SlideShare a Scribd company logo
2010 Corporate End User Study
Small Business Findings


                          Classification 03/28/13   Copyright 2009 Trend Micro Inc.   1
Methodology
• 1,600 surveys in total, 400 corporate computer end-users were
  surveyed online per country in four countries: U.S., Japan,
  Germany and U.K, during March 2010.
• Qualification Criteria:
   – Full-time employed, with e-mail and Internet access at work
   – Use computers over 5 hours per week at work
• Quotas were set by size and type of computer as follows:
   –   25% (n=100) large company, use desktop or workstation most often
   –   25% (n=100) large company, use a laptop or notebook most often
   –   25% (n=100) smaller company, use desktop or workstation most often
   –   25% (n=100) smaller company, use a laptop or notebook most often
• In the US, UK and Germany, the split between large and smaller
  company was made at 500 employees. In Japan, the split was
  made at 250 employees.




                                      Copyright 2009 Trend Micro Inc.
Seriousness of Computer Security Threats
  • Viruses, Trojans and data stealing malware are considered the most serious
    security threats among corporate workers in small businesses.




                              Country                                                                                       Total
                              Sample size, n=                                                                     Varies by Threat
                              Viruses                                                                                       63%
                              Trojans                                                                                       60%
                              Data Stealing Malware                                                                         59%
                              Data Leakage                                                                                  56%
                              Spyware                                                                                       55%
                              Fake Antivirus or Rogue Antivirus                                                             52%
                              Phishing                                                                                      48%
                              Spam                                                                                          40%

Q: How serious of a threat do you think each of the following are to you at work? A: Top 2 Box on 5 point scale (5= “very serious”) Base: Users aware of each type of threat.



                                                                                          Copyright 2009 Trend Micro Inc.
Company Policies to Prevent Data Leakage
• In all countries, large organizations are significantly more likely to have preventative
  policies in place than small companies.



                                                               Company Policy f or Dat a Leak age
                                                                    by Size of Company
                                                                      Small          Large                                       
                                                90%
                                                                                                                              81%
                                                80%
                                                               69%
                                                                                                71%                     
                                                70%
                                                                               61%                              60%
                                                60%                                                                 
                                                                                                          48%    47%
                                                50% 46%                  44%             44%
                                                40%

                                                30%

                                                20%

                                                10%

                                                  0%
                                                            Total             US               UK            Germany         Japan
  Q: Does your company currently have a policy for preventing data leakage?
   indicate significantly significant differences between countries or between small and large companies within countries. (z-test/t-test at 95% confidence interval).

                                                                                       Copyright 2009 Trend Micro Inc.
Training to Prevent Data Leakage
  • For those small businesses that have preventive data leak policies in place,
    employees in large companies are also significantly more likely to have received
    training on data leak prevention than those in small companies.


                                                                  Have you been t r ained on t he dat a
                                                                           leak age policy?
                                                                          Small           Large
                                                    80%                                     
                                                                                    70%
                                                    70%
                                                                    61% 
                                                    60%

                                                    50%
                                                                                                                         
                                                                                                                39%
                                                    40%
                                                                                                                                  30% 
                                                    30%

                                                    20%

                                                    10%

                                                      0%
                                                                             Yes                                             No
Q: Have you been trained on the policy for data leakage prevention? Base: End users in companies with a data leakage policy.
 indicate significantly significant differences between countries or between small and large companies within countries. (z-test/t-test at 95% confidence interval).



                                                                                           Copyright 2009 Trend Micro Inc.
Knowledge of Company Data
  • In the UK, end users in large companies are significantly more likely to indicate
    knowledge of confidential information than those in smaller companies.




                                                                Know ledge of Company Dat a
                                                                    by Size of Com pany
                                                                     Small          Large
                                                                                    
                                             80%
                                                                                   73%
                                                               70%          
                                             70%
                                                                           63%                           65%
                                                       61%                                     62%
                                             60%

                                             50%
                                                                                                                               40%
                                             40%
                                                                                                                        33%
                                             30%

                                             20%

                                             10%

                                              0%
                                                             US                  UK             Germany                      Japan
Q: Do you know what type of company data is confidential and proprietary?
 indicate significantly significant differences between size brackets or between desktop and laptop users within countries. (z-test/t-test at 95% confidence interval).


                                                                                           Copyright 2009 Trend Micro Inc.
Seriousness of Computer Security Threats:
 US
 • End users in the large US companies are significantly more likely to indicate data
   leakage as a serious threat than those in smaller companies.
                                                                          By Size of Com pany
                                                                                                                           69%
                                                Viruses
                                                                                                                           69%

                                                                                                                           69%
                                               Trojans
                                                                                                                    64%

                                        Data Stealing                                                             62%
                                          Malware                                                                          68%

                                    Fake Antivirus or                                                            61%
                                    Rogue Antivirus                                                                 64%

                                                                                                              58%
                                              Spyware
                                                                                                               59%

                                                                                                     49% 
                                        Data Leakage
                                                                                                                             74% 

                                                                                                   48%
                                              Phishing
                                                                                                         53%
                                                                                                                                 Small
                                                                                           39%
                                                 Spam
                                                                                             42%                                 Large

                                                       0%              20%              40%                60%                   80%

Q: How serious of a threat do you think each of the following are to you at work? A: Top 2 Box on 5 point scale (5= “very serious”) Base: Users aware of each type of threat.
 indicate significantly significant differences between size brackets or between desktop and laptop users within countries. (z-test/t-test at 95% confidence interval).


                                                                                         Copyright 2009 Trend Micro Inc.
Leakage of Company Confidential Data – Other
Employees
• Data leakage by other employees is more widely believed in large organizations in
  all countries.

                                                        Have ot her employees leak ed dat a?
                                                                by Size of Company
                                                                  Small        Large
                                                                                   
                                           30%
                                                                                  27%

                                           25%
                                                               
                                                             22%

                                           20%                                                                                
                                                                                                       16%                    16%
                                                                          15%
                                           15%
                                                       
                                                     10%                                        
                                           10%                                                                            
                                                                                                7%                        7%
                                             5%


                                             0%
                                                           US                  UK               Germany                   Japan

Q: Do you believe other employee have leaked company confidential or proprietary information outside of company?
 indicate significantly significant differences between countries on left chart or between small and large companies within countries. (z-test/t-test at 95% confidence interval).


                                                                                        Copyright 2009 Trend Micro Inc.
Small Business IT Departments: Data
  Stealing Malware
 • The most prevalent form of IT protection from data stealing malware is installing
   security software, followed by restricting Internet access and issuing security policies.
 • Japanese small company end users are more likely to indicate their IT department can
   do a better job protecting them from Data Stealing malware than those in the U.K.
 • Overall more than one third of the small company employees indicated their IT
   department can do a better job educating them about Data Stealing Malware. In the
   U.K. and Japan, this percentage rises to almost 40%.

Country                                                                             US                        UK       Germany                Japan   Total
Sample size, n=                                                                     101                       141            148               58      448
What does your IT dept do to ensure
protection?
Install security software                                                          47%                       62%            61%               59%     58%
Restrict Internet access                                                           29%                       36%            29%               34%     32%
Issue security policies/Internet usage guidelines                                  30%                       32%            34%               28%     32%
Provide troubleshooting help                                                       26%                       28%          37%                14%    29%
Offer education and guidance                                                       28%                       26%            15%               17%     21%
IT Department can do a better job protecting
                                                                                   21%                    14%              21%               38%    21%
me
IT Department can do a better job educating me                                     30%                       39%            34%               41%     35%
             Q: What does your IT department do to ensure that you are protected from the threats or dangers of each? Data Stealing Malware
             Q: For which of the following threats do you believe your IT department can do a better job of protecting you/educating you?
              indicate statistically significant differences between countries. (z-test/t-test at 95% confidence interval).
                                                                                 Copyright 2009 Trend Micro Inc.
Small Business IT Departments: Data
  Stealing Malware
 • The most prevalent form of IT protection from data stealing malware is installing
   security software, followed by restricting Internet access and issuing security policies.
 • Japanese small company end users are more likely to indicate their IT department can
   do a better job protecting them from Data Stealing malware than those in the U.K.
 • Overall more than one third of the small company employees indicated their IT
   department can do a better job educating them about Data Stealing Malware. In the
   U.K. and Japan, this percentage rises to almost 40%.

