Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Is Security Being Sacrificed for the Sake of Convenience?

Is Security Being Sacrificed for the Sake of Convenience?

While this time of year is always huge for online retail, there is likely to be a much larger number of people turning to the Internet for their holiday purchases than usual… and, it would seem, a larger number of people taking security into consideration as they do so. Let’s examine how consumers are taking their data into their own hands and what this means for your business.

Balancing Security Against the User Experience

While most users—about 75 percent of them—see no difference in the security offered by retail websites, approximately 15 percent have decided against a purchase because of security concerns. Another 14 percent of shoppers declined to buy from a website out of uncertainty over their data handling measures.

With this increase in security awareness, it is likely that retailers will find themselves in a position where they will have little choice but to innovate and improve their security—especially considering that estimates have seen retail sales only increasing by about 1.5 percent, as compared to a 25-to-35 percent boost in online commerce.

That said, it is also clear that security features cannot get in the way of the user experience.

When a third of consumers wouldn’t hesitate to delete an application if they experienced login challenges, the usability of a given authentication measure is just as important to consider as its security. This is reflected in the overall desire to replace passwords with other, easier-to-use authentication measures like biometrics.

The Real Issue Comes with the Privacy Concerns

Another survey indicated that consumers are, perhaps predictably, very conscious of their data privacy. This survey indicated that 70 percent of consumers look at their ability to deny the developers of an application the ability to sell the data they’ve collected as a key consideration over whether they’ll use that app or not.

Interestingly, these users will often hand data over otherwise: 72 percent will trade their name and email for a discount, with 56 percent adding their birthday and 53 percent handing over their address.

Because of this, it falls to the business collecting this kind of data to reconsider whether they need all the data they are collecting and to reduce their collection practices to better match their practical needs. For example, many businesses and retailers will send coupons or special offers to a contact on their birthday.

Tell me, to do that, do you need to know what year a given contact was born in?

This kind of extraneous data only puts your company at greater risk, as it could lead to a greater impact if that data were ever leaked or compromised.

Security is Crucial for Any Kind of Business

Regardless of whether you’re in the retail space or you function in an entirely different industry, your clientele/customer base is likely just as concerned about the privacy of all the data you collect from them… or in other words, their data.

If you are to maintain operations, you need to ensure you have the protections in place to keep this data—as well as any you generate during your processes—safely secured against all kinds of threats.

415 IT and our team of IT professionals can help you accomplish this. To learn more about the cybersecurity protections we have to offer, give us a call at (415) 295-4898 and ask.

What Exactly is Software-as-a-Service?
A Look at Modern Networking


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, January 19 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Business Computing Best Practices Data IT Support Data Backup Network Security Privacy Hosted Solutions Cloud IT Services Software Data Recovery Efficiency Internet Email Managed IT Services Business Mobile Device Phishing Small Business Collaboration Malware Google User Tips Outsourced IT Innovation Cybersecurity Cloud Computing Hackers Tech Term Business Management Upgrade Hardware Smartphone Managed Service Mobile Devices Android Computer Communication Microsoft Business Continuity Workplace Tips Windows 10 Smartphones VoIp Covid-19 Quick Tips Backup Disaster Recovery Ransomware Managed Service Provider Paperless Office Encryption Communications Network Remote Work Passwords Business Technology Data Management Wi-Fi Users Browser Saving Money Server Office 365 Remote Monitoring Managed IT Help Desk Social Media Artificial Intelligence BDR Internet of Things Vulnerability Holiday Government Document Management Save Money Windows 7 Healthcare Compliance Miscellaneous Laptops Chrome Scam Automation Microsoft Office Windows Facebook Data Security Applications Blockchain Managed IT services Tip of the week Information Two-factor Authentication Redundancy Vendor Management Analytics Gadgets Avoiding Downtime Bandwidth Antivirus Mobile Office Office Health Virtualization Remote Wireless Processor Project Management Employer-Employee Relationship Mobility Data Loss RMM Hard Drive Maintenance VPN Proactive IT Management Router Meetings Storage Information Technology Networking Customer Relationship Management Training Machine Learning OneDrive Managed Services Files Access Control BYOD Virtual Private Network Website Employee-Employer Relationship Company Culture Infrastructure Software as a Service Net Neutrality Apps Regulations IoT Management Tablet Dark Web Augmented Reality File Sharing Internet Exlporer Alert File Management Spam Smart Technology Server Management Payment Cards Data Storage Computing Monitoring Display Bring Your Own Device Assessment Remote Worker HIPAA Utility Computing Social Network Financial Remote Monitoring and Management Search Network Management Flexibility Operating System Professional Services Mobile Security Remote Computing Unified Communications Consultation Electronic Health Records Employees Holidays Consulting Downtime Instant Messaging Recycling Vendor The Internet of Things Co-Managed IT Time Management Gmail Risk Management Cooperation Word Money Managed Services Provider Patch Management Data Breach Password Unified Threat Management Remote Workers WiFi Hard Disk Drives Sensors Business Telephone Microsoft Excel Point of Sale Tech Terms Nanotechnology Database Wires PCI DSS Computing Infrastructure MSP Finance Chatbots Bluetooth Techology Mobile Computing Notes Remote Working Recovery Conferencing Mirgation Virtual Machines Enterprise Content Management Proactive Maintenance Solid State Drive Biometric Google Calendar Fraud Printing Wearable Technology Star Wars User Management Reviews Human Error Identity Theft Enterprise Resource Planning Solid State Drives IT Assessment E-Commerce Theft Technology Laws App Voice over Internet Protocol Projects Alerts Authentication Credit Cards Virtual Reality Outlook Electronic Medical Records Disaster Resistance PowerPoint Geography Budget Travel Emergency Multi-Factor Security Cache Value of Managed Services Social Networking Cybercrime Cyber security Gamification Printer Teamwork End of Support Firewall Websites OneNote Permission Identity Options Telephone Digitize Features Unified Threat Management Screen Reader Return on Investment CRM Comparison Licensing Authorization Computers Data Warehousing Shortcut Proactive IT Modem High-Speed Internet Technology Tips Politics Test G Suite Database Management Legislation Private Cloud Tech Support Shared resources Going Green Windows Server 2008 Gifts Distributed Denial of Service SaaS How To Mobile 5G Mobile VoIP Shadow IT Procurement Smart Tech Settings Personal Information Content Filtering Specifications WPA3 Lenovo Touchscreen Operations Hacking IT Consulting Virtual Assistant Development Bitcoin Digital Payment Hotspot Samsung Manufacturing Motherboard Chromebook GDPR Outsource IT Bookmarks ROI SharePoint IT Technicians Cost Management Batteries Hacker Managed IT Service Wireless Internet Big Data Outsourcing Cyberattacks Mail Merge Social User Error Connectivity Transportation Active Directory Black Friday Heating/Cooling Fleet Tracking Zero-Day Threat Superfish Smart Devices IT Trending Mobile Device Management Cookies Wasting Time Cables Current Events Peripheral Mouse Language Customer Service Migration eWaste Statistics Vulnerabilities Laptop Favorites Downloads CIO applications Optimization Break Fix Managing Stress Employer/Employee Relationships Apple Video Conferencing Permissions Read Only Address Security Cameras Windows Server Banking Cyber Monday Staff Servers Asset Tracking Backup and Disaster Recovery CEO Printers Students Marketing Daniel Stevens Regulation Twitter CES Education

Latest Blog

It isn’t often that you’ll hear a managed service provider say something like, “There’s no school like the old school.” In many ways, however, the basic principles of a solid business IT strategy haven’t changed all that much… despite the momentous changes that we’ve witness...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...