SlideShare une entreprise Scribd logo
1  sur  1
CONSUMER ATTITUDES
IN A POST-BREACH ERA
THE GENERATIONAL GAP
UNDER 35
HIGH
53%
V E R S U S OVER 55
BRAND TRUST
PERSONAL
INFORMATION
Trust in brands is relatively high
feel confident or very confident in
online service and application
providers’ ability to protect their
personal information.
FINANCIAL LOSS
SPEND TO
PROTECT
BIOMETRICS
LOW
27%
Trust in brands is relatively low
feel confident or very confident in
online service and application
providers’ ability to protect their
personal information.
When it comes to security sentiment and practices, the
younger generation and older generation don’t always see
eye to eye. A recent consumer survey revealed differences
in brand trust, willingness to invest in data protection,
biometrics adoption and more.
MORE
54%
carefree with their sensitive
personal information
are willing to input their bank
information on a website or app.
are willing to input their bank
information on a website or app.
LESS
41%
carefree with their sensitive
personal information
MORE
37%
likely to spend more to ensure their
personal information is protected
are not willing to pay anything to
ensure their personal information
is never breached.
42%
are willing to pay between $1-49
to ensure their personal
information is never breached.
42%
are not willing to pay more to online
services/apps for added security to
protect their personal information.
LESS
62%
likely to spend more to ensure their
personal information is protected
are not willing to pay anything to
ensure their personal information
is never breached.
32%
are willing to pay between $1-49
to ensure their personal
information is never breached.
75%
are not willing to pay more to online
services/apps for added security to
protect their personal information.
MORE
41%
likely to experience a financial loss
as a result of a data breach
experienced a financial loss
as a result of a breach.
experienced a financial loss
as a result of a breach.
LESS
27%
likely to experience a financial loss
as a result of a data breach
MORE
46%
open when it comes to
biometrics adoption
use biometrics like thumbprint
or facial recognition to sign in
to online services and apps.
use biometrics like thumbprint
or facial recognition to sign in
to online services and apps.
LESS
13%
open when it comes to
biometrics adoption
$
Data based on a MarketCube survey commissioned by Ping Identity. 3,264 consumers in the United States, United Kingdom, France and Germany were surveyed in May 2018.
Copyright ©2018 Ping Identity Corporation. All rights reserved. Ping Identity, PingFederate, PingOne, PingAccess, PingID, their respective product marks, the Ping Identity
trademark logo, and IDENTIFY are trademarks, or servicemarks of Ping Identity Corporation. All other product and service names mentioned are the trademarks of their
respective companies.

Contenu connexe

Tendances

TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...
Marketing4eCommerce
 
FTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresFTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy Disclosures
Patton Boggs LLP
 
Cell Phones&Driving[1]
Cell Phones&Driving[1]Cell Phones&Driving[1]
Cell Phones&Driving[1]
guesta0b3eb
 
Industry updates on key mobile trends 11 30 12
Industry updates on key mobile trends 11 30 12Industry updates on key mobile trends 11 30 12
Industry updates on key mobile trends 11 30 12
Performics
 
Socializing Insurance
Socializing InsuranceSocializing Insurance
Socializing Insurance
MatrixMediaFX
 
Fun facts about smartphones (extended version)
Fun facts about smartphones (extended version)Fun facts about smartphones (extended version)
Fun facts about smartphones (extended version)
Mate Budai
 
Madison Consulting & Investments Llc
Madison Consulting & Investments LlcMadison Consulting & Investments Llc
Madison Consulting & Investments Llc
tbrown230
 
Industry updates on key mobile trends 2 17 12
Industry updates on key mobile trends 2 17 12Industry updates on key mobile trends 2 17 12
Industry updates on key mobile trends 2 17 12
Performics
 

Tendances (20)

11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust Report
 
The State of Privacy Report
The State of Privacy ReportThe State of Privacy Report
The State of Privacy Report
 
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...
 
The State of Online Privacy
The State of Online PrivacyThe State of Online Privacy
The State of Online Privacy
 
FTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresFTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy Disclosures
 
Infographic: Third-Party Risks: The cyber dimension
Infographic: Third-Party Risks: The cyber dimensionInfographic: Third-Party Risks: The cyber dimension
Infographic: Third-Party Risks: The cyber dimension
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
Cell Phones&Driving[1]
Cell Phones&Driving[1]Cell Phones&Driving[1]
Cell Phones&Driving[1]
 
Selfies are dead. Long live the user generated content!
Selfies are dead. Long live the user generated content!Selfies are dead. Long live the user generated content!
Selfies are dead. Long live the user generated content!
 
