SlideShare a Scribd company logo
© 2019 4iQ.com All rights reserved.© 2019 4iQ.com. All rights reserved.
2019 Identity Protection and Data Breaches Survey
1
© 2019 4iQ.com All rights reserved.© 2019 4iQ.com. All rights reserved.
4iQ recently surveyed over 2,300 U.S. adults on their
perceptions of data breaches and how they are personally
impacted, what kind of assistance they received in its
wake, and how prepared they are at protecting their own
personally identifiable information (PII).
2
© 2019 4iQ.com All rights reserved.
STOLEN PERSONALLY IDENTIFIABLE INFORMATION (PII)?
Nearly half of
respondents have been
notified that their PII was
stolen.
3
© 2019 4iQ.com All rights reserved.
OFFER & ENROLLMENT IN IDENTITY PROTECTION SERVICES
Among the victims, 84% were
offered identity protection
services.
More than half did not enroll in
credit monitoring services
offered by companies.
4
© 2019 4iQ.com All rights reserved.
IDENTITY PROTECTION SERVICES STICKINESS
38% respondents canceled
identity theft protection
services.
Out of which, 42% did not
see the value in continuing
credit monitoring services
after a breach.
5
11%
6%
42%
16%
13%
12%
© 2019 4iQ.com All rights reserved.
IS ID PROTECTION SERVICES A SUFFICIENT RESPONSE?
Audiences are split on
whether offering data
protection services is a
sufficient response to loss
of PII.
6
© 2019 4iQ.com All rights reserved.
However, younger
respondents
consider the offer
of Identity
Protection Services
a sufficient
response to a data
breach.
POST-MILLENNIALS
& MILLENNIALS
GENERATION X
BABY-BOOMERS
7
ID PROTECTION SERVICES, A SUFFICIENT RESPONSE BY AGE
© 2019 4iQ.com All rights reserved.
ARE YOU EFFECTIVE IN PROTECTING YOUR PII
70% believe they
are effective or
very effective at
protecting their PII.
8
© 2019 4iQ.com All rights reserved.
VICTIM OF FRAUD?
37% of individuals believe
they have been a victim of
fraud as a result of a
cybercrime incident
9
© 2019 4iQ.com All rights reserved.
PII IN THE HANDS OF CYBER CRIMINALS?
55% of respondents thinks
it’s likely that their PII is in
the “Hands of Criminals”
10
© 2019 4iQ.com All rights reserved.
CONCERNED ABOUT FUTURE FRAUD
63% of respondents are concerned that their identity could be used by someone
to commit fraud.
4% 33 % 46 % 17 %
Not at all concerned Not very concerned Concerned Very concerned
How *concerned* are you that your identity could be used by someone else to commit fraud
by leveraging your PII?
11
© 2019 4iQ.com All rights reserved.
SECURITY ERRORS AND EMPLOYMENT STATUS
More than half said they would expect their own online security error to
negatively or very negatively affect their standing with their employer.
Some - 28%
High - 24%
Very High - 23%
What level of impact upon your employment would you
expect from your employer if a mistake you make with
online security (i.e. password reuse, clicking on suspicious
links, downloading malware) creates a
pathway to access your employer’s systems?
No - 25%
IMPACT
12
© 2019 4iQ.com All rights reserved.
HOW EFFECTIVE IS YOUR EMPLOYER AT PROTECTING YOUR PII?
74% believe their
employers are effective or
very effective at protecting
their PII.
13
© 2019 4iQ.com All rights reserved.
LEVEL OF EMPLOYER’S RESPONSE
Over half of the
respondents believe their
employers’ would have a
significant response.
14
LEVELS DESCRIPTION
Significant
Security upgrades, proactive communications, identity
protection services offered.
Medium Security upgrades, proactive communications.
Low Minimal communications, security upgrades
Very Low
Reactive-only communications, no significant security
upgrades
© 2019 4iQ.com All rights reserved.
STANDARD EMPLOYMENT BACKGROUND CHECKS?
58% believe standard
employment background
checks should also check
for whether employees’
personally identifiable
information has been stolen
prior.
15
%
© 2019 4iQ.com All rights reserved.
“BLAME THE VICTIM” IN CYBERCRIME
60% of respondents believe there’s a “blame-the-victim”
problem with cybercrime.
No - 25%
16
© 2019 4iQ.com All rights reserved.
CURRENT LAWS INCLINATION WITH CYBERCRIME
71% of respondents
think the current laws
favor employers more
than employees.No - 25%
17
© 2019 4iQ.com All rights reserved.
GOVERNMENT PROTECTING YOUR PII
Only 42% respondents
believe government is
effective or very effective
at protecting their PII.
18
51%
© 2019 4iQ.com All rights reserved.
LEVEL OF GOVERNMENT RESPONSE
Over half of the
respondents expect
significant response from
government.
19
LEVELS DESCRIPTION
Significant
Security upgrades, proactive communications, identity
protection services offered.
Medium Security upgrades, proactive communications.
Low Minimal communications, security upgrades
Very Low
Reactive-only communications, no significant security
upgrades
© 2019 4iQ.com All rights reserved.
SURVEY AUDIENCE WORK INDUSTRIES
No - 25%
20
© 2019 4iQ.com All rights reserved.
SURVEY AUDIENCE AGE
No - 25%
21
© 2019 4iQ.com All rights reserved.
SURVEY AUDIENCE REGION
No - 25%
22
© 2019 4iQ.com All rights reserved.
SURVEY AUDIENCE GENDER
23
© 2019 4iQ.com All rights reserved.
ABOUT SURVEY
24
Results are based on a survey conducted through the use of an online research platform. The survey was
administered to 2,300 U.S. Adults 18+ in August 2019. Results were weighted for age within gender,
region, race/ethnicity, education, and income, where necessary to align them with their actual
proportions in the population.
info@4iq.com
© 2019 4iQ.com All rights reserved.© 2019 4iQ.com. All rights reserved.
IDTheft™ IDHunt
Identity Theft Protection Identity Intelligence &
Attribution Analysis.
25
4iQ IDLake™ is the world’s largest repository of
curated, breached identity records.
www.4iq.com

More Related Content

What's hot

Criminal Alert Notice (myPay)
Criminal Alert Notice (myPay)Criminal Alert Notice (myPay)
Criminal Alert Notice (myPay)
U.S. Army Garrison Red Cloud and Area I
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
SecureAuth
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
Symantec
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economy
Mark Albala
 
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Money 2Conf
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
Christopher Papazian
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
Mark Albala
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
- Mark - Fullbright
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
Ipsos UK
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
Distil Networks
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
Teo Leonard
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
Chukwunonso Okoro, CFE, CAMS, CRISC
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!
Narayan Makaram
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Kevin Duffey
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
Guise Bule
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
Ainsha Noordin (Umie)
 
Unisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: Netherlands
Unisys Corporation
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
Entersoft Security
 
TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINAL
Peggy Lawless
 

What's hot (20)

Criminal Alert Notice (myPay)
Criminal Alert Notice (myPay)Criminal Alert Notice (myPay)
Criminal Alert Notice (myPay)
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economy
 
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
Unisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: Netherlands
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINAL
 

Similar to 2019 Identity Protection and Data Breaches Survey

2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
Ping Identity
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
CynergisTek, Inc.
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
Silicon Valley Bank
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
FinTech Belgium
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
Lorena Magee
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
Silicon Valley Bank
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | Infographic
Ping Identity
 
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
EY
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
FERMA
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
Symantec
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
Blair Gately
 
Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19
Kyriba Corporation
 
Driving Payments Security and Efficiency During COVID-19
Driving Payments Security and Efficiency During COVID-19Driving Payments Security and Efficiency During COVID-19
Driving Payments Security and Efficiency During COVID-19
Kyriba Corporation
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
TransUnion
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
Glenn E. Davis
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
Don Grauel
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
Imperva
 
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
Capgemini
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
Jeremiah Grossman
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
Accenture Insurance
 

Similar to 2019 Identity Protection and Data Breaches Survey (20)

2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | Infographic
 
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19
 
Driving Payments Security and Efficiency During COVID-19
Driving Payments Security and Efficiency During COVID-19Driving Payments Security and Efficiency During COVID-19
Driving Payments Security and Efficiency During COVID-19
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 

