SlideShare une entreprise Scribd logo
1  sur  10
2010 Corporate End User Study
Small Business Findings


                          Classification 03/28/13   Copyright 2009 Trend Micro Inc.   1
Methodology
• 1,600 surveys in total, 400 corporate computer end-users were
  surveyed online per country in four countries: U.S., Japan,
  Germany and U.K, during March 2010.
• Qualification Criteria:
   – Full-time employed, with e-mail and Internet access at work
   – Use computers over 5 hours per week at work
• Quotas were set by size and type of computer as follows:
   –   25% (n=100) large company, use desktop or workstation most often
   –   25% (n=100) large company, use a laptop or notebook most often
   –   25% (n=100) smaller company, use desktop or workstation most often
   –   25% (n=100) smaller company, use a laptop or notebook most often
• In the US, UK and Germany, the split between large and smaller
  company was made at 500 employees. In Japan, the split was
  made at 250 employees.




                                      Copyright 2009 Trend Micro Inc.
Seriousness of Computer Security Threats
  • Viruses, Trojans and data stealing malware are considered the most serious
    security threats among corporate workers in small businesses.




                              Country                                                                                       Total
                              Sample size, n=                                                                     Varies by Threat
                              Viruses                                                                                       63%
                              Trojans                                                                                       60%
                              Data Stealing Malware                                                                         59%
                              Data Leakage                                                                                  56%
                              Spyware                                                                                       55%
                              Fake Antivirus or Rogue Antivirus                                                             52%
                              Phishing                                                                                      48%
                              Spam                                                                                          40%

Q: How serious of a threat do you think each of the following are to you at work? A: Top 2 Box on 5 point scale (5= “very serious”) Base: Users aware of each type of threat.



                                                                                          Copyright 2009 Trend Micro Inc.
Company Policies to Prevent Data Leakage
• In all countries, large organizations are significantly more likely to have preventative
  policies in place than small companies.



                                                               Company Policy f or Dat a Leak age
                                                                    by Size of Company
                                                                      Small          Large                                       
                                                90%
                                                                                                                              81%
                                                80%
                                                               69%
                                                                                                71%                     
                                                70%
                                                                               61%                              60%
                                                60%                                                                 
                                                                                                          48%    47%
                                                50% 46%                  44%             44%
                                                40%

                                                30%

                                                20%

                                                10%

                                                  0%
                                                            Total             US               UK            Germany         Japan
  Q: Does your company currently have a policy for preventing data leakage?
   indicate significantly significant differences between countries or between small and large companies within countries. (z-test/t-test at 95% confidence interval).

                                                                                       Copyright 2009 Trend Micro Inc.
Training to Prevent Data Leakage
  • For those small businesses that have preventive data leak policies in place,
    employees in large companies are also significantly more likely to have received
    training on data leak prevention than those in small companies.


                                                                  Have you been t r ained on t he dat a
                                                                           leak age policy?
                                                                          Small           Large
                                                    80%                                     
                                                                                    70%
                                                    70%
                                                                    61% 
                                                    60%

                                                    50%
                                                                                                                         
                                                                                                                39%
                                                    40%
                                                                                                                                  30% 
                                                    30%

                                                    20%

                                                    10%

                                                      0%
                                                                             Yes                                             No
Q: Have you been trained on the policy for data leakage prevention? Base: End users in companies with a data leakage policy.
 indicate significantly significant differences between countries or between small and large companies within countries. (z-test/t-test at 95% confidence interval).



                                                                                           Copyright 2009 Trend Micro Inc.
Knowledge of Company Data
  • In the UK, end users in large companies are significantly more likely to indicate
    knowledge of confidential information than those in smaller companies.




