Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

4/14/2016
09:55 AM
50%
50%

RAND Survey Shows Breaches Have Little Impact On Customer Loyalty

Only 11% of US adults who received a breach notification were likely to quit doing business with the hacked company, study finds.

New research from RAND Corp reveals that over 25% of American adults were notified in the past twelve months that their personal information had been breached. And only 11% of them say they are unlikely to do business with the breached company again.   

The survey of 2,038 adults was conducted to determine the number of occurrences of data breach notifications, consumer reactions towards data loss, and company practices in responding to such occurrences.

According to the findings, people with higher-income and better education had been notified of a data breach exposing their personal information -- more than senior citizens and younger adults in the age group of 18–34. More than three-fourths say they were satisfied with the company’s response to the breach.

“While data breaches have become an alarmingly common part of American life, most people appear satisfied with companies’ responses to data breaches and few decide to take their business elsewhere. It’s unclear whether this response will induce companies to improve their breach notification practices,” said Lillian Ablon, the lead author of the study.

Some 44% of the US adults who recalled receiving a notification at some point say they had already learned of the breach from third party sources other than the hacked company, and 10% said they could find out the breach event themselves.

See the complete research study here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11494
PUBLISHED: 2020-04-02
An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.
CVE-2020-7619
PUBLISHED: 2020-04-02
get-git-data through 1.3.1 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the arguments provided to get-git-data.
CVE-2020-7620
PUBLISHED: 2020-04-02
pomelo-monitor through 0.3.7 is vulnerable to Command Injection.It allows injection of arbitrary commands as part of 'pomelo-monitor' params.
CVE-2020-7621
PUBLISHED: 2020-04-02
strong-nginx-controller through 1.0.2 is vulnerable to Command Injection. It allows execution of arbitrary command as part of the '_nginxCmd()' function.
CVE-2020-7623
PUBLISHED: 2020-04-02
jscover through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary command via the source argument.