Country                                                                             US                        UK       Germany                Japan   Total
Sample size, n=                                                                     101                       141            148               58      448
What does your IT dept do to ensure
protection?
Install security software                                                          47%                       62%            61%               59%     58%
Restrict Internet access                                                           29%                       36%            29%               34%     32%
Issue security policies/Internet usage guidelines                                  30%                       32%            34%               28%     32%
Provide troubleshooting help                                                       26%                       28%          37%                14%    29%
Offer education and guidance                                                       28%                       26%            15%               17%     21%
IT Department can do a better job protecting
                                                                                   21%                    14%              21%               38%    21%
me
IT Department can do a better job educating me                                     30%                       39%            34%               41%     35%
             Q: What does your IT department do to ensure that you are protected from the threats or dangers of each? Data Stealing Malware
             Q: For which of the following threats do you believe your IT department can do a better job of protecting you/educating you?
              indicate statistically significant differences between countries. (z-test/t-test at 95% confidence interval).
                                                                                 Copyright 2009 Trend Micro Inc.

More Related Content

Similar to 2010 corporate end user study

2010 Edelman Trust Barometer - Indonesia
2010 Edelman Trust Barometer - Indonesia2010 Edelman Trust Barometer - Indonesia
2010 Edelman Trust Barometer - Indonesia
Edelman Digital
 
Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...
Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...
Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...Altify
 
Wisdom of crowds business intelligence market study findings overview
Wisdom of crowds business intelligence market study findings overviewWisdom of crowds business intelligence market study findings overview
Wisdom of crowds business intelligence market study findings overview
Yellowfin
 
Mobile Devices MetaPress
Mobile Devices MetaPressMobile Devices MetaPress
Mobile Devices MetaPress
Charleston Conference
 
Crossing the Chasm with Marketing Automation Webinar with ActOn and Gleanster
Crossing the Chasm with Marketing Automation Webinar with ActOn and GleansterCrossing the Chasm with Marketing Automation Webinar with ActOn and Gleanster
Crossing the Chasm with Marketing Automation Webinar with ActOn and GleansterAct-On Software
 
SMBs: Crossing the Chasm with Marketing Automation
SMBs: Crossing the Chasm with Marketing AutomationSMBs: Crossing the Chasm with Marketing Automation
SMBs: Crossing the Chasm with Marketing AutomationAct-On Software
 
Small Business Pulse Report
Small Business Pulse Report Small Business Pulse Report
Small Business Pulse Report
Constant Contact
 
Peter Field - IPA DATAbank
Peter Field - IPA DATAbankPeter Field - IPA DATAbank
Peter Field - IPA DATAbank
MediaCom Edinburgh
 
Implications for Japan - Mobile Marketing at Mitsue Links
Implications for Japan - Mobile Marketing at Mitsue LinksImplications for Japan - Mobile Marketing at Mitsue Links
Implications for Japan - Mobile Marketing at Mitsue Links
Mitsue-Links
 
Trust Barometer 2010 APAC Findings
Trust Barometer 2010 APAC FindingsTrust Barometer 2010 APAC Findings
Trust Barometer 2010 APAC Findings
Edelman APACMEA
 
Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...
Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...
Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...David Rico
 