                                                                Know ledge of Company Dat a
                                                                    by Size of Com pany
                                                                     Small          Large
                                                                                    
                                             80%
                                                                                   73%
                                                               70%          
                                             70%
                                                                           63%                           65%
                                                       61%                                     62%
                                             60%

                                             50%
                                                                                                                               40%
                                             40%
                                                                                                                        33%
                                             30%

                                             20%

                                             10%

                                              0%
                                                             US                  UK             Germany                      Japan
Q: Do you know what type of company data is confidential and proprietary?
 indicate significantly significant differences between size brackets or between desktop and laptop users within countries. (z-test/t-test at 95% confidence interval).


                                                                                           Copyright 2009 Trend Micro Inc.
Seriousness of Computer Security Threats:
 US
 • End users in the large US companies are significantly more likely to indicate data
   leakage as a serious threat than those in smaller companies.
                                                                          By Size of Com pany
                                                                                                                           69%
                                                Viruses
                                                                                                                           69%

                                                                                                                           69%
                                               Trojans
                                                                                                                    64%

                                        Data Stealing                                                             62%
                                          Malware                                                                          68%

                                    Fake Antivirus or                                                            61%
                                    Rogue Antivirus                                                                 64%

                                                                                                              58%
                                              Spyware
                                                                                                               59%

                                                                                                     49% 
                                        Data Leakage
                                                                                                                             74% 

                                                                                                   48%
                                              Phishing
                                                                                                         53%
                                                                                                                                 Small
                                                                                           39%
                                                 Spam
                                                                                             42%                                 Large

                                                       0%              20%              40%                60%                   80%

Q: How serious of a threat do you think each of the following are to you at work? A: Top 2 Box on 5 point scale (5= “very serious”) Base: Users aware of each type of threat.
 indicate significantly significant differences between size brackets or between desktop and laptop users within countries. (z-test/t-test at 95% confidence interval).


                                                                                         Copyright 2009 Trend Micro Inc.
Leakage of Company Confidential Data – Other
Employees
• Data leakage by other employees is more widely believed in large organizations in
  all countries.

                                                        Have ot her employees leak ed dat a?
                                                                by Size of Company
                                                                  Small        Large
                                                                                   
                                           30%
                                                                                  27%

                                           25%
                                                               
                                                             22%

                                           20%                                                                                
                                                                                                       16%                    16%
                                                                          15%
                                           15%
                                                       
                                                     10%                                        
                                           10%                                                                            
                                                                                                7%                        7%
                                             5%


                                             0%
                                                           US                  UK               Germany                   Japan

Q: Do you believe other employee have leaked company confidential or proprietary information outside of company?
 indicate significantly significant differences between countries on left chart or between small and large companies within countries. (z-test/t-test at 95% confidence interval).


                                                                                        Copyright 2009 Trend Micro Inc.
Small Business IT Departments: Data
  Stealing Malware
 • The most prevalent form of IT protection from data stealing malware is installing
   security software, followed by restricting Internet access and issuing security policies.
 • Japanese small company end users are more likely to indicate their IT department can
   do a better job protecting them from Data Stealing malware than those in the U.K.
 • Overall more than one third of the small company employees indicated their IT
   department can do a better job educating them about Data Stealing Malware. In the
   U.K. and Japan, this percentage rises to almost 40%.

Country                                                                             US                        UK       Germany                Japan   Total
Sample size, n=                                                                     101                       141            148               58      448
What does your IT dept do to ensure
protection?
Install security software                                                          47%                       62%            61%               59%     58%
Restrict Internet access                                                           29%                       36%            29%               34%     32%
Issue security policies/Internet usage guidelines                                  30%                       32%            34%               28%     32%
Provide troubleshooting help                                                       26%                       28%          37%                14%    29%
Offer education and guidance                                                       28%                       26%            15%               17%     21%
IT Department can do a better job protecting
                                                                                   21%                    14%              21%               38%    21%
me
IT Department can do a better job educating me                                     30%                       39%            34%               41%     35%
             Q: What does your IT department do to ensure that you are protected from the threats or dangers of each? Data Stealing Malware
             Q: For which of the following threats do you believe your IT department can do a better job of protecting you/educating you?
              indicate statistically significant differences between countries. (z-test/t-test at 95% confidence interval).
                                                                                 Copyright 2009 Trend Micro Inc.
Small Business IT Departments: Data
  Stealing Malware
 • The most prevalent form of IT protection from data stealing malware is installing
   security software, followed by restricting Internet access and issuing security policies.
 • Japanese small company end users are more likely to indicate their IT department can
   do a better job protecting them from Data Stealing malware than those in the U.K.
 • Overall more than one third of the small company employees indicated their IT
   department can do a better job educating them about Data Stealing Malware. In the
   U.K. and Japan, this percentage rises to almost 40%.

Country                                                                             US                        UK       Germany                Japan   Total
Sample size, n=                                                                     101                       141            148               58      448
What does your IT dept do to ensure
protection?
Install security software                                                          47%                       62%            61%               59%     58%
Restrict Internet access                                                           29%                       36%            29%               34%     32%
Issue security policies/Internet usage guidelines                                  30%                       32%            34%               28%     32%
Provide troubleshooting help                                                       26%                       28%          37%                14%    29%
Offer education and guidance                                                       28%                       26%            15%               17%     21%
IT Department can do a better job protecting
                                                                                   21%                    14%              21%               38%    21%
me
IT Department can do a better job educating me                                     30%                       39%            34%               41%     35%
             Q: What does your IT department do to ensure that you are protected from the threats or dangers of each? Data Stealing Malware
             Q: For which of the following threats do you believe your IT department can do a better job of protecting you/educating you?
              indicate statistically significant differences between countries. (z-test/t-test at 95% confidence interval).
                                                                                 Copyright 2009 Trend Micro Inc.

Contenu connexe

Similaire à 2010 corporate end user study

2010 Edelman Trust Barometer - Indonesia
2010 Edelman Trust Barometer - Indonesia2010 Edelman Trust Barometer - Indonesia
2010 Edelman Trust Barometer - IndonesiaEdelman Digital
 
Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...
Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...
Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...Altify
 
Wisdom of crowds business intelligence market study findings overview
Wisdom of crowds business intelligence market study findings overviewWisdom of crowds business intelligence market study findings overview
Wisdom of crowds business intelligence market study findings overviewYellowfin
 
Crossing the Chasm with Marketing Automation Webinar with ActOn and Gleanster
Crossing the Chasm with Marketing Automation Webinar with ActOn and GleansterCrossing the Chasm with Marketing Automation Webinar with ActOn and Gleanster
Crossing the Chasm with Marketing Automation Webinar with ActOn and GleansterAct-On Software
 
SMBs: Crossing the Chasm with Marketing Automation
SMBs: Crossing the Chasm with Marketing AutomationSMBs: Crossing the Chasm with Marketing Automation
SMBs: Crossing the Chasm with Marketing AutomationAct-On Software
 
Small Business Pulse Report
Small Business Pulse Report Small Business Pulse Report
Small Business Pulse Report Constant Contact
 
Implications for Japan - Mobile Marketing at Mitsue Links
Implications for Japan - Mobile Marketing at Mitsue LinksImplications for Japan - Mobile Marketing at Mitsue Links
Implications for Japan - Mobile Marketing at Mitsue LinksMitsue-Links
 
Trust Barometer 2010 APAC Findings
Trust Barometer 2010 APAC FindingsTrust Barometer 2010 APAC Findings
Trust Barometer 2010 APAC FindingsEdelman APACMEA
 
Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...
Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...
Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...David Rico
 
Growth (Xactly Express)
Growth (Xactly Express)Growth (Xactly Express)
Growth (Xactly Express)XactlyCorp
 
The Brandware Social Insights Playbook
The Brandware Social Insights PlaybookThe Brandware Social Insights Playbook
The Brandware Social Insights PlaybookJared Degnan
 
Symantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec
 
2011 Edelman Trust Barometer: South Korea Insights
2011 Edelman Trust Barometer: South Korea Insights2011 Edelman Trust Barometer: South Korea Insights
2011 Edelman Trust Barometer: South Korea InsightsEdelman Korea
 
Global Opportunities for Social & Mobiles Games - Rex Ng, 6waves
Global Opportunities for Social & Mobiles Games -  Rex Ng, 6waves  Global Opportunities for Social & Mobiles Games -  Rex Ng, 6waves
Global Opportunities for Social & Mobiles Games - Rex Ng, 6waves LondonGamesConference
 
Edelman Trust Barometer 2011 China Findings
Edelman Trust Barometer 2011 China FindingsEdelman Trust Barometer 2011 China Findings
Edelman Trust Barometer 2011 China FindingsEdelman APACMEA
 

Similaire à 2010 corporate end user study (20)

What's Your Business Grade?
What's Your Business Grade?What's Your Business Grade?
What's Your Business Grade?
 
2010 Edelman Trust Barometer - Indonesia
2010 Edelman Trust Barometer - Indonesia2010 Edelman Trust Barometer - Indonesia
2010 Edelman Trust Barometer - Indonesia
 
Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...
Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...
Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...
 
Wisdom of crowds business intelligence market study findings overview
Wisdom of crowds business intelligence market study findings overviewWisdom of crowds business intelligence market study findings overview
Wisdom of crowds business intelligence market study findings overview
 
Mobile Devices MetaPress
Mobile Devices MetaPressMobile Devices MetaPress
Mobile Devices MetaPress
 
Mobile ecosystem
Mobile ecosystemMobile ecosystem
Mobile ecosystem
 
Crossing the Chasm with Marketing Automation Webinar with ActOn and Gleanster
Crossing the Chasm with Marketing Automation Webinar with ActOn and GleansterCrossing the Chasm with Marketing Automation Webinar with ActOn and Gleanster
Crossing the Chasm with Marketing Automation Webinar with ActOn and Gleanster
 
SMBs: Crossing the Chasm with Marketing Automation
SMBs: Crossing the Chasm with Marketing AutomationSMBs: Crossing the Chasm with Marketing Automation
SMBs: Crossing the Chasm with Marketing Automation
 
Small Business Pulse Report
Small Business Pulse Report Small Business Pulse Report
Small Business Pulse Report
 
Peter Field - IPA DATAbank
Peter Field - IPA DATAbankPeter Field - IPA DATAbank
Peter Field - IPA DATAbank
 
Implications for Japan - Mobile Marketing at Mitsue Links
Implications for Japan - Mobile Marketing at Mitsue LinksImplications for Japan - Mobile Marketing at Mitsue Links
Implications for Japan - Mobile Marketing at Mitsue Links
 
Trust Barometer 2010 APAC Findings
Trust Barometer 2010 APAC FindingsTrust Barometer 2010 APAC Findings
Trust Barometer 2010 APAC Findings
 
Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...
Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...
Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...
 
Growth (Xactly Express)
Growth (Xactly Express)Growth (Xactly Express)
Growth (Xactly Express)
 
The Brandware Social Insights Playbook
The Brandware Social Insights PlaybookThe Brandware Social Insights Playbook
The Brandware Social Insights Playbook
 
Symantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery Study
 
2011 Edelman Trust Barometer: South Korea Insights
2011 Edelman Trust Barometer: South Korea Insights2011 Edelman Trust Barometer: South Korea Insights
2011 Edelman Trust Barometer: South Korea Insights
 
Global Opportunities for Social & Mobiles Games - Rex Ng, 6waves
Global Opportunities for Social & Mobiles Games -  Rex Ng, 6waves  Global Opportunities for Social & Mobiles Games -  Rex Ng, 6waves
Global Opportunities for Social & Mobiles Games - Rex Ng, 6waves
 
