Will data transparency regain consumers’ trust?

The evolution of innovative technologies have enabled companies to understand their customers’ needs and demands better than ever before. At the same time, customers have benefited from high quality, streamlined and personalised shopping experiences.
However, as the data ecosystem has evolved, hackers have also found ways to infiltrate businesses’ defences and steal customers’ sensitive Personal Identifiable Information (PII).
These data leaks have made customers across the world question their trust in brands. Although the costs associated with regulatory fines and lawsuits following a data breach can be severe, the loss of consumer confidence can be far more harmful.
Consumers are calling out for transparency when it comes to their data but can (and will) businesses deliver on this request?
Transparency should start at the board level
Businesses know that there is a growing risk of cyber attacks but very few leaders truly understand where all data leak vulnerabilities exist and how to prevent them.
The Government’s recent FTSE 350 Cyber Governance Health Check report, revealed that while 96 per cent of businesses have a cyber security strategy in place, just 56 per cent of businesses reported testing their cyber security incident response on a regular basis. If business leaders are blind to or ill-informed on the potential weaknesses, how can they be transparent with consumers and more importantly protect their data?
Echoing MP and Digital Minister, Margot James, much more needs to be done by boards to ensure the right security precautions are in place. This may sound obvious, but the problem is that many companies assume that their IT or security teams have all bases covered. But the reality is that most do not.
Hackers are finding new ways to steal data every day and as we have seen with breaches such as Ticketmaster, businesses are missing the points where they are vulnerable. Without the correct security measures in place the website supply chain is often an open door for criminals.
Website security breaches can originate from third-party marketing technologies which a business does not control; for example, trackers, JavaScript tags, ad servers, and social media technologies. These tools, some of which companies might not even be aware of, can introduce malicious code into a website causing leaks of sensitive customer data.
Historically, these platforms have fallen under the care of the marketing team instead of the security department. As a result, the security team may not have full sight of the very places hacking groups like Magecart are targeting.
These types of breaches are preventable with the right technology, but given boards are often unaware of the potential threats, it means they are not providing the investment needed to shore up their marketing platforms prior to a breach occurring.
Be proactive, not reactive
The introduction of GDPR means that consumers expect transparency from companies. However, being compliant alone is not enough to secure customer trust.
Data from PwC revealed that 88 per cent of consumers ‘agreed that their willingness to share personal information was predicated on how much they trust a company’. Other than protecting data in the first place, this trust is built on transparency. Businesses need to proactively provide updates rather than wait to be told by a regulator to communicate issues, updates and changes with data.
Despite this need, insight from PwC’s Digital Trust Insights Survey showed that only around half of global businesses worth $100 million or more were making large investments in data governance to ensure consumers have transparency and control over their data.
Ultimately those brands that are not respectful of consumers’ data will lose customers to those organisations that are. Data owners therefore must be clear with why an individual’s data is being collected and how it benefits them, through to honouring the right to be forgotten and consequently explain how data is stored and protected.
Keep evolving your data strategy
Looking ahead, data transparency and retaining customer trust will only become more complicated as consumers become more connected - not just with smartphones but IoT devices such as smart TVs. With more touch points to share data, there is more scope for potential leaks.
Businesses must continue to review and evolve their security strategy, while also informing customers how their data is protected. This also means alerting consumers quickly if something goes wrong (such as a data leak) so that customers can change passwords or monitor credit card payments if necessary.
It is time for businesses to prioritise security within their organisations and make sure they are being transparent with their customer base. This starts with the c-suite having transparency across the entire business to ensure that a robust security approach can be employed.
Even a single breach can have a devastating impact on consumer trust - a proactive and transparent data security strategy is not optional in our new data economy - it is imperative.
source itproportal
Industry: Cyber Security News

Latest Jobs
-
- Network Security Engineer
- Germany
- €550 a day
-
German- based contract opportunity This is an onsite based position, we would need the Network Security engineer to be able to work on the client site 5 days a week Seeking an experienced Network Security Engineer for a leading technology company. Strong expertise in firewall/IPS solutions, proxy solutions, and certificate management is required. Good hands-on experience in networking and web-related technologies necessary. Strong problem-solving skills and the ability to work under pressure are essential. we are looking for a Network Security Engineer with the following experience: · Expertise in Administration, Management & Troubleshooting of Firewall / IPS solutions / Proxy solutions/Certificate Management Solutions · Good Hands-on Experience on security devices (PaloAlto/ /McAfee Proxy/CISCO ISE/Certificate Management) · Good Hands-on Experience in Networking with skills of switching, routing & wireless Technologies · Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocol · Configuration of NAT / PAT, firewall policies, profiling, objects, AD-Integration, backup – restore · Knowledge of Subnetting TCP/IP Communication, VLSM Configuration of VLAN VTP · Configuration of Routing Protocols e.g. RIPv1 & v2, OSPF, EIGRP, BGP Knowledge of standard and extended ACL 12 month contract
-
- IAM Consultant
- N/A
- Upto £110,000 depending on level of position
-
Identity Access Management (IAM) Consultant Location: Germany We are seeking an experienced IAM consultants in Germany. we are looking for people from consultant through to Architect, The ideal candidate will have previous IAM deployment experience and be fluent in German. Key responsibilities: Design and implement IAM solutions for clients Provide expertise on industry best practices and standards Troubleshoot and resolve IAM-related issues Work closely with clients to understand their business requirements and provide solutions to meet those needs Qualifications: Previous deployment experience with IAM solutions Fluency in German Strong understanding of IAM technologies and principles Excellent communication and project management skills If you are an experienced IAM consultant with a strong track record of delivering successful projects, please apply today.
-
- ForgeRock Consultant
- Spain
- Upto €85000 plus benefits
-
ForgeRock deployment consultant is needed for this expanding IT Services business within Spain, to act as their ForgeRock technical lead, Responsibilities include: High level and low level design, Scoping the techical needs of the project design, configure, develop and test the forgeRock deployment. We are looking for a strong IAM consultant ideally with ForgeRock experience, Must have strong Oauth 2.0, SAML and API experience
-
- IAM Consultant
- France
- Upto €85000 plus benefits
-
An Identity & Access Management Consultant is needed for an expanding IT Security consultancy, based in France. (Remote role with monthly office meet-ups) The Identity & Access Management Consultant will be responsible for the technical design and implementation of Identity & Access Management/IAM products for a wide variety of clients. Deliver bespoke end-to-end consultancy service to our clients, from gathering requirements through to implementation. Work in a close team designing, developing, and implementing first-class IAM solutions. Manage client relationships, working closely with key stakeholders to continually evaluate business requirements and ensure the highest quality solution delivery. If you are interested we are looking for an individual with Previous experience working within the IAM or CIAM field is essential, Strong knowledge with SAML and Oauth and ideally OpenID Previous experience from any of these technologies: One Identity, SailPoint, Saviynt, Ubisecure, Ping Identity, would be advantageous