British Business Moves To Adopt Digital Identity

Organisations and consumers across Britian are embracing a new era of digital identity, according to a new report from Curity, a leading Identity and Access Management company. 

The report entitled Plotting the Roadmap for Digital Identity surveyed 200 IT decision makers (ITDMs) in the UK and US as well as 1000 consumers to better understand the rapidly changing digital identity landscape. 

Curity say that 63% of UK organisations either currently use digital identity or have plans to incorporate digital identity solutions into their operations, with 61% of those planning to do so within the next year. 

Additionally, 52% of UK firms have plans to incorporate new and emerging decentralised identity solutions. UK consumers are also displaying a growing familiarity with digital wallets, with 58% of consumers currently using them and half of consumers that don’t currently use digital wallets considering them in the future.  

The report also  reveals that 60% of organisations surveyed expect digital identity to have a transformative impact on their industry, with financial services (89%) and health (86%) seen as industries set to benefit most from latest innovation in this area according to ITDMs. 

Finance (62%), retail (61%) and travel (46%), were the most popular services used by consumers with digital wallets. 

Financial institutions (38%) are current leaders in public trust when it comes to storing personal data in digital identity wallets, followed by medical providers. (35%), whereas the government (22%) and transport providers (17%) were the least trusted, according to the research.  

Other key findings include:  

  •  Among UK consumers that currently use digital wallets, 77% use it weekly and 30% use it daily.
  • 60% of consumers in the UK & US highlighted data privacy risks and fraud as reasons they would be hesitant to store personally identifiable information in a digital identity wallet. 
  • The top security challenges posed by digital identity for ITDMs are hacker sophistication (39%) and lack of appropriate infrastructure (37%).  

Commenting on these findings, Curity's  CEO, Travis Spencer, said, “As consumers demand seamless digital experiences and organisations face increasing pressure to protect customers’ data, continued innovation and development in the digital identity space could not be of greater importance... “While there are encouraging signs that businesses are adequately prepared for the paradigm shift that decentralised identity will cause, the winners after the move will be those that cultivate trust among consumers. 

The question of how digital identities are going to be managed and by whom, will continue to be a important issues over the coming years as, to keep up with this pace of change and consumer expectations, digital identity will be on the priority list for enterprise architects and many business leaders. 

Image: Vectorian

You Might Also Read: 

Security Risks of Contactless Payment:

____________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Musk's Brain Chip Firm Gets US Approval for Human Analysis
Update: BBC, British Airways & Boots In Supply Chain Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

Qatar Computing Research Institute (QCRI)

Qatar Computing Research Institute (QCRI)

QCRI perform cutting-edge research in such areas as Arabic language technologies, social computing, data analytics, distributed systems, cyber security and computational science and engineering.

Moxa

Moxa

Moxa is a leading provider of industrial networking, computing, and automation solutions for enabling the Industrial Internet of Things.

Uniwan

Uniwan

Uniwan is an IT services company specializing in networking and security.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

Vilnius Tech Park

Vilnius Tech Park

The region‘s most complex and integrated ICT hub, Vilnius Tech Park aims to attract and unite innovative talent from big data, cyber security, smart solutions, fintech and digital design.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

BOXX Insurance

BOXX Insurance

BOXX Insurance Inc. is a new type of insurance company for a new type of risk. Cyberboxx is the first fully-integrated cybersecurity and insurance solution for small-to-medium-sized businesses.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Brightworks Group

Brightworks Group

BrightWorks Group offer comprehensive technology operations and security operations consulting services, tailored to meet your specific needs.

US Insider Risk Management Center of Excellence (US-InRM)

US Insider Risk Management Center of Excellence (US-InRM)

The US-InRM Center of Excellence is a nonprofit organization dedicated to promoting private, public, and academic partnerships to foster knowledge sharing and resources to mitigate insider risk.

Cyber Dagger

Cyber Dagger

Cyber Dagger is a cybersecurity company driven by a mission to protect digital infrastructures and close the cybersecurity skills gap.