Edelman Trust Barometer 2011 China Findings
Edelman Trust Barometer 2011 China FindingsEdelman Trust Barometer 2011 China Findings
Edelman Trust Barometer 2011 China Findings
 
Perspectives on Discoverability in Mobile
Perspectives on Discoverability in MobilePerspectives on Discoverability in Mobile
Perspectives on Discoverability in Mobile
 

Plus de Andrew Wong

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing ReportAndrew Wong
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongAndrew Wong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Andrew Wong
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail IndustryAndrew Wong
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBAndrew Wong
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapAndrew Wong
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in MarketingAndrew Wong
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13Andrew Wong
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Andrew Wong
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution GuideAndrew Wong
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyAndrew Wong
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization surveyAndrew Wong
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportAndrew Wong
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious emailAndrew Wong
 
Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7Andrew Wong
 
Introdution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUESTIntrodution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUESTAndrew Wong
 

Plus de Andrew Wong (20)

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong Kong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail Industry
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMB
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And Roadmap
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in Marketing
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution Guide
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security study
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research report
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 
Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7
 
Introdution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUESTIntrodution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUEST
 

Dernier

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Dernier (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

2010 corporate end user study

  • 1. 2010 Corporate End User Study Small Business Findings Classification 03/28/13 Copyright 2009 Trend Micro Inc. 1
  • 2. Methodology • 1,600 surveys in total, 400 corporate computer end-users were surveyed online per country in four countries: U.S., Japan, Germany and U.K, during March 2010. • Qualification Criteria: – Full-time employed, with e-mail and Internet access at work – Use computers over 5 hours per week at work • Quotas were set by size and type of computer as follows: – 25% (n=100) large company, use desktop or workstation most often – 25% (n=100) large company, use a laptop or notebook most often – 25% (n=100) smaller company, use desktop or workstation most often – 25% (n=100) smaller company, use a laptop or notebook most often • In the US, UK and Germany, the split between large and smaller company was made at 500 employees. In Japan, the split was made at 250 employees. Copyright 2009 Trend Micro Inc.
  • 3. Seriousness of Computer Security Threats • Viruses, Trojans and data stealing malware are considered the most serious security threats among corporate workers in small businesses. Country Total Sample size, n= Varies by Threat Viruses 63% Trojans 60% Data Stealing Malware 59% Data Leakage 56% Spyware 55% Fake Antivirus or Rogue Antivirus 52% Phishing 48% Spam 40% Q: How serious of a threat do you think each of the following are to you at work? A: Top 2 Box on 5 point scale (5= “very serious”) Base: Users aware of each type of threat. Copyright 2009 Trend Micro Inc.
  • 4. Company Policies to Prevent Data Leakage • In all countries, large organizations are significantly more likely to have preventative policies in place than small companies. Company Policy f or Dat a Leak age by Size of Company Small Large  90%   81% 80% 69%  71%  70% 61% 60% 60%      48% 47% 50% 46% 44% 44% 40% 30% 20% 10% 0% Total US UK Germany Japan Q: Does your company currently have a policy for preventing data leakage?  indicate significantly significant differences between countries or between small and large companies within countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 5. Training to Prevent Data Leakage • For those small businesses that have preventive data leak policies in place, employees in large companies are also significantly more likely to have received training on data leak prevention than those in small companies. Have you been t r ained on t he dat a leak age policy? Small Large 80%  70% 70% 61%  60% 50%  39% 40% 30%  30% 20% 10% 0% Yes No Q: Have you been trained on the policy for data leakage prevention? Base: End users in companies with a data leakage policy.  