their use of
credit or debit cards. According to the
National Retail Federation, 44% of
consumers plan to do their holiday
shopping online, with a majority expecting
to spend more than last year.
What is even more interesting is the level
of security they expect based on the
various online activities they perform.
While it seems logical to expect
consumers’ expectations for security to be
high for e-commerce due to so many retail
breaches, it actually ranked the lowest on
a scale of online activities, even below
using social media and performing search.
Watching a video or
listening to music
8.80
9.13
8.91
5.40
3.29
2.91
3.08
3.51
Filing tax return
Making mobile payments
Banking
Doing email or texting
Performing search
Shopping
Using social media
0 2 4 6 8 10
Do you have an expectation of security when doing
the following online activities?
1 = no expectation to 10 = high expectation
Consumer Perceptions on Security
IN MOBILE WE TRUST – NOT!
The mobile channel is growing at unprecedented rates,
surpassing even the adoption rates of the traditional online
channel. And where the users go, cyber criminals follow. App
stores are ridden with rogue applications, and malware once
reserved for PC users is being developed to target mobile
platforms. Even common cyber threats such as phishing are
emerging in the mobile channel in the form of attacks
delivered via text message. Smishing attacks, or SMS phishing,
are highly successful due to the high open rates among mobile
users and the general lack of consumer awareness surrounding
this attack vector.
According to the survey, consumers feel a lack of trust in
particular when it comes to mobile platforms. When asked
about the mobile apps they download, 77% of consumers
stated they do not trust the security of mobile apps. However,
there is still a lack of concern as demonstrated by the more
than 70 billion apps downloaded last year alone. In addition,
only about one-third of consumers admit to actually reading
the permissions requested by the apps they download.
Consumer Perceptions on Security
MOVE OVER PASSWORDS
62% of consumers state they do not
trust websites that only rely on
passwords to identify users,
however about one in three use only
one or two passwords across all the
online accounts they access. As far
as using personally identifiable
information for verification, 78% of
respondents say they would prefer
authentication procedures that do
not require them to share
information such as a name,
address, email and so forth.
New authentication methods seem
to be catching on in the consumer
space, however, as 53% of
consumers find it acceptable for a
trusted service provider to use
biometrics technology to verify their
identity. The most preferred methods
outside of username and password
include a software token embedded
on a mobile device and biometrics
such as voice verification and
fingerprints.
0% 10% 20% 30% 40% 50% 60%
53%
52%
36%
36%A hardware token
Software token embedded in
your smartphone or tablet
A biometric such as your voice, fingerprint,
retina scan, facial scan and others
SMS/text of a one-time passcode
sent to your mobile device
Preferred methods to manage your identity online
(More than one response permitted)
Consumer Perceptions on Security
A CALL FOR CHANGE IS COMING
While many consumers are doing minimal to change their behavior, they
still place value in their personal information and have high
expectations among service providers to secure their digital identities.
Perhaps consumers have become desensitized to fraud and identity
theft because so many have been affected, but they have still seen little
change in many industries.
Financial institutions have enacted many security measures in the last
decade to protect their customers which might explain the high security
expectations that consumers have for banking providers. However,
other industries have not been so quick to move. Passwords have been
proven over and over to be ineffective protection against the flood of
cyber crime that exists in today’s digital world. However, there is still a
prevalence of providers that use password-only security. This is only one
example of disconnect when it comes to consumer security. The issue
will only continue to exacerbate as organizations continue to move more
services to the online and mobile channel – and even into the cloud.
EMC2
, EMC, the EMC logo, RSA, and the RSA logo are registered trademarks or trademarks of EMC Corporation
in the United States and other countries. © Copyright 2014 EMC Corporation. All rights reserved.
Consumer Perceptions on Security

Weitere ähnliche Inhalte

Was ist angesagt?