Growth (Xactly Express)
Growth (Xactly Express)Growth (Xactly Express)
Growth (Xactly Express)XactlyCorp
 
The Brandware Social Insights Playbook
The Brandware Social Insights PlaybookThe Brandware Social Insights Playbook
The Brandware Social Insights Playbook
Jared Degnan
 
Symantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery Study
Symantec
 
2011 Edelman Trust Barometer: South Korea Insights
2011 Edelman Trust Barometer: South Korea Insights2011 Edelman Trust Barometer: South Korea Insights
2011 Edelman Trust Barometer: South Korea Insights
Edelman Korea
 
Global Opportunities for Social & Mobiles Games - Rex Ng, 6waves
Global Opportunities for Social & Mobiles Games -  Rex Ng, 6waves  Global Opportunities for Social & Mobiles Games -  Rex Ng, 6waves
Global Opportunities for Social & Mobiles Games - Rex Ng, 6waves LondonGamesConference
 
Edelman Trust Barometer 2011 China Findings
Edelman Trust Barometer 2011 China FindingsEdelman Trust Barometer 2011 China Findings
Edelman Trust Barometer 2011 China Findings
Edelman APACMEA
 
Perspectives on Discoverability in Mobile
Perspectives on Discoverability in MobilePerspectives on Discoverability in Mobile
Perspectives on Discoverability in Mobile
Radius Global Market Research
 

Similar to 2010 corporate end user study (20)

What's Your Business Grade?
What's Your Business Grade?What's Your Business Grade?
What's Your Business Grade?
 
2010 Edelman Trust Barometer - Indonesia
2010 Edelman Trust Barometer - Indonesia2010 Edelman Trust Barometer - Indonesia
2010 Edelman Trust Barometer - Indonesia
 
Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...
Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...
Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...
 
Wisdom of crowds business intelligence market study findings overview
Wisdom of crowds business intelligence market study findings overviewWisdom of crowds business intelligence market study findings overview
Wisdom of crowds business intelligence market study findings overview
 
Mobile Devices MetaPress
Mobile Devices MetaPressMobile Devices MetaPress
Mobile Devices MetaPress
 
Mobile ecosystem
Mobile ecosystemMobile ecosystem
Mobile ecosystem
 
Crossing the Chasm with Marketing Automation Webinar with ActOn and Gleanster
Crossing the Chasm with Marketing Automation Webinar with ActOn and GleansterCrossing the Chasm with Marketing Automation Webinar with ActOn and Gleanster
Crossing the Chasm with Marketing Automation Webinar with ActOn and Gleanster
 
SMBs: Crossing the Chasm with Marketing Automation
SMBs: Crossing the Chasm with Marketing AutomationSMBs: Crossing the Chasm with Marketing Automation
SMBs: Crossing the Chasm with Marketing Automation
 
Small Business Pulse Report
Small Business Pulse Report Small Business Pulse Report
Small Business Pulse Report
 
Peter Field - IPA DATAbank
Peter Field - IPA DATAbankPeter Field - IPA DATAbank
Peter Field - IPA DATAbank
 
Implications for Japan - Mobile Marketing at Mitsue Links
Implications for Japan - Mobile Marketing at Mitsue LinksImplications for Japan - Mobile Marketing at Mitsue Links
Implications for Japan - Mobile Marketing at Mitsue Links
 
Trust Barometer 2010 APAC Findings
Trust Barometer 2010 APAC FindingsTrust Barometer 2010 APAC Findings
Trust Barometer 2010 APAC Findings
 
Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...
Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...
Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...
 
