SlideShare a Scribd company logo
1 of 1
CONSUMER ATTITUDES
IN A POST-BREACH ERA
THE GENERATIONAL GAP
UNDER 35
HIGH
53%
V E R S U S OVER 55
BRAND TRUST
PERSONAL
INFORMATION
Trust in brands is relatively high
feel confident or very confident in
online service and application
providers’ ability to protect their
personal information.
FINANCIAL LOSS
SPEND TO
PROTECT
BIOMETRICS
LOW
27%
Trust in brands is relatively low
feel confident or very confident in
online service and application
providers’ ability to protect their
personal information.
When it comes to security sentiment and practices, the
younger generation and older generation don’t always see
eye to eye. A recent consumer survey revealed differences
in brand trust, willingness to invest in data protection,
biometrics adoption and more.
MORE
54%
carefree with their sensitive
personal information
are willing to input their bank
information on a website or app.
are willing to input their bank
information on a website or app.
LESS
41%
carefree with their sensitive
personal information
MORE
37%
likely to spend more to ensure their
personal information is protected
are not willing to pay anything to
ensure their personal information
is never breached.
42%
are willing to pay between $1-49
to ensure their personal
information is never breached.
42%
are not willing to pay more to online
services/apps for added security to
protect their personal information.
LESS
62%
likely to spend more to ensure their
personal information is protected
are not willing to pay anything to
ensure their personal information
is never breached.
32%
are willing to pay between $1-49
to ensure their personal
information is never breached.
75%
are not willing to pay more to online
services/apps for added security to
protect their personal information.
MORE
41%
likely to experience a financial loss
as a result of a data breach
experienced a financial loss
as a result of a breach.
experienced a financial loss
as a result of a breach.
LESS
27%
likely to experience a financial loss
as a result of a data breach
MORE
46%
open when it comes to
biometrics adoption
use biometrics like thumbprint
or facial recognition to sign in
to online services and apps.
use biometrics like thumbprint
or facial recognition to sign in
to online services and apps.
LESS
13%
open when it comes to
biometrics adoption
$
Data based on a MarketCube survey commissioned by Ping Identity. 3,264 consumers in the United States, United Kingdom, France and Germany were surveyed in May 2018.
Copyright ©2018 Ping Identity Corporation. All rights reserved. Ping Identity, PingFederate, PingOne, PingAccess, PingID, their respective product marks, the Ping Identity
trademark logo, and IDENTIFY are trademarks, or servicemarks of Ping Identity Corporation. All other product and service names mentioned are the trademarks of their
respective companies.

More Related Content

What's hot

TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...
Marketing4eCommerce
 
FTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresFTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy Disclosures
Patton Boggs LLP
 
Cell Phones&Driving[1]
Cell Phones&Driving[1]Cell Phones&Driving[1]
Cell Phones&Driving[1]
guesta0b3eb
 
Industry updates on key mobile trends 11 30 12
Industry updates on key mobile trends 11 30 12Industry updates on key mobile trends 11 30 12
Industry updates on key mobile trends 11 30 12
Performics
 
Socializing Insurance
Socializing InsuranceSocializing Insurance
Socializing Insurance
MatrixMediaFX
 
Fun facts about smartphones (extended version)
Fun facts about smartphones (extended version)Fun facts about smartphones (extended version)
Fun facts about smartphones (extended version)
Mate Budai
 
Madison Consulting & Investments Llc
Madison Consulting & Investments LlcMadison Consulting & Investments Llc
Madison Consulting & Investments Llc
tbrown230
 
Industry updates on key mobile trends 2 17 12
Industry updates on key mobile trends 2 17 12Industry updates on key mobile trends 2 17 12
Industry updates on key mobile trends 2 17 12
Performics
 

What's hot (20)

11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust Report
 
The State of Privacy Report
The State of Privacy ReportThe State of Privacy Report
The State of Privacy Report
 
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...
 
The State of Online Privacy
The State of Online PrivacyThe State of Online Privacy
The State of Online Privacy
 
FTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresFTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy Disclosures
 
Infographic: Third-Party Risks: The cyber dimension
Infographic: Third-Party Risks: The cyber dimensionInfographic: Third-Party Risks: The cyber dimension
Infographic: Third-Party Risks: The cyber dimension
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
Cell Phones&Driving[1]
Cell Phones&Driving[1]Cell Phones&Driving[1]
Cell Phones&Driving[1]
 
Selfies are dead. Long live the user generated content!
Selfies are dead. Long live the user generated content!Selfies are dead. Long live the user generated content!
Selfies are dead. Long live the user generated content!
 