Linas Eriksonas, Market for mobile biometrics
Linas Eriksonas, Market for mobile biometricsLinas Eriksonas, Market for mobile biometrics
Linas Eriksonas, Market for mobile biometricsLinas Eriksonas
 
The future of digital trust
The future of digital trust The future of digital trust
The future of digital trust Dario Caliendo
 
White Paper: Marketing in a World without Cookies
White Paper: Marketing in a World without CookiesWhite Paper: Marketing in a World without Cookies
White Paper: Marketing in a World without CookiesGigya
 
Most promising current and future payment technologies | SG Analytics
Most promising current and future payment technologies | SG AnalyticsMost promising current and future payment technologies | SG Analytics
Most promising current and future payment technologies | SG AnalyticsSG Analytics
 
White Paper: The 2015 State of Consumer Privacy & Personalization
White Paper: The 2015 State of Consumer Privacy & PersonalizationWhite Paper: The 2015 State of Consumer Privacy & Personalization
White Paper: The 2015 State of Consumer Privacy & PersonalizationGigya
 
Impact of covid 19 on the payment industry
Impact of covid 19 on the payment industryImpact of covid 19 on the payment industry
Impact of covid 19 on the payment industryNikunj Gundaniya
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingIJSRED
 
Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Carolyn Kopf
 
Mobile bank - Latin America - Brazil 2017
Mobile bank - Latin America - Brazil 2017Mobile bank - Latin America - Brazil 2017
Mobile bank - Latin America - Brazil 2017Ricardo Bassoi
 
Mobile and Alternative Payments in the U.S., 3rd Edition
Mobile and Alternative Payments in the U.S., 3rd EditionMobile and Alternative Payments in the U.S., 3rd Edition
Mobile and Alternative Payments in the U.S., 3rd EditionReportsnReports
 
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking sathyananda prabhu
 
Increasing your mobile banking business
Increasing your mobile banking businessIncreasing your mobile banking business
Increasing your mobile banking businessVASCO Data Security
 
Group 22 Insurance Whitepaper
Group 22 Insurance WhitepaperGroup 22 Insurance Whitepaper
Group 22 Insurance WhitepaperLinda Hill
 
Mobile Payment Index Study
Mobile Payment Index StudyMobile Payment Index Study
Mobile Payment Index Studymariusmez
 
Global Mobile Payment Methods 2013_by yStats.com
Global Mobile Payment Methods 2013_by yStats.comGlobal Mobile Payment Methods 2013_by yStats.com
Global Mobile Payment Methods 2013_by yStats.comyStats.com
 
Callcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary sessionCallcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary sessionCallcredit123
 
Banking & Innovation: How Financial Services Can Embrace the Customer Revolution
Banking & Innovation: How Financial Services Can Embrace the Customer RevolutionBanking & Innovation: How Financial Services Can Embrace the Customer Revolution
Banking & Innovation: How Financial Services Can Embrace the Customer RevolutionComrade
 

Was ist angesagt? (20)

Linas Eriksonas, Market for mobile biometrics
Linas Eriksonas, Market for mobile biometricsLinas Eriksonas, Market for mobile biometrics
Linas Eriksonas, Market for mobile biometrics
 
The future of digital trust
The future of digital trust The future of digital trust
The future of digital trust
 
White Paper: Marketing in a World without Cookies
White Paper: Marketing in a World without CookiesWhite Paper: Marketing in a World without Cookies
White Paper: Marketing in a World without Cookies
 
Aparna Mittal FORE
Aparna Mittal  FOREAparna Mittal  FORE
Aparna Mittal FORE
 
Payment Industry Trends for 2016
Payment Industry Trends for 2016Payment Industry Trends for 2016
Payment Industry Trends for 2016
 
Most promising current and future payment technologies | SG Analytics
Most promising current and future payment technologies | SG AnalyticsMost promising current and future payment technologies | SG Analytics
Most promising current and future payment technologies | SG Analytics
 
White Paper: The 2015 State of Consumer Privacy & Personalization
White Paper: The 2015 State of Consumer Privacy & PersonalizationWhite Paper: The 2015 State of Consumer Privacy & Personalization
White Paper: The 2015 State of Consumer Privacy & Personalization
 
Impact of covid 19 on the payment industry
Impact of covid 19 on the payment industryImpact of covid 19 on the payment industry
Impact of covid 19 on the payment industry
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706
 
Mobile bank - Latin America - Brazil 2017
Mobile bank - Latin America - Brazil 2017Mobile bank - Latin America - Brazil 2017
Mobile bank - Latin America - Brazil 2017
 
Mobile and Alternative Payments in the U.S., 3rd Edition
Mobile and Alternative Payments in the U.S., 3rd EditionMobile and Alternative Payments in the U.S., 3rd Edition
Mobile and Alternative Payments in the U.S., 3rd Edition
 
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking
 
Increasing your mobile banking business
Increasing your mobile banking businessIncreasing your mobile banking business
Increasing your mobile banking business
 
Group 22 Insurance Whitepaper
Group 22 Insurance WhitepaperGroup 22 Insurance Whitepaper
Group 22 Insurance Whitepaper
 
Mobile Payment Index Study
Mobile Payment Index StudyMobile Payment Index Study
Mobile Payment Index Study
 
Mobile Banking: The New American Addiction
Mobile Banking: The New American AddictionMobile Banking: The New American Addiction
Mobile Banking: The New American Addiction
 
Global Mobile Payment Methods 2013_by yStats.com
Global Mobile Payment Methods 2013_by yStats.comGlobal Mobile Payment Methods 2013_by yStats.com
Global Mobile Payment Methods 2013_by yStats.com
 
Callcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary sessionCallcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary session
 
Banking & Innovation: How Financial Services Can Embrace the Customer Revolution
Banking & Innovation: How Financial Services Can Embrace the Customer RevolutionBanking & Innovation: How Financial Services Can Embrace the Customer Revolution
Banking & Innovation: How Financial Services Can Embrace the Customer Revolution
 

Andere mochten auch

Intersections Breach Consumer Notification Guide 2013
Intersections Breach Consumer Notification Guide 2013Intersections Breach Consumer Notification Guide 2013
Intersections Breach Consumer Notification Guide 2013- Mark - Fullbright
 
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber AttacksTurning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks- Mark - Fullbright
 
Accessing Credit Reports for Foster Youth
Accessing Credit Reports for Foster YouthAccessing Credit Reports for Foster Youth
Accessing Credit Reports for Foster Youth- Mark - Fullbright
 
YOU ARE BEING TRACKED:How License Plate Readers Are Being Used To Record Amer...
YOU ARE BEING TRACKED:How License Plate Readers Are Being Used To Record Amer...YOU ARE BEING TRACKED:How License Plate Readers Are Being Used To Record Amer...
YOU ARE BEING TRACKED:How License Plate Readers Are Being Used To Record Amer...- Mark - Fullbright
 
Consumer Sentinel Network - Federal Trade Commission 2013
Consumer Sentinel Network - Federal Trade Commission 2013Consumer Sentinel Network - Federal Trade Commission 2013
Consumer Sentinel Network - Federal Trade Commission 2013- Mark - Fullbright
 

Andere mochten auch (6)

Intersections Breach Consumer Notification Guide 2013
Intersections Breach Consumer Notification Guide 2013Intersections Breach Consumer Notification Guide 2013
Intersections Breach Consumer Notification Guide 2013
 
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber AttacksTurning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks
 
Accessing Credit Reports for Foster Youth
Accessing Credit Reports for Foster YouthAccessing Credit Reports for Foster Youth
Accessing Credit Reports for Foster Youth
 
YOU ARE BEING TRACKED:How License Plate Readers Are Being Used To Record Amer...
YOU ARE BEING TRACKED:How License Plate Readers Are Being Used To Record Amer...YOU ARE BEING TRACKED:How License Plate Readers Are Being Used To Record Amer...
YOU ARE BEING TRACKED:How License Plate Readers Are Being Used To Record Amer...
 
Consumer Sentinel Network - Federal Trade Commission 2013
Consumer Sentinel Network - Federal Trade Commission 2013Consumer Sentinel Network - Federal Trade Commission 2013
Consumer Sentinel Network - Federal Trade Commission 2013
 
Your Digital Dollars
Your Digital DollarsYour Digital Dollars
Your Digital Dollars
 

Ähnlich wie CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?

Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Brunswick Group
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & ThievesLorena Magee
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersCognizant
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by RegulaRegula
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trustOptimediaSpain
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Networks
 
Mobile infographic 2015_english
Mobile infographic 2015_englishMobile infographic 2015_english
Mobile infographic 2015_englisheasysolmaria
 
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015Arm Igf
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersEckoh
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeEMC
 
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Vesta Corporation
 
The land of Big Data and online-scoring
The land of Big Data and online-scoringThe land of Big Data and online-scoring
The land of Big Data and online-scoringVladislav Solodkiy
 
The Internet of Things: A Prime Opportunity for Merchant Acquirers
The Internet of Things: A Prime Opportunity for Merchant AcquirersThe Internet of Things: A Prime Opportunity for Merchant Acquirers
The Internet of Things: A Prime Opportunity for Merchant AcquirersCognizant
 
Unify How You Verify.pdf
Unify How You Verify.pdfUnify How You Verify.pdf
Unify How You Verify.pdfIdentity Herald
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...Elizabeth Dimit
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FinTech Belgium
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theftmherr_riskconsult
 