indicate significantly significant differences between countries or between small and large companies within countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 6. Knowledge of Company Data • In the UK, end users in large companies are significantly more likely to indicate knowledge of confidential information than those in smaller companies. Know ledge of Company Dat a by Size of Com pany Small Large  80% 73% 70%  70% 63% 65% 61% 62% 60% 50% 40% 40% 33% 30% 20% 10% 0% US UK Germany Japan Q: Do you know what type of company data is confidential and proprietary?  indicate significantly significant differences between size brackets or between desktop and laptop users within countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 7. Seriousness of Computer Security Threats: US • End users in the large US companies are significantly more likely to indicate data leakage as a serious threat than those in smaller companies. By Size of Com pany 69% Viruses 69% 69% Trojans 64% Data Stealing 62% Malware 68% Fake Antivirus or 61% Rogue Antivirus 64% 58% Spyware 59% 49%  Data Leakage 74%  48% Phishing 53% Small 39% Spam 42% Large 0% 20% 40% 60% 80% Q: How serious of a threat do you think each of the following are to you at work? A: Top 2 Box on 5 point scale (5= “very serious”) Base: Users aware of each type of threat.  indicate significantly significant differences between size brackets or between desktop and laptop users within countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 8. Leakage of Company Confidential Data – Other Employees • Data leakage by other employees is more widely believed in large organizations in all countries. Have ot her employees leak ed dat a? by Size of Company Small Large  30% 27% 25%  22% 20%    16% 16% 15% 15%  10%  10%  7% 7% 5% 0% US UK Germany Japan Q: Do you believe other employee have leaked company confidential or proprietary information outside of company?  indicate significantly significant differences between countries on left chart or between small and large companies within countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 9. Small Business IT Departments: Data Stealing Malware • The most prevalent form of IT protection from data stealing malware is installing security software, followed by restricting Internet access and issuing security policies. • Japanese small company end users are more likely to indicate their IT department can do a better job protecting them from Data Stealing malware than those in the U.K. • Overall more than one third of the small company employees indicated their IT department can do a better job educating them about Data Stealing Malware. In the U.K. and Japan, this percentage rises to almost 40%. Country US UK Germany Japan Total Sample size, n= 101 141 148 58 448 What does your IT dept do to ensure protection? Install security software 47% 62% 61% 59% 58% Restrict Internet access 29% 36% 29% 34% 32% Issue security policies/Internet usage guidelines 30% 32% 34% 28% 32% Provide troubleshooting help 26% 28% 37% 14% 29% Offer education and guidance 28% 26% 15% 17% 21% IT Department can do a better job protecting 21% 14% 21% 38% 21% me IT Department can do a better job educating me 30% 39% 34% 41% 35% Q: What does your IT department do to ensure that you are protected from the threats or dangers of each? Data Stealing Malware Q: For which of the following threats do you believe your IT department can do a better job of protecting you/educating you?  indicate statistically significant differences between countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 10. Small Business IT Departments: Data Stealing Malware • The most prevalent form of IT protection from data stealing malware is installing security software, followed by restricting Internet access and issuing security policies. • Japanese small company end users are more likely to indicate their IT department can do a better job protecting them from Data Stealing malware than those in the U.K. • Overall more than one third of the small company employees indicated their IT department can do a better job educating them about Data Stealing Malware. In the U.K. and Japan, this percentage rises to almost 40%. Country US UK Germany Japan Total Sample size, n= 101 141 148 58 448 What does your IT dept do to ensure protection? Install security software 47% 62% 61% 59% 58% Restrict Internet access 29% 36% 29% 34% 32% Issue security policies/Internet usage guidelines 30% 32% 34% 28% 32% Provide troubleshooting help 26% 28% 37% 14% 29% Offer education and guidance 28% 26% 15% 17% 21% IT Department can do a better job protecting 21% 14% 21% 38% 21% me IT Department can do a better job educating me 30% 39% 34% 41% 35% Q: What does your IT department do to ensure that you are protected from the threats or dangers of each? Data Stealing Malware Q: For which of the following threats do you believe your IT department can do a better job of protecting you/educating you?  indicate statistically significant differences between countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.