The Bank Security Reality That Customers Are Not Seeing

There is a version of bank security that exists in incident logs, operations dashboards, and executive briefings. And there is a version that exists in the minds of the customers those banks serve. The 2026 Integris Banking Trust and Technology Report makes clear that these two versions have almost nothing in common—and that the distance between them represents one of the most consequential unmanaged risks in banking today.

Key Takeaways

  1. Banks are being breached routinely. Customers have no idea. The 2026 Integris Banking Trust and Technology Report found 51% of banks reported a significant email-based breach and 50% a mobile-device breach in the past 12 months. Meanwhile, 57% of their customers believe the bank has never been breached at all. Breaches are now a routine operational reality. Customer perception has not caught up—yet.
  2. Customer trust is high, structurally fragile, and one incident away from collapse. Nearly 9 in 10 banking customers trust their bank to protect their personal and financial data, and 51% chose their institution specifically because they trust its security. But 67% say they would likely switch banks after a serious breach. The trust banks have spent years accumulating can be erased in a single news cycle.
  3. Technology budgets are growing sharply—but most bank executives cannot tell you what they currently spend. Forty-five percent of executives expect technology budgets to increase by 40% or more in 2026, and 18% expect increases above 60%. Yet 64% say they are not sure how much their bank currently spends on IT in total. Spending more into a system you cannot see is not a security strategy.
  4. Banks are deploying tools in fraud detection and risk scoring that more than a third of their own executives cannot audit. Over 36% of bank executives say they struggle to interpret automated outputs or understand how certain system-generated recommendations are produced. Regulatory frameworks on model risk management are already pressing on exactly this gap. The compliance exposure is active, not theoretical.
  5. Outsourcing security to an MSP without maintaining oversight is not risk management—it is risk displacement. Roughly 87% of banks rely on MSPs for cybersecurity, backup, disaster recovery, and cloud services. Yet compliance strain, data-integration challenges, and ongoing security concerns persist in the exact domains MSPs are supposed to cover. Regulators hold the bank accountable. MSPs do not absorb that accountability when they absorb the function.

In the past 12 months, 51% of surveyed banks reported a significant email-based security breach, and 50% reported a significant mobile-device breach. These are not probes, near-misses, or theoretical exposures. These are incidents serious enough that bank executives acknowledged them in a formal research survey. By operational measure, breaches are now a recurring feature of the banking environment—not a rare catastrophe that arrives every several years and triggers a crisis response.

Customer perception runs directly counter to this reality. Only about 1 in 10 banking customers recalls ever receiving a breach notification from their institution. Fifty-seven percent believe their bank has never experienced a breach at all. These customers are not conducting independent assessments and arriving at a favorable conclusion. They are simply unaware of what is happening inside the institutions managing their money—because those institutions have not told them.

The Integris report identifies this as the “breach-perception gap,” and it is the defining structural tension of the entire document. The gap is not benign. Nearly 9 in 10 customers say they trust their bank to protect their personal and financial data. Fifty-one percent chose their bank specifically because they trust its security posture. And 40% list malicious attackers stealing bank data as their single biggest banking fear. The customers who trust most deeply are also the ones most exposed to a trust collapse—because their confidence is grounded in an inaccurate picture of what is actually occurring.

The collapse scenario is documented in the data. Sixty-seven percent of customers say they would likely switch institutions after a serious breach. That figure means more than two-thirds of the customers whose trust was built on years of relationship banking would exit after a single visible incident. The trust is real. Its durability is not. Banks that allow the breach-perception gap to persist are accumulating a liability that grows with every undisclosed incident and becomes due when the next one cannot be managed quietly.

Spending More Without Seeing More: The Bank IT Visibility Crisis

The technology investment picture the Integris report paints is, on the surface, reassuring. Banks are spending. Forty-five percent of executives expect technology budgets to grow by 40% or more in 2026. Eighteen percent expect growth above 60%. Cybersecurity is among the primary drivers, alongside cloud expansion, digital channel demands, and technology modernization. Budget allocations are moving in the direction the threat environment requires.

The problem sits one layer beneath the spending numbers. Sixty-four percent of bank executives—the same people authorizing those significant budget increases—say they are not sure how much their bank currently spends on IT in total. The baseline is unknown. The growth is being applied to an environment that leadership cannot fully account for. As the Integris report describes it, fragmented legacy architectures and siloed spending make it structurally difficult to prioritize investments or measure how much actual security risk is being reduced by the money going out the door.

This is not primarily a financial management problem. It is a security governance problem. When an institution cannot map its total IT spend, it also cannot determine whether security investments are proportionate to its actual risk exposure, whether existing controls are functioning as designed, or whether the gaps most likely to be exploited in the next incident are being closed or merely surrounded by additional tools. Investment without visibility produces a more expensive version of the same fragmented posture, not a more secure one.

Community and midsize banks face this most acutely. The report positions them as institutions operating under the same regulatory standards and customer expectations as national banks, against a threat environment that calibrates its targeting to opportunity rather than asset size, with budgets and staff that cannot match the absolute investment levels available to larger peers. The banks that navigate this most effectively are not the ones that spend the most. They are the ones that achieve spending visibility first and then make deliberate, evidence-based choices about where every dollar produces the most protection per unit of investment.

Automated Decision-Making in Banking: A Compliance Gap That Regulators Are Already Watching

The findings on automated and technology-driven decision-making in the Integris report are among the most consequential for compliance purposes, and they have received less attention than the headline breach statistics. More than 36% of bank executives say they struggle to interpret the outputs of automated systems or understand how certain system-generated recommendations are produced. This is not a general technology literacy issue. It is a description of a specific condition with direct regulatory implications: Banks are using automated tools in fraud detection, transaction monitoring, and risk scoring, and the executives accountable for those functions cannot reliably audit what those systems are recommending or why.

Regulatory frameworks are pressing on exactly this gap. Model risk management guidance from the OCC, FDIC, and Federal Reserve already requires documentation of models, validation processes, and human oversight for high-stakes automated decisions. The expectation that banks can demonstrate fairness, auditability, and explainability in automated systems affecting customers’ accounts is not emerging—it is current. The Integris report is explicit on the prescription: Banks must formalize acceptable-use policies for automated decision tools, document models and the decisions they produce, maintain human review processes for consequential outcomes, and build escalation paths for system-generated issues that require human intervention to satisfy both regulatory requirements and the expectations of customers whose accounts are affected.

The customer dimension compounds the compliance pressure in ways that go beyond formal regulation. Fifty-two percent of banking customers fear that automated systems could wrongly freeze their accounts or block legitimate transactions. About 40% worry these systems could expose their personal data. Twenty-three percent say they do not understand how their bank uses technology to make decisions about their accounts at all. The report makes a pointed observation: Customers experience an erroneous automated account freeze as equivalent to a security breach. It blocks access to funds. It undermines confidence in the institution. It triggers the same response—alarm, lost trust, and consideration of switching—as a data exposure event, regardless of whether any data was actually compromised.

This creates a compliance and governance obligation that runs simultaneously on two tracks. On the formal regulatory track: model documentation, validation, audit trails, and explainability requirements that are already embedded in existing guidance and growing more prescriptive. On the customer trust track: the practical obligation to ensure that automated systems affecting access to accounts operate accurately, can be reviewed and corrected when they do not, and that customers have some understanding of how those systems work. Banks that have deployed automated decision-making tools without building the governance infrastructure to meet both obligations are carrying exposure they may not have fully mapped.

The MSP Accountability Gap: Where Outsourcing Security Ends and Compliance Liability Begins

The reliance on managed service providers documented in the Integris report defines the operational structure of bank security for the vast majority of institutions surveyed. Roughly 87% of banks use MSPs for basic and advanced cybersecurity functions. More than 80% rely on MSPs for backup and disaster recovery, cloud services, and help desk operations. Thirty-four percent plan to expand MSP use specifically for compliance and regulatory support in the next six to twelve months. MSPs are not a supplement to bank security operations—for most community and midsize institutions, they are the security operations function.

The structural problem emerges in what the report finds alongside those deployment figures. Compliance strain is reported as an ongoing challenge by 31% of executives—even at institutions that rely on MSPs for regulatory support and automated compliance documentation. Data-integration challenges, ongoing security concerns, and difficulties with technology planning persist in the exact domains where MSPs are supposed to be delivering solutions. Banks are outsourcing the execution of security and compliance functions and still reporting the same gaps those functions were deployed to close.

The report’s interpretation is unambiguous: Outsourcing without strong oversight and visibility into MSP-run environments leaves important gaps in the control environment. An MSP can operate a bank’s security monitoring, manage its cloud infrastructure, and handle compliance documentation. What an MSP cannot do is absorb the bank’s regulatory accountability. When examiners from the OCC, FDIC, or state regulators arrive and ask for evidence of controls—incident logs, audit trails, model validation records, access governance documentation—the bank must produce them. If the bank has no independent visibility into what its MSP is monitoring, what alerts are being triaged, and what evidence is being generated on its behalf, the bank has not transferred its compliance obligations. It has transferred its ability to verify that those obligations are being met. That is a materially different and considerably more dangerous condition than it appears on the surface, as noted in the Integris report.

The governance fix the report points toward is not less MSP use—it is more structured accountability around MSP use. Clearer contractual accountability frameworks. Bank-side visibility into the monitoring, alerting, and evidence-generation occurring in MSP-managed environments. Oversight capabilities that allow a bank to independently verify that the controls it is paying an MSP to provide are actually functioning. For community banks planning to expand MSP use for compliance purposes, building that oversight infrastructure before the expansion is the difference between a compliance program that scales and one that creates compounding liability as it grows.

Compliance as a Communication Obligation: Why Being Secure Is Not Enough

One of the more pointed arguments the Integris report makes is that data compliance in 2026 cannot be defined solely by what regulators require. It must also encompass what customers understand. The data supporting this argument is direct. Fifteen percent of banking customers say their bank rarely or never communicates security updates. Nearly half report that security communications from their bank are infrequent. The breach-perception gap—where 57% of customers believe their bank has never been breached while operational data shows breaches affecting the majority of institutions—is not an accident of customer inattention. It is the predictable outcome of banks that communicate the minimum required and treat security transparency as a liability rather than an asset.

Breach notification requirements under GLBA, state-level data protection statutes, and sector-specific guidance establish minimum thresholds for when and how customers must be informed of incidents. Banks can be in technical compliance with all of those requirements while simultaneously allowing their customer base to develop a fundamentally inaccurate picture of the institution’s security posture. When a significant incident eventually forces a disclosure that customers were not prepared for, the correction is not received as a transparent update. It is received as a revelation of prior concealment—and it triggers the trust collapse the report’s data predicts.

Community banks occupy the sharpest version of this challenge. They are deeply MSP-dependent. They are held to digital security and compliance expectations that have converged with those of national banks. They have smaller communications teams and fewer resources to build the kind of consistent, proactive security messaging that would close the perception gap in advance of a crisis. And their customer relationships—often more personal and longstanding than those at larger institutions—make a trust collapse simultaneously more damaging and more recoverable, depending on how well the institution manages transparency when incidents occur.

The report’s prescription for 2026 is a consistent security and governance communication cadence—not occasional disclosures triggered by regulatory minimums, but ongoing customer education about how security protections work, what happens when incidents occur, how automated systems affecting their accounts are governed, and where customers can turn when they have concerns. Banks that build this cadence are not just managing reputation risk. They are building the kind of informed customer trust that is durable enough to survive an incident rather than collapsing under it.

What the 2026 Integris Report Means for Your Bank’s Security and Compliance Program

The 2026 Integris Banking Trust and Technology Report does not describe a banking sector that is failing at security. It describes one that is investing heavily in security while operating with structural blind spots that limit the ability to demonstrate, measure, and communicate the value of that investment. The gaps it documents are consistent and mutually reinforcing: between breach frequency and customer perception, between technology spending and spending visibility, between automated system deployment and the governance those deployments require, between MSP reliance and bank-side oversight, and between formal compliance obligations and the customer communication those obligations do not fully address.

