Experian Cybersecurity Survey

22
1 EDELMAN BERLAND Experian Cybersecurity Survey September 2014

description

Lack of passwords, use of public Wi-Fi lead consumer cyber security risks. New survey from Experian's ProtectMyID® reveals how Americans can take greater control when securing their personal information. The study, conducted by Edelman Berland, reveals areas where consumers’ identities are at the most risk, including electronic devices and online accounts. The findings show that 93 percent of respondents believe that identify theft is a growing problem, yet are not doing enough to address the issue.

Transcript of Experian Cybersecurity Survey

Page 1: Experian Cybersecurity Survey

1

EDELMAN BERLAND

Experian Cybersecurity Survey

September 2014

Page 2: Experian Cybersecurity Survey

2 © Copyright 2014 Daniel J Edelman Inc. Intelligent Engagement

WHO HOW MANY ACCURACY WHEN HOW

Adults Nationwide

(18+)n=1,000

Margin of Error =

± 3.1%

Data Collection Occurred

September 2-5, 2014

Online Survey

RESEARCH OBJECTIVE: To garner media-genic research around consumers’ online behaviors and perceptions

around cybersecurity habits to protect their identities and credit

Research Methodology

Page 3: Experian Cybersecurity Survey

3 © Copyright 2014 Daniel J Edelman Inc. Intelligent Engagement

• Consumers recognize the growing importance of cybersecurity and are concerned that identify theft could impact them in the future

• More than nine in ten respondents agree that identify theft is a growing problem (93%) that people should be more concerned about (90%).

• Consumers overwhelmingly report taking steps to protect their physical and digital information, but 33% still do not feel confident that they are doing enough to protect their identity.

• There are many opportunities for consumers to take greater control in securing their personal information across devices and online accounts

• Three in ten Smartphones are not password protected, and 41% are not enabled for remote tracking and wiping

• Consumers rarely read privacy statements for mobile apps that are linked to their personal data, and very few read privacy policy changes or revise their privacy settings on social networks

• A third of consumers feel comfortable sharing their passwords with others (36%) and close browsers without logging off of their online accounts (32%)

• Most consumers check their bank and credit card statements, but many overlook the value of a credit monitoring service or reviewing their credit reports for errors or suspicious activity

• Among those who have received a notification that their account information has been compromised, 33% report taking advantage of an offer for free credit monitoring

Key Findings

Page 4: Experian Cybersecurity Survey

CYBERSECURITY PERCEPTIONS

Page 5: Experian Cybersecurity Survey

5 © Copyright 2014 Daniel J Edelman Inc. Intelligent Engagement

Identity theft is a growing problem

People should be more concerned about identity theft

I understand what could happen if my identity was stolen

I am concerned that identity theft will affect me in the future

93%

90%

88%

73%

Identity Theft Concerns(Shown: % Agree)

Consumers perceive identity theft as a growing threat and are concerned that it could affect them in the future

Q23-24: How much do you agree or disagree with each of the following statements?

No one would want my iden-tity, theives only want

wealthy people's identities

The chances of having your identity stolen are small

It would be very difficult for a person to steal my identity

I rarely worry about my identity being stolen

71%

68%

58%

51%

Identity Theft Concerns(Shown: % Disagree)

Page 6: Experian Cybersecurity Survey

6 © Copyright 2014 Daniel J Edelman Inc. Intelligent Engagement

Companies that ask for my personally identi-fiable information are responsible for protect-

ing it

I am confident that companies that have my personally identifiable information work to

keep it safe.

Companies are more cyber secure today than they were 12 months ago

87%

70%

62%

Corporate Responsibility in Cybersecurity(Shown: % Agree)

Consumers feel that companies are responsible for protecting their personally identifiable information, but they are not meeting expectations

Q23-24: How much do you agree or disagree with each of the following statements?

Page 7: Experian Cybersecurity Survey

7 © Copyright 2014 Daniel J Edelman Inc. Intelligent Engagement

I take steps to secure my digital information (e.g., privacy settings, passwords, anti-virus software)

I take steps to secure my physical information (e.g., shredding personal documents, storing my Social Security card/number in a secure location)

I am confident that I do enough to protect my identity

It's too much of a hassle to constantly worry about securing my identity

91%

88%

67%

42%

Personal Responsibility in Cybersecurity(Shown: % Agree)

Consumers are taking steps to protect their own identities but many acknowledge that they could do more to secure their personal information

Q23-24: How much do you agree or disagree with each of the following statements?

Page 8: Experian Cybersecurity Survey

DEVICE & ACCOUNT USAGE

Page 9: Experian Cybersecurity Survey

9 © Copyright 2014 Daniel J Edelman Inc. Intelligent Engagement

Q6: On which, if any, of the following mobile devices have you enabled remote tracking and wiping capabilities? (Asked if owned each device)Q7: Which of the following types of devices do you typically use a password to unlock? (Asked if owned each device)Q13: Do you ever do any of the following? Update anti-malware or anti-virus software on a yearly basis

Laptop/Notebook Computer

SmartphoneDesktop

ComputerTablet eReader

Web-connected

gaming console

Standard mobile phone

79% 70% 69% 61% 32% 31% 20%

Password protection, regularly updated malware, and remote wiping capabilities can help secure consumers’ personal devices

Password Protected Devices(Shown: % Use a password to unlock)

56% OF RESPONDENTS UPDATE THEIR

ANTI-MALWARE OR ANTI-VIRUS SOFTWARE ON A YEARLY BASIS

59% OF SMARTPHONE OWNERS AND 39% OF TABLET OWNERS HAVE

ENABLED REMOTE TRACKING AND WIPING CAPABILITIES ON THESE

DEVICES

Page 10: Experian Cybersecurity Survey

10 © Copyright 2014 Daniel J Edelman Inc. Intelligent Engagement

Consumers access online accounts through mobile apps without reading and assessing their privacy policies

50% 50%

35% 33%25%

20% 19% 18% 16%10% 8%

Mobile Account Usage(Shown: % Access online account via

mobile app)

Q10: Which of your online accounts, if any, have you ever accessed through a mobile application or “app” on your smartphone or tablet? (Asked if use each online account; Results shown off total base)Q13: Do you ever do any of the following? Review privacy policies of mobile apps before downloading them

22%OF RESPONDENTS READ MOBILE APP PRIVACY POLICIES

BEFORE DOWNLOADING

THEM

Page 11: Experian Cybersecurity Survey

11 © Copyright 2014 Daniel J Edelman Inc. Intelligent Engagement

14%

50%

31%

4%

Password Variance for Online Accounts

(Shown: % Selected)

I use the same (1) password

I rotate between several passwords

36%OF RESPONDENTS

AND

48%OF MILLENNIALS

FEEL COMFORTABLE SHARING THEIR

PASSWORDS WITH FAMILY MEMBERS OR

FRIENDS

25%OF RESPONDENTS KEEP A WRITTEN

RECORD OF PASSWORDS AND

14%OF RESPONDENTS USE A PASSWORD

MANAGER

Online account users vary their passwords but many use a written or digital management system and feel comfortable disclosing passwords to others

Q12: Which of the following best describes the passwords you use for your online accounts? (Asked if use online accounts, n=966)Q13: Do you ever do any of the following? Keep a written record of my passwords / Use a password managerQ24: To what extent do you agree or disagree with the following statements? I feel comfortable sharing passwords with family members or friends

Page 12: Experian Cybersecurity Survey

12 © Copyright 2014 Daniel J Edelman Inc. Intelligent Engagement

I set the privacy setting to share only certain information

I manage my privacy settings on an ongoing basis

I use the privacy settings already in place

I review the privacy policy every time it gets updated

I have never personally accessed the privacy settings

48%

38%

32%

22%

10%

Privacy Settings on Social Networks(Shown: % Selected) 41%

OF RESPONDENTS REVIEW PRIVACY POLICIES WHEN NOTIFIED OF CHANGES

18%OF RESPONDENTS POST PICTURES CONTAINING

GEOLOCATION INFORMATION

15% OF RESPONDENTS POST

PERSONALLY IDENTIFIABLE INFORMATION

Many social network users personalize their privacy settings but few review policy changes or manage their preferences on an ongoing basis

Q11: Which of the following statements, if any, describe how you use privacy settings on your social network profile(s)? (Asked if use social networks, n=756)Q13: Do you ever do any of the following? Review privacy policies when notified of changes by banks, online accounts, etc. / Post pictures containing geolocation information / Post personally identifiable information to public online accounts

Page 13: Experian Cybersecurity Survey

13 © Copyright 2014 Daniel J Edelman Inc. Intelligent Engagement

Q18: How often do you do each of the following?

75% 68%

31% 30% 29% 22%

17%19%

32% 43% 49%49%

8% 13%37%

27% 22% 29%

Frequency of Financial Monitoring Activities(Shown: % Selected)

Once a month or more Once every 3-6 months Never

Most monitor their bank and credit card statements but credit reports, online account preferences, and privacy settings are not top-of-mind

Page 14: Experian Cybersecurity Survey

ONLINE BEHAVIORS

Page 15: Experian Cybersecurity Survey

15 © Copyright 2014 Daniel J Edelman Inc. Intelligent Engagement

20%

13%

6%

19%

41%

Frequency of Open Wi-Fi Usage

(Shown: % Selected)

Daily Weekly Bi-weekly Monthly Unsure

Consumers are largely unaware of the security of wi-fi connections and ways to protect their personal information when using public wi-fi

19%

41%

25%

16%

Protecting Information on Open Wi-Fi

(Shown: % Use)

VPN Personal firewall None Unsure

Q15: How often do you use an open Wi-fi connection?Q17: Which, if any, of the following do you use while connected to public Wi-Fi in order to protect your personal information? ? (Asked if use open wi-fi connection, n=590)

Page 16: Experian Cybersecurity Survey

16 © Copyright 2014 Daniel J Edelman Inc. Intelligent Engagement

32% OF RESPONDENTS TYPICALLY CLOSE THE BROWSER

WITHOUT LOGGING OUT OF THEIR

ONLINE ACCOUNTS

Surf the web

Log in to personal accounts

Access social media accounts

Make an online purchase

Access bank accounts

Access credit card accounts

76%

66%

46%

26%

21%

17%

Online Activities on Open Wi-Fi Connections(Shown: % Selected)

Open wi-fi connections are used for a variety of online activities that expose consumers’ personally identifiable information

Q16: Which, if any, of the following types of activities do you do while using an open network? (Asked if use open wi-fi connection, n=590)Q9: When you have finished using your online account(s) , which of the following do you do most of the time? (Asked if use online account, n=966)

Page 17: Experian Cybersecurity Survey

17 © Copyright 2014 Daniel J Edelman Inc. Intelligent Engagement

I always check to see if the site is secure

I only do business with “top” or highly-rated sellers

I always go to sites directly

I never shop at retailers that have been in the news with a data breach

I only shop online from larger retailers’ websites

I sometimes shop online while using a public wi-fi connection

47%

45%

43%

21%

19%

13%

Online Shopping Behaviors(Shown: % Selected)

Consumers look for secure websites and highly recognized sellers to protect their personal information when shopping online

Q14: Which of the following, if any, are true of how you shop online?

TYPICAL ONLINE PAYMENT METHOD:

36%DEBIT CARD

45%CREDIT CARD

14%CREDIT CARD DEDICATED

FOR ONLINE SHOPPING ONLY

Page 18: Experian Cybersecurity Survey

DATA BREACHES & IDENTITY THEFT

Page 19: Experian Cybersecurity Survey

19 © Copyright 2014 Daniel J Edelman Inc. Intelligent Engagement

Received notification of compromised account info

Been a victim of credit card fraud

Had an email account hacked

Had a social network account hacked

Had your identity stolen

Been a victim of a phishing scam

Had a bank account hacked

33%

24%

22%

14%

10%

9%

7%

Personal Information Com-promised

(Shown: % Personally experi-enced)

Three in four consumers have had their personal information lost, stolen or otherwise compromised

Lost your purse/wallet

Lost your credit/debit card

Had your purse/wallet stolen

Lost your social security card

Had somebody go through your mail

Lost your medical ID card

22%

19%

16%

11%

10%

6%

Personal Information Lost or Stolen

(Shown: % Personally expe-rienced)

Q19: Which of the following, if any, have ever happened to you?

75% OF

RESPONDENTS HAVE HAD AT LEAST ONE OF

THESE SCENARIOS HAPPEN TO

THEM

Page 20: Experian Cybersecurity Survey

20 © Copyright 2014 Daniel J Edelman Inc. Intelligent Engagement

A third of consumers who received notification of compromised account information signed up for a period of free credit monitoring

The notification letter walked me through what to do

I was offered free credit monitoring and signed up

I changed my personal habits

I cancelled the account

I left it to the company that contacted me to work it out

I contacted the store for additional information

I contacted a credit bureau

I enrolled in credit monitoring on my own

45%

33%

25%

24%

22%

16%

12%

8%

Handling Notification of Compromised Account Information(Shown: % Selected)

Q20: Which of the following describes how the situation was handled? (Asked if received notification of compromised account information, n=330)

Page 21: Experian Cybersecurity Survey

21 © Copyright 2014 Daniel J Edelman Inc. Intelligent Engagement

27%

18%34%

9%

11%

Time Since Identity Theft Occurred

(Shown: % Selected)

Within the past year 1-2 years ago

3-5 years ago 6-10 years ago

More than 10 years ago

A day or less

One or more weeks

Months

Years

Still unresolved

45%

27%

16%

12%

25%

43%

12%

11%

9%

Time to Discover and Resolve Identity Theft

(Shown: % Discovered, % Resolved)

How long it took to restore identity

Q21: How long ago did you experience identity theft? (Asked if victim of identity theft, n=99)Q22: How long… Had the identity theft been going on before you discovered it / Did it take for you to restore your identity? (Asked if victim of identity theft, n=99)

A quarter of identity theft occurred within the past year; most theft took weeks or longer to resolve

Page 22: Experian Cybersecurity Survey

22