Growth (Xactly Express)
Growth (Xactly Express)Growth (Xactly Express)
Growth (Xactly Express)
 
The Brandware Social Insights Playbook
The Brandware Social Insights PlaybookThe Brandware Social Insights Playbook
The Brandware Social Insights Playbook
 
Symantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery Study
 
2011 Edelman Trust Barometer: South Korea Insights
2011 Edelman Trust Barometer: South Korea Insights2011 Edelman Trust Barometer: South Korea Insights
2011 Edelman Trust Barometer: South Korea Insights
 
Global Opportunities for Social & Mobiles Games - Rex Ng, 6waves
Global Opportunities for Social & Mobiles Games -  Rex Ng, 6waves  Global Opportunities for Social & Mobiles Games -  Rex Ng, 6waves
Global Opportunities for Social & Mobiles Games - Rex Ng, 6waves
 
Edelman Trust Barometer 2011 China Findings
Edelman Trust Barometer 2011 China FindingsEdelman Trust Barometer 2011 China Findings
Edelman Trust Barometer 2011 China Findings
 
Perspectives on Discoverability in Mobile
Perspectives on Discoverability in MobilePerspectives on Discoverability in Mobile
Perspectives on Discoverability in Mobile
 

More from Andrew Wong

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
Andrew Wong
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong Kong
Andrew Wong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012
Andrew Wong
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail Industry
Andrew Wong
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMB
Andrew Wong
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And Roadmap
Andrew Wong
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in Marketing
Andrew Wong
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13
Andrew Wong
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8
Andrew Wong
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution Guide
Andrew Wong
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyAndrew Wong
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization surveyAndrew Wong
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportAndrew Wong
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
Andrew Wong
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
Andrew Wong
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious emailAndrew Wong
 
Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7
Andrew Wong
 
Introdution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUESTIntrodution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUEST
Andrew Wong
 

More from Andrew Wong (20)

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong Kong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail Industry
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMB
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And Roadmap
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in Marketing
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution Guide
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security study
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research report
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 
Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7
 
Introdution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUESTIntrodution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUEST
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