Four adjustments concentrate the most impact for bank security and compliance programs based on the report’s findings. First, treat the breach-perception gap as an active compliance and trust risk, not a communications afterthought. Every undisclosed incident that a customer cannot contextualize adds to the trust debt that will become due when the next visible one arrives. The banks that have proactively closed this gap through consistent security communication will manage their next incident fundamentally differently than the ones that have not.

Second, establish IT spending visibility before committing to the budget increases that 45% of executives are already planning. Without a clear baseline, growth in security spending cannot be directed to the highest-risk gaps, cannot be measured for effectiveness, and cannot be defended to examiners or boards with the specificity that good governance requires. Third, formalize the governance framework for automated decision tools deployed in fraud detection, risk scoring, and transaction monitoring. Document the models. Establish human review processes for high-stakes outcomes. Build escalation paths. This is not a future-state exercise—the Integris report identifies it as a current regulatory exposure for the 36% of bank executives who currently cannot audit the outputs of those systems.

Fourth, and most immediately for the 34% of banks planning to expand MSP use for compliance purposes: Build the oversight infrastructure before expanding the relationship. Define contractual accountability explicitly. Establish bank-side visibility into the monitoring, documentation, and evidence-generation occurring in MSP-managed environments. Regulators will hold the bank accountable for what the MSP produces on its behalf. If the bank cannot independently verify that the MSP is producing it, the accountability gap is the bank’s to carry.

The institutions that close these gaps in 2026 will be better positioned for their next examination, better equipped to manage the incidents the data shows are already arriving annually, and better positioned to sustain the customer trust that their entire competitive position depends on. The ones that do not will be managing the same blind spots at greater expense in a regulatory environment that is becoming progressively less tolerant of governance gaps it has already identified and communicated.

Frequently Asked Questions

The 2026 Integris Banking Trust and Technology Report identifies three areas most likely to draw examiner attention: IT spending visibility (64% of executives cannot account for total IT spend), governance over automated decision tools deployed in fraud detection and risk scoring (36% cannot audit system outputs), and MSPs (87% of banks rely on MSPs but 31% still report compliance strain). Regulators increasingly expect documented accountability in all three areas, and evidence of controls that the bank itself can independently verify.

Email breaches are now routine: 51% of banks in the Integris report reported a significant email-based breach in the past 12 months. The report’s core communication finding is that only 1 in 10 customers recalls receiving a breach notification from their bank, while 57% believe their bank has never been breached. Meeting formal notification minimums while leaving customers with an inaccurate picture of security reality accumulates trust debt. The report recommends a consistent security communication cadence rather than reactive disclosures triggered only by regulatory thresholds.

The Integris report frames automated decision tool governance as a current compliance obligation, not a future consideration. Over 36% of bank executives already struggle to interpret or audit system outputs—a direct model risk management exposure. The report specifies that banks must formalize acceptable-use policies, document models and their decision outputs, maintain human review for high-stakes automated decisions, and build clear escalation paths for system-generated issues. Regulators expect documented auditability and fairness demonstration in these functions under existing guidance.

The 2026 Integris Banking Trust and Technology Report is direct: Outsourcing without strong oversight leaves important gaps in the control environment. Compliance accountability does not transfer to the MSP—regulators hold the bank responsible for the evidence and outcomes the MSP is supposed to produce. Thirty-one percent of bank executives report ongoing compliance strain even in MSP-supported domains. The report recommends explicit contractual accountability, bank-side visibility into MSP-generated monitoring and documentation, and independent verification that controls are functioning as intended.

High trust ratings are a starting point, not a guarantee, per the Integris report. Nearly 9 in 10 customers say they trust their bank with personal and financial data, but 67% say they would likely switch after a serious breach, and 52% fear automated systems wrongly freezing their accounts—an event the report equates to a security breach in customer perception. Trust rooted in unfamiliarity with actual breach frequency is fragile. When a visible incident closes the breach-perception gap involuntarily, the resulting collapse can be rapid and difficult to reverse without a pre-existing communication foundation in place.

Get started.

It’s easy to start ensuring regulatory compliance and effectively managing risk with Kiteworks. Join the thousands of organizations who are confident in how they exchange private data between people, machines, and systems. Get started today.

Table of Content
Share
Tweet
Share
Explore Kiteworks