Industry updates on key mobile trends 11 30 12
Industry updates on key mobile trends 11 30 12Industry updates on key mobile trends 11 30 12
Industry updates on key mobile trends 11 30 12
 
Raytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity SurveyRaytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity Survey
 
Socializing Insurance
Socializing InsuranceSocializing Insurance
Socializing Insurance
 
Fun facts about smartphones (extended version)
Fun facts about smartphones (extended version)Fun facts about smartphones (extended version)
Fun facts about smartphones (extended version)
 
CASE STUDY ANALYSIS ON PROGRESSIVE
CASE STUDY ANALYSIS ON PROGRESSIVECASE STUDY ANALYSIS ON PROGRESSIVE
CASE STUDY ANALYSIS ON PROGRESSIVE
 
E marketer report on the Mobile media report on latin-america (4)
E marketer  report on the Mobile media report on latin-america (4)E marketer  report on the Mobile media report on latin-america (4)
E marketer report on the Mobile media report on latin-america (4)
 
Madison Consulting & Investments Llc
Madison Consulting & Investments LlcMadison Consulting & Investments Llc
Madison Consulting & Investments Llc
 
Uber targets would-be drunk drivers with latest study
Uber targets would-be drunk drivers with latest studyUber targets would-be drunk drivers with latest study
Uber targets would-be drunk drivers with latest study
 
Industry updates on key mobile trends 2 17 12
Industry updates on key mobile trends 2 17 12Industry updates on key mobile trends 2 17 12
Industry updates on key mobile trends 2 17 12
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Similaire à 2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap

TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINAL
Peggy Lawless
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINAL
Peggy Lawless
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
Blair Gately
 
Privacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionPrivacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and Action
Edelman
 
Ccia internet security presentation fin
Ccia internet security presentation finCcia internet security presentation fin
Ccia internet security presentation fin
Liz Gannes
 
Data Privacy: Implications for market researchers
Data Privacy: Implications for market researchers Data Privacy: Implications for market researchers
Data Privacy: Implications for market researchers
Rommell Montenegro
 

Similaire à 2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap (20)

2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey
 
TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINAL
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINAL
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
 
Privacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionPrivacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and Action
 
Cyber Security Awareness Survey: India
Cyber Security Awareness Survey: IndiaCyber Security Awareness Survey: India
Cyber Security Awareness Survey: India
 
Moving beyond passwords - Consumer attitudes on online authentication
Moving beyond passwords - Consumer attitudes on online authenticationMoving beyond passwords - Consumer attitudes on online authentication
Moving beyond passwords - Consumer attitudes on online authentication
 
Ccia internet security presentation fin
Ccia internet security presentation finCcia internet security presentation fin
Ccia internet security presentation fin
 
2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust
2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust
2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust
 
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSAUS Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
 
Data Privacy: Implications for market researchers
Data Privacy: Implications for market researchers Data Privacy: Implications for market researchers
Data Privacy: Implications for market researchers
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of Trust
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of Trust
 

Plus de Ping Identity

Plus de Ping Identity (20)

Healthcare Patient Experiences Matter
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences Matter
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust Infrastructure
 
Ping’s Technology Partner Program
Ping’s Technology Partner ProgramPing’s Technology Partner Program
Ping’s Technology Partner Program
 
Remote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthRemote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust Growth
 
Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?	Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?
 
Extraordinary Financial Customer Experiences
Extraordinary Financial Customer ExperiencesExtraordinary Financial Customer Experiences
Extraordinary Financial Customer Experiences
 
Extraordinary Retail Customer Experiences
Extraordinary Retail Customer ExperiencesExtraordinary Retail Customer Experiences
Extraordinary Retail Customer Experiences
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
 
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUESLES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
 
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONSATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than Ever
 
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You BuyFishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap

  • 1. CONSUMER ATTITUDES IN A POST-BREACH ERA THE GENERATIONAL GAP UNDER 35 HIGH 53% V E R S U S OVER 55 BRAND TRUST PERSONAL INFORMATION Trust in brands is relatively high feel confident or very confident in online service and application providers’ ability to protect their personal information. FINANCIAL LOSS SPEND TO PROTECT BIOMETRICS LOW 27% Trust in brands is relatively low feel confident or very confident in online service and application providers’ ability to protect their personal information. When it comes to security sentiment and practices, the younger generation and older generation don’t always see eye to eye. A recent consumer survey revealed differences in brand trust, willingness to invest in data protection, biometrics adoption and more. MORE 54% carefree with their sensitive personal information are willing to input their bank information on a website or app. are willing to input their bank information on a website or app. LESS 41% carefree with their sensitive personal information MORE 37% likely to spend more to ensure their personal information is protected are not willing to pay anything to ensure their personal information is never breached. 42% are willing to pay between $1-49 to ensure their personal information is never breached. 42% are not willing to pay more to online services/apps for added security to protect their personal information. LESS 62% likely to spend more to ensure their personal information is protected are not willing to pay anything to ensure their personal information is never breached. 32% are willing to pay between $1-49 to ensure their personal information is never breached. 75% are not willing to pay more to online services/apps for added security to protect their personal information. MORE 41% likely to experience a financial loss as a result of a data breach experienced a financial loss as a result of a breach. experienced a financial loss as a result of a breach. LESS 27% likely to experience a financial loss as a result of a data breach MORE 46% open when it comes to biometrics adoption use biometrics like thumbprint or facial recognition to sign in to online services and apps. use biometrics like thumbprint or facial recognition to sign in to online services and apps. LESS 13% open when it comes to biometrics adoption $ Data based on a MarketCube survey commissioned by Ping Identity. 3,264 consumers in the United States, United Kingdom, France and Germany were surveyed in May 2018. Copyright ©2018 Ping Identity Corporation. All rights reserved. Ping Identity, PingFederate, PingOne, PingAccess, PingID, their respective product marks, the Ping Identity trademark logo, and IDENTIFY are trademarks, or servicemarks of Ping Identity Corporation. All other product and service names mentioned are the trademarks of their respective companies.