Ähnlich wie CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE? (20)

Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trust
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
Mobile infographic 2015_english
Mobile infographic 2015_englishMobile infographic 2015_english
Mobile infographic 2015_english
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact Centers
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication Challenge
 
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
 
The land of Big Data and online-scoring
The land of Big Data and online-scoringThe land of Big Data and online-scoring
The land of Big Data and online-scoring
 
The Internet of Things: A Prime Opportunity for Merchant Acquirers
The Internet of Things: A Prime Opportunity for Merchant AcquirersThe Internet of Things: A Prime Opportunity for Merchant Acquirers
The Internet of Things: A Prime Opportunity for Merchant Acquirers
 
Unify How You Verify.pdf
Unify How You Verify.pdfUnify How You Verify.pdf
Unify How You Verify.pdf
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
 
Rise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScanRise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScan
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
 

Mehr von - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mehr von - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Kürzlich hochgeladen

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Kürzlich hochgeladen (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?

  • 2. Consumer Perceptions on Security In 2014, over 78 million records containing personal information have been exposed in a breach1 . Even more alarming, nearly 520 million financial records were stolen in the last 12 months2 . There has been an epidemic of major data breaches in the last year, and with the increasing adoption of mobile and social platforms, consumer concerns about online security have grown. In a survey commissioned by RSA and conducted by the Ponemon Institute, consumers generally perceive a loss of control over their personal information, however, they still believe security is important and expect it across digital transactions they perform. Despite high expectations for security, most consumers are still doing little to change their behavior. This ebook explores the impact of data breaches on consumers, the effects of mobile on consumer behavior, and how consumers expect service providers to protect their digital identities. 1 Identity Theft Resource Center, Data Breach Report, October 2014 2 U.S. Federal Bureau of Investigation
  • 3. Consumer Perceptions on Security 101010101010101010101010101010101010101010 1010101010 0101010101010101010101010101010101010101010101010101 010101010101010 101010101010101010101010101010101010 10101010101010101010101010101010101010101010 10101010 0101010101010101010101010101010101010101010101010101 01010101010101010 1010101010101010101010101010101010 1010 101010101010101010101010101010101010101010 10101 0101010101010101010101010101010101010101010101010101 0101010101010101010 10101010101010101010101010101010 101010101010101010101010101010101010101010101010 1010 0101010101010101010101010101010101010101010101010101 010101010101010101010 101010101010101010101010101010 1010101010101010101010101010101010101010101010101010 DIGITAL IDENTITIES AT RISK Consumer Perceptions on Security One in two consumers has received a notification that their personal information was lost or stolen at least once in the last two years. In addition, 77% of consumers state it is very important or important that a service provider promptly notify them if their personal data is lost or stolen. Among the nearly one in four consumers who felt notification was not important, the majority, or 65%, cited the inability to stop fraud or identity theft as the top reason.
  • 4. Consumer Perceptions on Security STOLEN DATA IN THE BLACK MARKET Just like a legitimate business, prices of stolen data in the black market follow the traditional economic principles of supply and demand. It is not uncommon to see the prices of stolen payment cards drop significantly after a major data breach. However, stolen data, such as medical records that contain a wealth of personal information, tend to command a much higher price. Regardless of the economics of the black market, consumers still tend to place the highest value on financial information. Personal information consumers are most concerned about losing in a data breach (Top 5) Social Security Number 73% Password or PIN Number 71% Credit or Debit Card Number 62% Health & Wellness Information 48% Names of Family & Friends 41%
  • 5. Consumer Perceptions on Security RETAILERS: THE NEW INDUSTRY TARGET There has always been a general perception that cyber crime is an issue only for the financial industry. After a wave of high profile breaches targeting retailers, opinions are starting to shift. Changes are looming in the payment card industry as the U.S. becomes the last of the G-20 countries to embrace the EMV standard. With the wide adoption of EMV-enabled cards, it is expected that card-not-present fraud will grow exponentially. Early adopters of EMV technology in Europe experienced a high growth in card-not-present transactions as most fraud migrated to the online channel. The U.S. will be no exception. In fact, it is expected that card-not-present fraud will grow to $6.4 billion by 20183 . 3 Card Not Present Fraud in a Post-EMV Environment, Aite Group, June 2014
