Welcome!

Blog Feed Post

86% of customers would shun brands following a data breach

If credit card details are compromised, shoppers will not return to do business

Surrey, 27 March 2014 - New research commissioned by Semafone® has revealed that the overwhelming majority of people would not do business with a company that had failed to protect its customers' card data. In the survey, conducted by OnePoll, 86.55% of 2,000 respondents stated that they were "not at all likely" or "not very likely" to do business with an organisation that had suffered a data breach involving credit or debit card details. The proportion of women expressing this view was 91.48%, which was markedly higher than the figure of 81.93% for men.

The survey also revealed that other types of data breach would drastically erode customer confidence. Below are the percentages of people who stated that they were "not at all likely" or "not very likely" to do business with an organisation which had suffered breaches involving the following types of personal data:

  • Credit or debit card details 86.55%
  • Home address: 82.95%
  • Telephone number: 80.10%
  • Email address: 76%

Tim Critchley, CEO of Semafone, commented, "These figures serve to underline what we should already know - that the reputational damage suffered by companies who fail to protect personal data can translate directly into a loss of business. The protection of card details is no longer simply a matter of best practice - the economic consequences of a failure to do so are potentially devastating for a business of any size."

The research findings coincide with news that the European Parliament has voted to approve the EU's new data protection legislation, which brings in a number of serious measures in favour of customers. These include a potential fine of 5% of gross revenues for companies who fail to protect customer data adequately, and the requirement to inform local data protection authorities within 24 hours of any breach.

"I can't see how any organisation can continue to ignore the increasingly loud demand from customers to keep personal data safe," continued Critchley. "Our research shows how seriously the public takes the safeguarding of its data, and the new data protection legislation makes effective security even more imperative. Not only will offending companies face the financial penalty of a fine, but they will suffer the immediate negative publicity that comes from the 24 hour disclosure rule. I think we are going to see a great many companies starting to take security a whole lot more seriously. "

Notes to editors

About Semafone's software
Semafone's software allows customers to enter their own card details directly into the telephone handset when they pay over the phone, without losing voice contact with the call centre agent. The tones made by the individual keys are disguised so they cannot be identified by their sound and no card data is taken into the computer and telephony systems of the call centre, making the transaction ultra-secure. To find out more about how calls can be protected using the Secured by Semafone® trustmark, visit www.semafone.com/secured-semafone/shhh

Anyone who has been a victim of fraud can contact the police helpline Action Fraud: 0300 123 2040 http://www.actionfraud.police.uk/

About Semafone
Semafone provides software to contact centres so they can take secure credit and debit card payments over the phone. Using Semafone's patented payment method, card data is transmitted directly from the customer's telephone keypad to the bank. This takes the contact centre out of scope of PCI DSS regulations, removing the threat of fraud and its associated reputational damage.

Semafone serves a wide range of industry sectors including financial services, media, retail, utilities, travel and tourism and the public sector. Customers include the Foreign & Commonwealth Office, Aviva Canada, TalkTalk, Nemo Personal Finance, Sky and Yorkshire Water.

Founded in 2009, Semafone received a £1.9m investment from Octopus Ventures in 2010 and a further £1.5m, primarily from existing investors, in 2012.

Further information about Semafone is available at www.semafone.com.

Semafone and Secured by Semafone are the registered trademarks of Semafone Limited.

About the research
The research was conducted by OnePoll in March 2014.

2000 UK Adults responded to the following question by selecting "very likely", "likely", "not very likely", or "not at all likely".

1. As a customer, how likely would you be to do business with an organisation which had suffered a security breach involving one of the types of personal data listed below?

  • Credit or debit card details
  • Home address
  • Telephone number
  • Email address

For a full copy of the research, please contact
Xanthe Vaughan Williams or Flo Levy
Fourth Day Public Relations
Tel: +44 (0)20 7403 4411
Email: [email protected] or [email protected]

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

Latest Stories
StackIQ has announced the release of Stacki 3.2. Stacki is an easy-to-use Linux server provisioning tool. Stacki 3.2 delivers new capabilities that simplify the automation and integration of site-specific requirements. StackIQ is the commercial entity behind this open source bare metal provisioning tool. Since the release of Stacki in June of 2015, the Stacki core team has been focused on making the Community Edition meet the needs of members of the community, adding features and value, while ...
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
ReadyTalk has expanded the capabilities of the FoxDen collaboration platform announced late last year to include FoxDen Connect, an in-room video collaboration experience that launches with a single touch. With FoxDen Connect, users can now not only engage in HD video conferencing between iOS and Android mobile devices or Chrome browsers, but also set up in-person meeting rooms for video interactions. A host’s mobile device automatically recognizes the presence of a meeting room via beacon tech...
Deploying applications in hybrid cloud environments is hard work. Your team spends most of the time maintaining your infrastructure, configuring dev/test and production environments, and deploying applications across environments – which can be both time consuming and error prone. But what if you could automate provisioning and deployment to deliver error free environments faster? What could you do with your free time?
Ixia (Nasdaq: XXIA) has announced that NoviFlow Inc.has deployed IxNetwork® to validate the company’s designs and accelerate the delivery of its proven, reliable products. Based in Montréal, NoviFlow Inc. supports network carriers, hyperscale data center operators, and enterprises seeking greater network control and flexibility, network scalability, and the capacity to handle extremely large numbers of flows, while maintaining maximum network performance. To meet these requirements, NoviFlow in...
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
It’s 2016: buildings are smart, connected and the IoT is fundamentally altering how control and operating systems work and speak to each other. Platforms across the enterprise are networked via inexpensive sensors to collect massive amounts of data for analytics, information management, and insights that can be used to continuously improve operations. In his session at @ThingsExpo, Brian Chemel, Co-Founder and CTO of Digital Lumens, will explore: The benefits sensor-networked systems bring to ...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
On Dice.com, the number of job postings asking for skill in Amazon Web Services increased 76 percent between June 2015 and June 2016. Salesforce.com saw its own skill mentions increase 37 percent, while DevOps and Cloud rose 35 percent and 28 percent, respectively. Even as they expand their presence in the cloud, companies are also looking for tech professionals who can manage projects, crunch data, and figure out how to make systems run more autonomously. Mentions of ‘data science’ as a skill ...
Cloud analytics is dramatically altering business intelligence. Some businesses will capitalize on these promising new technologies and gain key insights that’ll help them gain competitive advantage. And others won’t. Whether you’re a business leader, an IT manager, or an analyst, we want to help you and the people you need to influence with a free copy of “Cloud Analytics for Dummies,” the essential guide to this explosive new space for business intelligence.
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet a...