The Impact of Recent Breaches on Consumer Preferences and Behaviors

The Impact of Recent Breaches on Consumer Preferences and Behaviors

If and how high-profile breaches have shifted the preferences and behaviors of U.S. consumers

In the wake of numerous high-profile data breaches and privacy incidents, consumers are more aware and concerned than ever about the security of their identity information and what companies are doing to keep it safe. This creates new requirements related to identity assurance, generating both challenges and opportunities for businesses.

This year, identity verification solutions provider IDology initiated a study to uncover if and how high-profile breaches have shifted the preferences and behaviors of U.S. consumers. The results show a strong need for bi-directional trust between consumers and businesses: consumers must trust that businesses will protect them and businesses must trust that they’re dealing with legitimate consumers.

Christina Luttrell, senior vice president of operations including product management, client solutions and marketing shares the study’s key findings:

Q: Have recent breaches increased consumer concern?

A: Yes, according to the data, high profile breaches and stories related to privacy and personal experiences have fundamentally changed the collective American anxiety related to the safety of personal information. The study shows that 57 percent of American consumers are more concerned about the security of their personal information than compared to a year ago. Furthermore, 83 percent express moderate to extreme concern that their personal information could be used by a criminal to open a fraudulent account. Interestingly this extends to mobile devices as well – 76 percent of consumers have moderate to extreme unease that their personal information will be compromised from their mobile phones.

This higher level of distress manifests itself in consumer preferences. For example, security is found to be more important than speed during the account opening process. Consumer desire for, and perception of, identity verification and security processes have reached a turning point. Consumers want assurance that when they open or access an account, the process is safe and their data is protected.

Q: Do consumers prefer certain methods of identity verification and authentication?

A: Biometrics, Knowledge Based Authentication (KBA) questions and one-time passcodes are the top three digital identification methods American consumers believe to be the most secure. This is primarily due to familiarity and comfort level with these methods, given that they are also the most widely used. However, consumers don’t appear to be as familiar with the difference between the methods. For example, KBA questions can be either static or dynamic. While static KBA questions are selected by the consumer and stored by a company for use later, dynamic KBA questions can be generated from credit bureau or demographic data such as, “how much is your monthly mortgage payment?” There are also significant differences and preferences between the data sources and thus types of questions that are served up. By a margin of two-to-one, consumers prefer demographic questions compared to credit based questions which tend to be harder to answer.

Identity verification isn’t a one size fits all and in reality, there are pros and cons for each method, as well as ideal scenarios for when one method makes sense over another. Companies should have an array of verification and authentication tools at their disposal so they can determine the best method for the interaction.

Q: Are consumers placing the same level of responsibility for protecting their information on companies as they do on themselves?

A: An interesting gap in trust has emerged. Sixty-seven percent of consumers place a higher level of responsibility on companies to protect their personal information, yet they don’t have much confidence in businesses, government agencies or credit bureaus to actually do it. For example, 20 percent reported to have no confidence in trusting businesses to protect their data.

Closing this gap requires the right formula of low friction, or frictionless, customer experiences and messaging about the importance a business places on protecting customer data. Sharing the steps taken to ensure interactions are secure is one way businesses can put the consumer at ease and give them confidence that their data is safe.

Q: With all the concern people express about the security of their information, are they doing anything different to safeguard their identities?

A: Unfortunately, consumers aren’t doing enough. In fact, the data indicates a great deal of room for improvement. Among consumers who have been notified that their personal data was comprised, 20 percent took no action. Only 13 percent placed a freeze on their credit and only 19 percent enabled 2FA (two of the most effective steps to take after a breach). Even worse, only 40 percent took the most basic recommended action after a breach and changed their passwords. One reason could be that consumers don’t know what they need to do, as different types of breaches require different actions and countermeasures be taken to stay secure.

On top of this, most consumers fail to follow best practices for passwords. When asked how often they change their passwords, 76 percent said once a year or less, while one in six admitted they never change their passwords unless they’re forced. To make matters worse, 44 percent remember passwords by writing them down and only 14 percent use a password manager. Consumers can and should do more to protect their data. Educating and promoting safer credentialing methods is everyone’s job.

Q: What factors are behind increased concern around mobile device security?

A: Mobile devices have become the center of our lives – from commerce to banking and establishing credentials - so of course, it’s a rising fraud vector. Smartphones are increasingly used as identity verification and authentication tokens and 42 percent consider their mobile phone number to be an important part of their identity. One of the most interesting findings of the study is the number of mobile change events that occur and their impact on mobile fraud. Our data showed more than half of consumers experience some sort of mobile change event, whether they purchased a new phone, changed providers or had their device lost or stolen. These change events naturally open the door for fraud. Mitigating this risk should be a top priority for companies. Authentication that leverages a direct connection to mobile carriers to authenticate consumers and their devices based on real-time data is the most effective way to reduce risk.

To view the full study, visit https://www.idology.com/blog/a-new-era-in-identity-verification-privacy-and-trust/.

Featured

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.