Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

U.S. Consumers Will Stop Doing Business with a Hacked Organization

June 8, 2016

A study has found that that 66 percent of adults in the U.S. are at least somewhat likely to stop doing business with a company that has suffered a cyberbreach. That number is even higher in the U.K., where 75 percent said they are somewhat likely to stop doing business after a hack.

The Centrify study, which surveyed 2,400 people across the U.S., U.K. and Germany, also found that most consumers believe that the burden of responsibility for hacks rests almost entirely on the businesses. About two-thirds in each country rated corporations as a nine or 10 on a 10-point scale in terms of how responsible they should be for preventing hacks and securing the personal information of their customers. What’s more, many adults are extremely likely to hold corporations fully accountable, with significant percentages saying that corporations are not taking enough responsibility when they do get hacked (41 percent in the U.S., 50 percent in the U.K., 38 percent in Germany).

To some degree, most adults accept hacking as inevitable. About three-quarters say it is probably or definitely normal and expected for businesses and large organizations to be hacked. However, relatively few say this is definitely normal (21 percent in the U.S., 13 percent in the U.K., 16 percent in Germany).

And just because some respondents consider hacking normal does not mean they are letting businesses off the hook. The study found that 21 percent of U.S. consumers say they are very likely to stop transacting with a business that has been hacked. The people most likely to take their business elsewhere include those who have had their personal information compromised in a hack, those who are tech savvy and those who are frequent online shoppers.

“The study clearly points to the need for organizations to dramatically bolster their security systems and do everything in their power to protect consumer information and prevent a breach,” said Tom Kemp, CEO of Centrify. “When companies put customer data at risk they are really putting their entire business at risk. Consumers simply will not tolerate doing business with hacked organizations. It’s time for organizations to take full responsibility for their security and put the proper measures in place once and for all.”

The survey found that financial institutions have the best reputation when it comes to dealing with hacks relative to other industries. They received the most number one, two or three rankings among seven different industries in terms of how well they handle security issues for their customers. Medical and health organizations were a clear second place (in being ranked first, second or third) of the seven industries, followed by government. However, there is less faith in retail businesses, which ranked fourth of seven in each country, and travel sites, which ranked fifth of seven in each country. Bringing up the rear were membership and hospitality businesses, which received the lowest rankings by a wide margin.

The good news is that, when companies are hacked, they are not engaging in cover-ups or trying to sweep the incident under the rug. Instead, they are increasingly going public with the news and notifying their customers directly. The study found that about half the people in the U.S., one-third in the U.K. and one-quarter in Germany were notified of a hack. In each of those groups, between 45 percent and 53 percent say they learned from the company that their personal information was compromised.

And, when hacks occur, businesses are proactively asking their customers to follow a number of precautionary steps. Specifically, 61 percent of U.S. consumers were advised by the hacked organization to carefully monitor all bank account transactions and 59 percent were asked to change their passwords. By contrast, just 33 percent of respondents said they were advised to request alerts, and less than a third of respondents were advised to consider a security freeze or use multi-factor authentication.

http://www.businesswire.com/news/home/20160608005485/en/Centrify-Survey-Finds-66-Percent-U.S.-Consumers 

KEYWORDS: cyber attack cyber security data breach

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • cyber_enews

    Is Cybercrime Just a Cost of Doing Business?

    See More
  • mobile

    Telecom Carriers Charged with Facilitating Hundreds of Millions of Fraudulent Robocalls to U.S. Consumers

    See More
  • ransomware

    Stop ransomware with a deterministic approach to cybersecurity

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • security book.jpg

    Security Investigations: A Professional’s Guide

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing