Examining the State of Data Privacy

Examining the State of Data Privacy

As a consumer, how concerned are you about the care that businesses give to your data privacy. Very? You aren’t the only one. 87 percent of Americans see their data privacy as a human right.

However, despite these views, most people are far too lax when it comes to their own security. Let’s take a closer look.

Consumers on Businesses and Their Data Practices

In a recent report from advisory firm KPMG, the results of a survey that asked American consumers about their expectations of corporations and the privacy of their collected data were revealed. These results showed a few concerns very clearly, while revealing that not all respondents were fully aware of today’s most pressing cyberattacks.

  • 86 percent of respondents to the survey felt that their data privacy was a rising concern.
  • 70 percent claimed to be “generally familiar” with how companies collect their personal data, while 64 percent were familiar with how it was used and stored, 63 percent say they understand how it is protected, and 57 percent say they know how it is sold.
  • Having said that, 68 percent don’t trust these companies to sell this data ethically, 54 percent don’t trust it will be used ethically, 53 percent don’t feel it will be collected ethically, and 50 percent don’t trust these companies to protect their data sufficiently.
  • Most consumers are concerned about the theft of their social security number, with 83 percent of respondents identifying this concern. Following closely behind come the 69 percent worried about their credit card numbers.
  • Surprisingly, only 16 percent are concerned about the theft of their medical records.

Data Practices Amongst Consumers

While this sounds like a decent start, the survey’s results showed a bit of hypocrisy. Most users agreed that repeating passwords, saving credit card information to a website, and using public Wi-Fi are risky behaviors, but more than 40 percent of them did these things anyways. 61 percent neglected to use all available tools to secure their accounts, as well.

What We Can Learn

It doesn’t matter if it’s your data at stake, or your business’… your highest priority needs to be your security.

In another study, this one conducted by Harvard Business Review Analytic Services, it was shown that almost half—46 percent—of consumers surveyed had stopped doing business with a retailer because of issues with that retailer’s privacy statement.

Are you willing to let half of your client base abandon your business?

It just goes to show that, from the consumer’s perspective, it is our responsibility to make sure that companies are accountable for the data they collect. From the business standpoint, it shows that data security is something that can’t be slapped together or neglected. Is ensuring data security simple? Far from it… but when compared to what you risk otherwise, it’s a no-brainer.

BNMC is here to help. We can help you to implement the security solutions and processes that will help protect all your data. To learn more, or to get started, call our team at 978-482-2020 today.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, September 22 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing User Tips Email Privacy Cloud Network Security Microsoft Efficiency Business Hackers Hosted Solutions Software Computer Malware Data Workplace Tips Communication Google Small Business IT Services Hardware IT Support Mobile Devices Smartphone Cloud Computing Internet Tech Term Data Recovery Managed IT Services Android Users Backup Innovation Mobile Device Ransomware Windows VoIP Phishing Outsourced IT Smartphones Information Upgrade Saving Money Data Backup Disaster Recovery Facebook Miscellaneous Windows 10 communications Network Microsoft Office Browser Cybersecurity Server Business Management Office 365 Social Media Business Continuity Productivity Managed IT Services Windows 10 Passwords Internet of Things Data Management Quick Tips Vulnerability Remote Monitoring Gadgets COVID-19 Apps App Word Gmail Managed Service Money Encryption Chrome Save Money Managed Service Provider Infrastructure Analytics Artificial Intelligence Mobile Office Conferencing BYOD IT Support Employer-Employee Relationship Networking Remote Workers VPN Access Control Paperless Office Settings Information Technology Google Drive Applications Virtual Reality Router Remote Work Collaboration Government Tip of the week Website Company Culture Hacker Data storage Employee-Employer Relationship Display Spam Big Data Operating System WiFi Development IT Management Data Security Robot Business Technology HIPAA Virtual Private Network Bandwidth BDR Automation Content Filtering Unified Threat Management YouTube Education Apple Storage Maintenance Risk Management Firewall Avoiding Downtime Antivirus Document Management Office Tips Computers Managed Services Augmented Reality Solid State Drive Break Fix Wireless MSP Laptop Retail Alert Search Managing Stress The Internet of Things Outlook Training Computing OneNote Hard Disk Drive Data Breach Bring Your Own Device Downtime Vendor Management Social Monitors Windows 7 LiFi Humor Chromebook Software as a Service Hosted Solution Marketing Server Management Best Practice Administration Touchscreen IT Managed IT Social Network Mouse Data loss End of Support How To Mobile Security Tablet Going Green Telephone Systems Remote Computing desktop Compliance Business Intelligence iOS SaaS Printing Two-factor Authentication Wi-Fi Managed IT Service Password Holiday Regulations Virtualization Customer Relationship Management Scam Computer Care Mirgation IBM Recycling Virtual Desktop Dark Data Update Utility Computing File Sharing IoT Sports Heating/Cooling Multi-Factor Security Updates Inventory K-12 Schools Device Reducing Cost Battery Mobile Device Management Cookies Time Management Printer Mixed Reality Asset Management Deep Learning Politics LED Black Friday Threats Peripheral Identity Theft Social Networking Migration Consulting Computing Infrastructure Professional Services Shadow IT Alt Codes Chatbots Corporate Profile eWaste Customer Service Emergency Laptops Star Wars Work/Life Balance Servers PowerPoint Google Calendar G Suite Wearable Technology Network upgrade Health Private Cloud Mobility Dark Web Batteries Files Automobile Nanotechnology Office Samsung Network Management Memes Tech Support Co-Managed IT Cyber Monday Management Motherboard Cables Cybercrime Budget Alerts Dell USB Gamification Typing Identity WannaCry Continuity Managed Services Provider Fraud Cabling Cost Management Onboarding Legislation GDPR Smart Office Print Toner Microsoft Excel Myths RMM Current Events Google Maps Screen Reader Charging Social Engineering Slack SharePoint Hard Disk Drives Websites Content Smart Technology Huawei Policy Wires Twitter Techology Messaging Licensing Dongle Cryptocurrency Solar Lenovo Entertainment Vendor Assessment Statistics Digital Signage Data Warehouse Google Docs Work Mail Merge Shortcuts Blockchain Mobile Management Banking IT solutions Smart Tech Halloween Safety Monitoring Downloads Solid State Drives Holidays Shortcut Streaming Distributed Denial of Service Processor Procedure Hacks Digital Payment Voice over Internet Protocol VoIP Unified Threat Management Employee-Employer Relationships Distribution Cooperation Service Level Agreement Comparison Business Analysis Bitcoin Digital Network Congestion Firefox Superfish Hybrid Cloud Google Wallet Meetings Hotspot Disaster Internet Exlporer Bluetooth Troubleshooting Business Growth IT Technicians Optimization Address Security Cameras Permissions Profiles Connectivity Scary Stories Spying National Security Payment Card Leominster Patch Management Human Error Memory PCI DSS Modem FinTech Running Cable Writing Analysis User Error Students Logistics Legal Staff Specifications Virus Windows 8 Spyware Scalability Unified Communications Drones Language Uninterrupted Power Supply Value Buisness Computer Repair Relocation Error Mobile Data Point of Sale Ben McDonald shares Recovery Travel How To Mobile Computing Financial Supercomputer CrashOverride Black Market Staffing Motion Sickness Law Enforcement Taxes Electronic Medical Records Administrator Notifications Physical Security IT Budget Web Server what was your? GPS Emoji Upgrades Gadget IT Consultant Regulation Crowdsourcing Personal Information Botnet Cameras Tracking Cortana 3D Printing Cleaning Machine Learning Processors CCTV Printers Webcam Unsupported Software

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3