Recently uploaded

How GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdfHow GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdf
Zycus
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
Penify - Let AI do the Documentation, you write the Code.
Penify - Let AI do the Documentation, you write the Code.Penify - Let AI do the Documentation, you write the Code.
Penify - Let AI do the Documentation, you write the Code.
KrishnaveniMohan1
 
Optimizing Your E-commerce with WooCommerce.pptx
Optimizing Your E-commerce with WooCommerce.pptxOptimizing Your E-commerce with WooCommerce.pptx
Optimizing Your E-commerce with WooCommerce.pptx
WebConnect Pvt Ltd
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
ervikas4
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery FleetStork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Vince Scalabrino
 
The Role of DevOps in Digital Transformation.pdf
The Role of DevOps in Digital Transformation.pdfThe Role of DevOps in Digital Transformation.pdf
The Role of DevOps in Digital Transformation.pdf
mohitd6
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
Maitrey Patel
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
dakas1
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...
Paul Brebner
 
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
campbellclarkson
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
kgyxske
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
Jhone kinadey
 
The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024
Yara Milbes
 
ppt on the brain chip neuralink.pptx
ppt  on   the brain  chip neuralink.pptxppt  on   the brain  chip neuralink.pptx
ppt on the brain chip neuralink.pptx
Reetu63
 
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdfThe Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
kalichargn70th171
 
What is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdfWhat is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdf
kalichargn70th171
 
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
kalichargn70th171
 

Recently uploaded (20)

How GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdfHow GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdf
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
Penify - Let AI do the Documentation, you write the Code.
Penify - Let AI do the Documentation, you write the Code.Penify - Let AI do the Documentation, you write the Code.
Penify - Let AI do the Documentation, you write the Code.
 
Optimizing Your E-commerce with WooCommerce.pptx
Optimizing Your E-commerce with WooCommerce.pptxOptimizing Your E-commerce with WooCommerce.pptx
Optimizing Your E-commerce with WooCommerce.pptx
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery FleetStork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
 
The Role of DevOps in Digital Transformation.pdf
The Role of DevOps in Digital Transformation.pdfThe Role of DevOps in Digital Transformation.pdf
The Role of DevOps in Digital Transformation.pdf
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...
 
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
 
The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024
 
ppt on the brain chip neuralink.pptx
ppt  on   the brain  chip neuralink.pptxppt  on   the brain  chip neuralink.pptx
ppt on the brain chip neuralink.pptx
 
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdfThe Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
 
What is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdfWhat is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdf
 
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
 

2019 Identity Protection and Data Breaches Survey

  • 1. © 2019 4iQ.com All rights reserved.© 2019 4iQ.com. All rights reserved. 2019 Identity Protection and Data Breaches Survey 1
  • 2. © 2019 4iQ.com All rights reserved.© 2019 4iQ.com. All rights reserved. 4iQ recently surveyed over 2,300 U.S. adults on their perceptions of data breaches and how they are personally impacted, what kind of assistance they received in its wake, and how prepared they are at protecting their own personally identifiable information (PII). 2
  • 3. © 2019 4iQ.com All rights reserved. STOLEN PERSONALLY IDENTIFIABLE INFORMATION (PII)? Nearly half of respondents have been notified that their PII was stolen. 3
  • 4. © 2019 4iQ.com All rights reserved. OFFER & ENROLLMENT IN IDENTITY PROTECTION SERVICES Among the victims, 84% were offered identity protection services. More than half did not enroll in credit monitoring services offered by companies. 4
  • 5. © 2019 4iQ.com All rights reserved. IDENTITY PROTECTION SERVICES STICKINESS 38% respondents canceled identity theft protection services. Out of which, 42% did not see the value in continuing credit monitoring services after a breach. 5 11% 6% 42% 16% 13% 12%
  • 6. © 2019 4iQ.com All rights reserved. IS ID PROTECTION SERVICES A SUFFICIENT RESPONSE? Audiences are split on whether offering data protection services is a sufficient response to loss of PII. 6
  • 7. © 2019 4iQ.com All rights reserved. However, younger respondents consider the offer of Identity Protection Services a sufficient response to a data breach. POST-MILLENNIALS & MILLENNIALS GENERATION X BABY-BOOMERS 7 ID PROTECTION SERVICES, A SUFFICIENT RESPONSE BY AGE
  • 8. © 2019 4iQ.com All rights reserved. ARE YOU EFFECTIVE IN PROTECTING YOUR PII 70% believe they are effective or very effective at protecting their PII. 8
  • 9. © 2019 4iQ.com All rights reserved. VICTIM OF FRAUD? 37% of individuals believe they have been a victim of fraud as a result of a cybercrime incident 9
  • 10. © 2019 4iQ.com All rights reserved. PII IN THE HANDS OF CYBER CRIMINALS? 55% of respondents thinks it’s likely that their PII is in the “Hands of Criminals” 10
  • 11. © 2019 4iQ.com All rights reserved. CONCERNED ABOUT FUTURE FRAUD 63% of respondents are concerned that their identity could be used by someone to commit fraud. 4% 33 % 46 % 17 % Not at all concerned Not very concerned Concerned Very concerned How *concerned* are you that your identity could be used by someone else to commit fraud by leveraging your PII? 11
  • 12. © 2019 4iQ.com All rights reserved. SECURITY ERRORS AND EMPLOYMENT STATUS More than half said they would expect their own online security error to negatively or very negatively affect their standing with their employer. Some - 28% High - 24% Very High - 23% What level of impact upon your employment would you expect from your employer if a mistake you make with online security (i.e. password reuse, clicking on suspicious links, downloading malware) creates a pathway to access your employer’s systems? No - 25% IMPACT 12
  • 13. © 2019 4iQ.com All rights reserved. HOW EFFECTIVE IS YOUR EMPLOYER AT PROTECTING YOUR PII? 74% believe their employers are effective or very effective at protecting their PII. 13
  • 14. © 2019 4iQ.com All rights reserved. LEVEL OF EMPLOYER’S RESPONSE Over half of the respondents believe their employers’ would have a significant response. 14 LEVELS DESCRIPTION Significant Security upgrades, proactive communications, identity protection services offered. Medium Security upgrades, proactive communications. Low Minimal communications, security upgrades Very Low Reactive-only communications, no significant security upgrades
  • 15. © 2019 4iQ.com All rights reserved. STANDARD EMPLOYMENT BACKGROUND CHECKS? 58% believe standard employment background checks should also check for whether employees’ personally identifiable information has been stolen prior. 15 %
  • 16. © 2019 4iQ.com All rights reserved. “BLAME THE VICTIM” IN CYBERCRIME 60% of respondents believe there’s a “blame-the-victim” problem with cybercrime. No - 25% 16
  • 17. © 2019 4iQ.com All rights reserved. CURRENT LAWS INCLINATION WITH CYBERCRIME 71% of respondents think the current laws favor employers more than employees.No - 25% 17
  • 18. © 2019 4iQ.com All rights reserved. GOVERNMENT PROTECTING YOUR PII Only 42% respondents believe government is effective or very effective at protecting their PII. 18 51%
  • 19. © 2019 4iQ.com All rights reserved. LEVEL OF GOVERNMENT RESPONSE Over half of the respondents expect significant response from government. 19 LEVELS DESCRIPTION Significant Security upgrades, proactive communications, identity protection services offered. Medium Security upgrades, proactive communications. Low Minimal communications, security upgrades Very Low Reactive-only communications, no significant security upgrades
  • 20. © 2019 4iQ.com All rights reserved. SURVEY AUDIENCE WORK INDUSTRIES No - 25% 20
  • 21. © 2019 4iQ.com All rights reserved. SURVEY AUDIENCE AGE No - 25% 21
  • 22. © 2019 4iQ.com All rights reserved. SURVEY AUDIENCE REGION No - 25% 22
  • 23. © 2019 4iQ.com All rights reserved. SURVEY AUDIENCE GENDER 23
  • 24. © 2019 4iQ.com All rights reserved. ABOUT SURVEY 24 Results are based on a survey conducted through the use of an online research platform. The survey was administered to 2,300 U.S. Adults 18+ in August 2019. Results were weighted for age within gender, region, race/ethnicity, education, and income, where necessary to align them with their actual proportions in the population. info@4iq.com
  • 25. © 2019 4iQ.com All rights reserved.© 2019 4iQ.com. All rights reserved. IDTheft™ IDHunt Identity Theft Protection Identity Intelligence & Attribution Analysis. 25 4iQ IDLake™ is the world’s largest repository of curated, breached identity records. www.4iq.com