  • 6. Consumer Perceptions on Security E-COMMERCE FRAUD CONTINUES TO BE PREVALENT The payment card industry will undergo significant changes in the next three years, which will have consequences for both retailers and financial institutions. However, e-commerce fraud is still a problem today with some merchants more affected than others. Cyber criminals find it enjoyable to use stolen payment cards to indulge themselves with vacations, cash, and computers – and even to pay their monthly household bills. The following chart represents the top merchants affected by fraudulent transactions in 2014. 0% 10% 20% 30% 40% 50% 46% 16% 13% 9% 5% 1% 1% 1% 1% 1% Money Transfer Airlines Computers/Electronics General Retail Clothing Travel Gaming Toys Jewelry Bill Payments Source: RSA Anti-Fraud Command Center
  • 7. Consumer Perceptions on Security BREACHES DO NOT PACK A PUNCH WITH CONSUMERS Consumers have remained relatively unaffected by the wave of retail data breaches involving the theft of payment card data in the last 12 months. Forty-five percent of consumers state recent breaches have not affected their use of credit or debit cards. According to the National Retail Federation, 44% of consumers plan to do their holiday shopping online, with a majority expecting to spend more than last year. What is even more interesting is the level of security they expect based on the various online activities they perform. While it seems logical to expect consumers’ expectations for security to be high for e-commerce due to so many retail breaches, it actually ranked the lowest on a scale of online activities, even below using social media and performing search. Watching a video or listening to music 8.80 9.13 8.91 5.40 3.29 2.91 3.08 3.51 Filing tax return Making mobile payments Banking Doing email or texting Performing search Shopping Using social media 0 2 4 6 8 10 Do you have an expectation of security when doing the following online activities? 1 = no expectation to 10 = high expectation
  • 8. Consumer Perceptions on Security IN MOBILE WE TRUST – NOT! The mobile channel is growing at unprecedented rates, surpassing even the adoption rates of the traditional online channel. And where the users go, cyber criminals follow. App stores are ridden with rogue applications, and malware once reserved for PC users is being developed to target mobile platforms. Even common cyber threats such as phishing are emerging in the mobile channel in the form of attacks delivered via text message. Smishing attacks, or SMS phishing, are highly successful due to the high open rates among mobile users and the general lack of consumer awareness surrounding this attack vector. According to the survey, consumers feel a lack of trust in particular when it comes to mobile platforms. When asked about the mobile apps they download, 77% of consumers stated they do not trust the security of mobile apps. However, there is still a lack of concern as demonstrated by the more than 70 billion apps downloaded last year alone. In addition, only about one-third of consumers admit to actually reading the permissions requested by the apps they download.
  • 9. Consumer Perceptions on Security MOVE OVER PASSWORDS 62% of consumers state they do not trust websites that only rely on passwords to identify users, however about one in three use only one or two passwords across all the online accounts they access. As far as using personally identifiable information for verification, 78% of respondents say they would prefer authentication procedures that do not require them to share information such as a name, address, email and so forth. New authentication methods seem to be catching on in the consumer space, however, as 53% of consumers find it acceptable for a trusted service provider to use biometrics technology to verify their identity. The most preferred methods outside of username and password include a software token embedded on a mobile device and biometrics such as voice verification and fingerprints. 0% 10% 20% 30% 40% 50% 60% 53% 52% 36% 36%A hardware token Software token embedded in your smartphone or tablet A biometric such as your voice, fingerprint, retina scan, facial scan and others SMS/text of a one-time passcode sent to your mobile device Preferred methods to manage your identity online (More than one response permitted)
  • 10. Consumer Perceptions on Security A CALL FOR CHANGE IS COMING While many consumers are doing minimal to change their behavior, they still place value in their personal information and have high expectations among service providers to secure their digital identities. Perhaps consumers have become desensitized to fraud and identity theft because so many have been affected, but they have still seen little change in many industries. Financial institutions have enacted many security measures in the last decade to protect their customers which might explain the high security expectations that consumers have for banking providers. However, other industries have not been so quick to move. Passwords have been proven over and over to be ineffective protection against the flood of cyber crime that exists in today’s digital world. However, there is still a prevalence of providers that use password-only security. This is only one example of disconnect when it comes to consumer security. The issue will only continue to exacerbate as organizations continue to move more services to the online and mobile channel – and even into the cloud.
  • 11. EMC2 , EMC, the EMC logo, RSA, and the RSA logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. © Copyright 2014 EMC Corporation. All rights reserved. Consumer Perceptions on Security