Industry updates on key mobile trends 11 30 12
Industry updates on key mobile trends 11 30 12Industry updates on key mobile trends 11 30 12
Industry updates on key mobile trends 11 30 12
 
Raytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity SurveyRaytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity Survey
 
Socializing Insurance
Socializing InsuranceSocializing Insurance
Socializing Insurance
 
Fun facts about smartphones (extended version)
Fun facts about smartphones (extended version)Fun facts about smartphones (extended version)
Fun facts about smartphones (extended version)
 
CASE STUDY ANALYSIS ON PROGRESSIVE
CASE STUDY ANALYSIS ON PROGRESSIVECASE STUDY ANALYSIS ON PROGRESSIVE
CASE STUDY ANALYSIS ON PROGRESSIVE
 
E marketer report on the Mobile media report on latin-america (4)
E marketer  report on the Mobile media report on latin-america (4)E marketer  report on the Mobile media report on latin-america (4)
E marketer report on the Mobile media report on latin-america (4)
 
Madison Consulting & Investments Llc
Madison Consulting & Investments LlcMadison Consulting & Investments Llc
Madison Consulting & Investments Llc
 
Uber targets would-be drunk drivers with latest study
Uber targets would-be drunk drivers with latest studyUber targets would-be drunk drivers with latest study
Uber targets would-be drunk drivers with latest study
 
Industry updates on key mobile trends 2 17 12
Industry updates on key mobile trends 2 17 12Industry updates on key mobile trends 2 17 12
Industry updates on key mobile trends 2 17 12
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Similar to 2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap

TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINAL
Peggy Lawless
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINAL
Peggy Lawless
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
Blair Gately
 
Privacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionPrivacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and Action
Edelman
 
Ccia internet security presentation fin
Ccia internet security presentation finCcia internet security presentation fin
Ccia internet security presentation fin
Liz Gannes
 
Data Privacy: Implications for market researchers
Data Privacy: Implications for market researchers Data Privacy: Implications for market researchers
Data Privacy: Implications for market researchers
Rommell Montenegro
 

Similar to 2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap (20)

2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey
 
TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINAL
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINAL
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
 
Privacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionPrivacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and Action
 
Cyber Security Awareness Survey: India
Cyber Security Awareness Survey: IndiaCyber Security Awareness Survey: India
Cyber Security Awareness Survey: India
 
Moving beyond passwords - Consumer attitudes on online authentication
Moving beyond passwords - Consumer attitudes on online authenticationMoving beyond passwords - Consumer attitudes on online authentication
Moving beyond passwords - Consumer attitudes on online authentication
 
Ccia internet security presentation fin
Ccia internet security presentation finCcia internet security presentation fin
Ccia internet security presentation fin
 
2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust
2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust
2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust
 
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSAUS Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
 
Data Privacy: Implications for market researchers
Data Privacy: Implications for market researchers Data Privacy: Implications for market researchers
Data Privacy: Implications for market researchers
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of Trust
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of Trust
 

More from Ping Identity

More from Ping Identity (20)

Healthcare Patient Experiences Matter
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences Matter
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust Infrastructure
 
Ping’s Technology Partner Program
Ping’s Technology Partner ProgramPing’s Technology Partner Program
Ping’s Technology Partner Program
 
Remote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthRemote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust Growth
 
Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?	Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?
 
Extraordinary Financial Customer Experiences
Extraordinary Financial Customer ExperiencesExtraordinary Financial Customer Experiences
Extraordinary Financial Customer Experiences
 
Extraordinary Retail Customer Experiences
Extraordinary Retail Customer ExperiencesExtraordinary Retail Customer Experiences
Extraordinary Retail Customer Experiences
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
 
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUESLES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
 
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONSATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than Ever
 
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You BuyFishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
 

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Recently uploaded (20)

A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 

2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap

  • 1. CONSUMER ATTITUDES IN A POST-BREACH ERA THE GENERATIONAL GAP UNDER 35 HIGH 53% V E R S U S OVER 55 BRAND TRUST PERSONAL INFORMATION Trust in brands is relatively high feel confident or very confident in online service and application providers’ ability to protect their personal information. FINANCIAL LOSS SPEND TO PROTECT BIOMETRICS LOW 27% Trust in brands is relatively low feel confident or very confident in online service and application providers’ ability to protect their personal information. When it comes to security sentiment and practices, the younger generation and older generation don’t always see eye to eye. A recent consumer survey revealed differences in brand trust, willingness to invest in data protection, biometrics adoption and more. MORE 54% carefree with their sensitive personal information are willing to input their bank information on a website or app. are willing to input their bank information on a website or app. LESS 41% carefree with their sensitive personal information MORE 37% likely to spend more to ensure their personal information is protected are not willing to pay anything to ensure their personal information is never breached. 42% are willing to pay between $1-49 to ensure their personal information is never breached. 42% are not willing to pay more to online services/apps for added security to protect their personal information. LESS 62% likely to spend more to ensure their personal information is protected are not willing to pay anything to ensure their personal information is never breached. 32% are willing to pay between $1-49 to ensure their personal information is never breached. 75% are not willing to pay more to online services/apps for added security to protect their personal information. MORE 41% likely to experience a financial loss as a result of a data breach experienced a financial loss as a result of a breach. experienced a financial loss as a result of a breach. LESS 27% likely to experience a financial loss as a result of a data breach MORE 46% open when it comes to biometrics adoption use biometrics like thumbprint or facial recognition to sign in to online services and apps. use biometrics like thumbprint or facial recognition to sign in to online services and apps. LESS 13% open when it comes to biometrics adoption $ Data based on a MarketCube survey commissioned by Ping Identity. 3,264 consumers in the United States, United Kingdom, France and Germany were surveyed in May 2018. Copyright ©2018 Ping Identity Corporation. All rights reserved. Ping Identity, PingFederate, PingOne, PingAccess, PingID, their respective product marks, the Ping Identity trademark logo, and IDENTIFY are trademarks, or servicemarks of Ping Identity Corporation. All other product and service names mentioned are the trademarks of their respective companies.