New Zealanders believe telecommunications companies, government agencies and banks are more likely to suffer an accidental or malicious breach of their personal data in the next 12 months than other types of organisations, according to a survey by Unisys. The majority of respondents, however, say a data breach is not likely at an airline, healthcare provider or utility company such as a power or water supplier. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe These are among the key findings of the latest Unisys Security Insight, a global study on the attitudes of consumers on a range of security issues. In New Zealand, the study was conducted by Newspoll and covered 503 adults in April 2015. The survey asked consumers in 12 countries about the likelihood that their personal data held by seven types of organisations (airlines, banking/finance, government, healthcare, retail, telecom, and utilities) would be accessed by an unauthorised person, accidentally or deliberately, in the next year. Across the region, telcos are the least trusted by Australians (58 per cent), New Zealanders (53 per cent), and Malaysians (52 per cent) to protect personal data. The survey finds a high expectation of a data breach by government in the next 12 months in all three countries: Australia (49 per cent), New Zealand (51 per cent) and Malaysia (46 per cent) Kiwis, meanwhile, trust banks the least with 50 per cent expecting a breach, compared to 35 per cent in Malaysia and 46 per cent in Australia. There is, however, a high trust in airlines to protect personal data in all three countries. ‘Trust must be earned’ “This survey reveals which organisations Kiwis don’t trust to protect their personal information,” says Steve Griffin, country manager, Unisys New Zealand. “Consumer trust must be earned. To build public confidence, an organisation needs to not only take preventative measures, but also communicate to their target customers that they have taken those measures. Such an investment can offer a competitive advantage between brands within a category.” “Many Kiwis have experienced a data breach or have seen media reports of breaches by telcos, government and banks, so they expect data breaches in those organisations. However, telcos and government would do well to learn from the way banks quickly communicate breaches to their customers to minimise the impact and rebuild confidence,” adds Griffin. While airlines are the most trusted type of organisation by Kiwis, they will need to work to maintain this trust as they continue to capture more and more information about their passengers, says Griffin. Griffin points out majority of Kiwis (80 per cent) in the 2011 survey said they would stop dealing with an organisation if their data was breached. “This highlights that public confidence in an organisation’s ability to protect data needs to be a business priority, not a mere IT issue.” Security amidst hyperconnectivity The survey suggests that consumers are concerned about their personal data collected, used and held by organisations, says Unisys. “With an ever increasing hyper-connectivity of consumers across various digital platforms, the traditional mechanisms to protect sensitive personal data against advanced attacks are proving to be insufficient.” Steve Griffin at the 2015 CIO100 event in Auckland.This highlights that public confidence in an organisation’s ability to protect data needs to be a business priority, not a mere IT issue. Steve Griffin, Unisys It lists some ways to protect against advanced attacks and accidental data disclosures: Converged physical and logical security approach: Enterprises should seek ways to solve critical challenges at the point of convergence. Such measures help integrate sensors, consolidate data, provide central or dispersed command and control, use the identity information, and support real-time as well as offline analytics. Biometrics for superior authentication: A robust security strategy incorporates multifactor authentication methods that provide assurance. The authentication can be provided via various biometric techniques like face recognition, DNA matching, fingerprints, voice recognition and vein structure in hands. Isolation and compartmentalisation for data protection: Protecting sensitive information from unauthorised access is the core objective for any security strategy. This typically involves two key activities of identifying the scope of data protection task, and isolating the people, processes and technologies that interact with the sensitive data. Data isolation is achieved by using access controls and encryption to ensure only authorised systems and users can access sensitive information. Finally, Unisys calls for a “comprehensive security strategy” that includes predictive, preventive, detective and retrospective capabilities. Source: Unisys Security Insights New Zealand 2015 Send news tips and comments to divina_paredes@idg.co.nz Follow Divina Paredes on Twitter: @divinap Follow CIO New Zealand on Twitter:@cio_nz Sign up for CIO newsletters for regular updates on CIO news, views and events. Join us on Facebook. Related content news analysis Skilled IT pay defined by volatility, security, and AI Foote Partners’ Q3 report on IT skills pay trends show AI and security skills were in high demand, and the value of cash-pay premiums was more volatile but their average value across a broad range of IT skills and certifications was slightly do By Peter Sayer Oct 04, 2023 6 mins Certifications Technology Industry IT Skills feature 4 reasons why gen AI projects fail Data issues are still among the chief reasons why AI projects fall short of expectations, but the advent of generative AI has added a few new twists. By Maria Korolov Oct 04, 2023 9 mins Data Science Data Science Data Science feature What a quarter century of digital transformation at PayPal looks like Currently processing a volume of payments worth over $1.3 trillion, PayPal has repeatedly staked its claim as a digital success story over the last 25 years. But insiders agree this growth needs to be constantly supported by reliable technological ar By Nuria Cordon Oct 04, 2023 7 mins Payment Systems Digital Transformation Innovation brandpost Future-Proofing Your Business with Hyperautomation By Veronica Lew Oct 03, 2023 7 mins Robotic Process Automation Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe