Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

Survey Shows Consumers are Abandoning Brands after Data Breaches

hacker
January 23, 2019

Three-quarters of consumers would stop engaging with a brand online following a breach and half would not sign up for an online service that had recently been breached, a new survey shows. The Ping Identity survey reveals many consumers are making drastic changes to the ways they interact with companies and secure their own personal data following a breach:

  • 78 percent of respondents would stop engaging with a brand online and more than one third (36 percent) would stop engaging altogether if the brand had experienced a breach.
  • Nearly half (49 percent) would not sign up and use an online service or application that recently experienced a data breach.
  • Almost half (47 percent) have made changes to the way they secure their personal data as a result of recent breaches and over half (54 percent) are more concerned with protecting their personal information today than they were a year ago.
  • “With the prevalence of data breaches and leaks, enterprises must have the proper controls in place or they become at risk of losing consumer trust and business,” said Sarah Squire, CTO Office, Ping Identity. “In the same way that brands are expected to provide user-friendly experiences, they also must understand the value and importance of strong identity management strategies.”

    Added Squire, “The findings from our 2018 survey reveal the extent to which consumers value security and rely on the brands they interact with to provide a layer of protection when it comes to their identity and personal information.”

    Younger Generation Has Higher Trust in Brands

    Ping found the greatest discrepancies in security sentiment and practices between those under 35 and those over 55. While the younger generation has greater confidence in brands’ ability to protect their personal information and is more likely to spend more to ensure their personal information is protected, the older group guards their sensitive information more carefully and is less likely to have experienced financial loss as a result of a data breach.

    • 53 percent of respondents under 35 feel confident or very confident in online services and applications providers’ ability to protect their personal information, compared with 27 percent of those over 55.
    • 54 percent of respondents under 35 are willing to input their bank information on a website or application, compared with 41 percent of those over 55.
    • 37 percent of respondents under 35 are not willing to pay anything to ensure their personal information is never breached, compared with 62 percent of those over 55.

    Americans are Nearly Twice as Likely to Share Sensitive Information with Brands

    Similarly, differences in consumer security behaviors varied depending on where they live. Americans are more carefree with their sensitive personal information; the French are not so confident in brands’ ability to protect their personal information; the British are the least likely to have experienced a data breach; and Germans are more likely to abandon Facebook Connect following the Cambridge Analytica scandal.

    • Americans are more likely to share their social security numbers with brands than other countries (16 percent, versus 9 percent France, 6 percent Germany and 4 percent UK).
    • The French are the least confident in online services and app providers’ ability to protect personal information (38 percent are confident or very confident in providers, versus 48 percent U.S., 48 percent UK and 42 percent Germany).
    • UK respondents (15 percent) are less likely to have experienced a breach than those in the U.S. (27 percent), France (21 percent) or Germany (17 percent). However, of those who have experienced a breach in the UK, 42 percent experienced a financial loss as a result (versus 24 percent in the U.S., 38 percent in Germany and 43 percent in France).

    “While consumers clearly place a high value on security, the data also shows that there are limits to how much effort they are going to make or how much they are willing to pay for it,” shared Garrett Bekker, Principal Security Analyst, 451 Research. “This suggests that the burden should fall on vendors and service providers to offer a secure online experience—and rightly so. Consumers don’t go into a restaurant and expect to pay more to ensure they don’t get sick. And if consumers don’t feel secure, the data highlights the cost to vendors in terms of lost customers.”

     

    KEYWORDS: cyber security cybersecurity data breach identity theft

    Share This Story

    Looking for a reprint of this article?
    From high-res PDFs to custom plaques, order your copy today!

    Recommended Content

    JOIN TODAY
    To unlock your recommendations.

    Already have an account? Sign In

    • Security's Top Cybersecurity Leaders 2024

      Security's Top Cybersecurity Leaders 2024

      Security magazine's Top Cybersecurity Leaders 2024 award...
      Security Enterprise Services
      By: Security Staff
    • cyber brain

      The intersection of cybersecurity and artificial intelligence

      Artificial intelligence (AI) is a valuable cybersecurity...
      Cyber Tactics Column
      By: Pam Nigro
    • artificial intelligence AI graphic

      Assessing the pros and cons of AI for cybersecurity

      Artificial intelligence (AI) has significant implications...
      Cybersecurity
      By: Charles Denyer
    Subscribe For Free!
    • Security eNewsletter & Other eNews Alerts
    • eMagazine Subscriptions
    • Manage My Preferences
    • Online Registration
    • Mobile App
    • Subscription Customer Service

    More Videos

    Sponsored Content

    Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

    close
    • Crisis Response Team
      Sponsored byEverbridge

      Automate or Fall Behind – Crisis Response at the Speed of Risk

    • Perimeter security
      Sponsored byAMAROK

      Why Property Security is the New Competitive Advantage

    • Duty of Care
      Sponsored byAMAROK

      Integrating Technology and Physical Security to Advance Duty of Care

    Popular Stories

    Pills spilled

    More than 20,000 sensitive medical records exposed

    Laptop in darkness

    Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

    White post office truck

    Department of Labor Sues USPS Over Texas Whistleblower Termination

    Computer with binary code hovering nearby

    Cyberattacks Targeting US Increased by 136%

    Internal computer parts

    Critical Software Vulnerabilities Rose 37% in 2024

    2025 Security Benchmark banner

    Events

    September 29, 2025

    Global Security Exchange (GSX)

     

    November 17, 2025

    SECURITY 500 Conference

    This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

    View All Submit An Event

    Products

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

    See More Products

    Related Articles

    • Cybersecurity Leadership Images

      Survey Shows Consumers Still Trust Brands but Want More Control over Data

      See More
    • retail 2 feat

      Consumers Express Concern, Not Initiative, After Data Breaches

      See More
    • Fraud Cybersecurity Banking in Canada

      Fraud and Data Breaches – Are Consumers Bringing Worries To Work?

      See More

    Related Products

    See More Products
    • databasehacker

      The Database Hacker's Handboo

    See More Products

    Events

    View AllSubmit An Event
    • March 6, 2025

      Why Mobile Device Response is Key to Managing Data Risk

      ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
    View AllSubmit An Event
    ×

    Sign-up to receive top management & result-driven techniques in the industry.

    Join over 20,000+ industry leaders who receive our premium content.

    SIGN UP TODAY!
    • RESOURCES
      • Advertise
      • Contact Us
      • Store
      • Want More
    • SIGN UP TODAY
      • Create Account
      • eMagazine
      • eNewsletter
      • Customer Service
      • Manage Preferences
    • SERVICES
      • Marketing Services
      • Reprints
      • Market Research
      • List Rental
      • Survey/Respondent Access
    • STAY CONNECTED
      • LinkedIn
      • Facebook
      • YouTube
      • X (Twitter)
    • PRIVACY
      • PRIVACY POLICY
      • TERMS & CONDITIONS
      • DO NOT SELL MY PERSONAL INFORMATION
      • PRIVACY REQUEST
      • ACCESSIBILITY

    Copyright ©2025. All Rights Reserved BNP Media.

    Design, CMS, Hosting & Web Development :: ePublishing