• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Retail/Manufacturing  /  How consumers see privacy and cyber risks?
Consumer security and privacy
05 January 2018

How consumers see privacy and cyber risks?

Written by Seqrite
Seqrite
Cybersecurity, Retail/Manufacturing
  • 3
    Shares
Estimated reading time: 3 minutes

There is a general perception that modern-day consumers, while being savvy on all digital and social media platforms, don’t give a lot of thought to internet security. As it turns out though, that is just a perception. The reality is quite starkly different.

A recent survey of over 2,000 Americans in 2017 by PricewaterhouseCoopers threw up some important insights. The year 2017 saw the news cycle dominated by reports of security breaches and that certainly seems to have left an impression. Around 45% of the respondents of the survey believed their email or social media accounts were at risk of getting hacked and even worryingly only 25% of respondents believed that companies handled their sensitive personal data responsibly. A whopping 92% felt that companies needed to be proactive about data protection.

Asking tough questions

Data may be the new oil in an increasingly connected world but as the survey results shown, the end-users are getting more and more uncomfortable with sharing this personal data. There is some justification for it as well – with a plethora of big data breaches over the last year and privacy becoming a hot buzzword, consumers are asking tough questions about how their data is being used.

How do companies deal with this ever-growing spotlight? Among the major calls to action recommended, understanding customers’ concerns about cybersecurity is a key point. For that, the key is to understand the customer and be there for them when they most require it. Recently, Seqrite Cyber Intelligence Labs proactively identified and rectified a case where Chrome browser extensions were being increasingly targeted by attackers. Clean code from legitimate extensions was copied in the malicious code along with the malicious content.

Staying transparent in the digital era

The blog post published provided detailed, helpful information about the vulnerability, the solution and steps to prevent it. Due background of the case was provided with an explanation of technical terms, i.e.: BHO (Brower Helper Object), API (Application Programming Interface). A detailed technical analysis was also conducted with a simple, easy-to-follow safety advisory for end users.  These are the steps towards empowering consumers – keeping them in the loop about the latest trends in cybersecurity and informing them on the steps to avoid pitfalls.

While understanding customer concerns is obviously a first step, it is also as crucial for businesses truly invested in their customers to assure them that they care about these concerns and assuage them with correct actions. Seqrite actively monitors existential threats and updates its database continuously based on any new threats, but it just doesn’t end there. To ensure that a wider user base also remains updated, new threats are analyzed and posted on the blog, leading to wiser dissemination. During the major outbreak of WannaCry in 2017, an advisory was issued to all customers, showcasing timely, appropriate action on the part of the company.

Ultimately, the rise of new technologies also leads to some concern among consumers. In the PWC survey mentioned earlier, 55% of consumers saw Artificial Intelligence and the Internet of Things as a potential threat to their privacy. Other technologies like Virtual Reality, Artificial Reality and Bitcoin had respectively 32%, 35% and 40% of users worried about them.

Organizations can deal with these threats by offering comprehensive solutions to tackle these threats and provide confidence to the user. Solutions like Seqrite’s Endpoint Security (EPS)and Unified Threat Management (UTM) validate trust and offer multiple security features that takes care of every organizational aspect.

What do customers want?

Ultimately, customers are not asking for something impossible – all they want is to be control of their data with businesses providing complete transparency about how they are using it. Data breaches obviously make for bad publicity but businesses make the situation worse if they try and hide the consequences of the breach. It would be much better to come out and own up to what has happened rather than frustrating customers by being deceptive about it. It’s not that consumers won’t share data but it depends on how much they trust the business that will use that data. And if businesses can deliver a trustful experience, consumers will hop on, despite any cybersecurity threats that crop up.

As an IT security partner for your business, Seqrite provides comprehensive endpoint security from advanced cyber threats. To know more, visit our website or

seqrite_cta1

 Previous PostWhat are the major ingredients of cybersecurity in 2018?
Next Post  What do we need to know about the CPU vulnerabilities Meltdown an...
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Turn the Page Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Building a holistic cybersecurity strategy to safeguard the pharma sector

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021
  • Data breach volumes worry governments and businesses

    The Data breach inferno burning big-ticket businesses

    February 5, 2021

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021
  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.