2010 corporate end user study

  • 1. 2010 Corporate End User Study Small Business Findings Classification 03/28/13 Copyright 2009 Trend Micro Inc. 1
  • 2. Methodology • 1,600 surveys in total, 400 corporate computer end-users were surveyed online per country in four countries: U.S., Japan, Germany and U.K, during March 2010. • Qualification Criteria: – Full-time employed, with e-mail and Internet access at work – Use computers over 5 hours per week at work • Quotas were set by size and type of computer as follows: – 25% (n=100) large company, use desktop or workstation most often – 25% (n=100) large company, use a laptop or notebook most often – 25% (n=100) smaller company, use desktop or workstation most often – 25% (n=100) smaller company, use a laptop or notebook most often • In the US, UK and Germany, the split between large and smaller company was made at 500 employees. In Japan, the split was made at 250 employees. Copyright 2009 Trend Micro Inc.
  • 3. Seriousness of Computer Security Threats • Viruses, Trojans and data stealing malware are considered the most serious security threats among corporate workers in small businesses. Country Total Sample size, n= Varies by Threat Viruses 63% Trojans 60% Data Stealing Malware 59% Data Leakage 56% Spyware 55% Fake Antivirus or Rogue Antivirus 52% Phishing 48% Spam 40% Q: How serious of a threat do you think each of the following are to you at work? A: Top 2 Box on 5 point scale (5= “very serious”) Base: Users aware of each type of threat. Copyright 2009 Trend Micro Inc.
  • 4. Company Policies to Prevent Data Leakage • In all countries, large organizations are significantly more likely to have preventative policies in place than small companies. Company Policy f or Dat a Leak age by Size of Company Small Large  90%   81% 80% 69%  71%  70% 61% 60% 60%      48% 47% 50% 46% 44% 44% 40% 30% 20% 10% 0% Total US UK Germany Japan Q: Does your company currently have a policy for preventing data leakage?  indicate significantly significant differences between countries or between small and large companies within countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 5. Training to Prevent Data Leakage • For those small businesses that have preventive data leak policies in place, employees in large companies are also significantly more likely to have received training on data leak prevention than those in small companies. Have you been t r ained on t he dat a leak age policy? Small Large 80%  70% 70% 61%  60% 50%  39% 40% 30%  30% 20% 10% 0% Yes No Q: Have you been trained on the policy for data leakage prevention? Base: End users in companies with a data leakage policy.  indicate significantly significant differences between countries or between small and large companies within countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 6. Knowledge of Company Data • In the UK, end users in large companies are significantly more likely to indicate knowledge of confidential information than those in smaller companies. Know ledge of Company Dat a by Size of Com pany Small Large  80% 73% 70%  70% 63% 65% 61% 62% 60% 50% 40% 40% 33% 30% 20% 10% 0% US UK Germany Japan Q: Do you know what type of company data is confidential and proprietary?  indicate significantly significant differences between size brackets or between desktop and laptop users within countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 7. Seriousness of Computer Security Threats: US • End users in the large US companies are significantly more likely to indicate data leakage as a serious threat than those in smaller companies. By Size of Com pany 69% Viruses 69% 69% Trojans 64% Data Stealing 62% Malware 68% Fake Antivirus or 61% Rogue Antivirus 64% 58% Spyware 59% 49%  Data Leakage 74%  48% Phishing 53% Small 39% Spam 42% Large 0% 20% 40% 60% 80% Q: How serious of a threat do you think each of the following are to you at work? A: Top 2 Box on 5 point scale (5= “very serious”) Base: Users aware of each type of threat.  indicate significantly significant differences between size brackets or between desktop and laptop users within countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 8. Leakage of Company Confidential Data – Other Employees • Data leakage by other employees is more widely believed in large organizations in all countries. Have ot her employees leak ed dat a? by Size of Company Small Large  30% 27% 25%  22% 20%    16% 16% 15% 15%  10%  10%  7% 7% 5% 0% US UK Germany Japan Q: Do you believe other employee have leaked company confidential or proprietary information outside of company?  indicate significantly significant differences between countries on left chart or between small and large companies within countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 9. Small Business IT Departments: Data Stealing Malware • The most prevalent form of IT protection from data stealing malware is installing security software, followed by restricting Internet access and issuing security policies. • Japanese small company end users are more likely to indicate their IT department can do a better job protecting them from Data Stealing malware than those in the U.K. • Overall more than one third of the small company employees indicated their IT department can do a better job educating them about Data Stealing Malware. In the U.K. and Japan, this percentage rises to almost 40%. Country US UK Germany Japan Total Sample size, n= 101 141 148 58 448 What does your IT dept do to ensure protection? Install security software 47% 62% 61% 59% 58% Restrict Internet access 29% 36% 29% 34% 32% Issue security policies/Internet usage guidelines 30% 32% 34% 28% 32% Provide troubleshooting help 26% 28% 37% 14% 29% Offer education and guidance 28% 26% 15% 17% 21% IT Department can do a better job protecting 21% 14% 21% 38% 21% me IT Department can do a better job educating me 30% 39% 34% 41% 35% Q: What does your IT department do to ensure that you are protected from the threats or dangers of each? Data Stealing Malware Q: For which of the following threats do you believe your IT department can do a better job of protecting you/educating you?  indicate statistically significant differences between countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 10. Small Business IT Departments: Data Stealing Malware • The most prevalent form of IT protection from data stealing malware is installing security software, followed by restricting Internet access and issuing security policies. • Japanese small company end users are more likely to indicate their IT department can do a better job protecting them from Data Stealing malware than those in the U.K. • Overall more than one third of the small company employees indicated their IT department can do a better job educating them about Data Stealing Malware. In the U.K. and Japan, this percentage rises to almost 40%. Country US UK Germany Japan Total Sample size, n= 101 141 148 58 448 What does your IT dept do to ensure protection? Install security software 47% 62% 61% 59% 58% Restrict Internet access 29% 36% 29% 34% 32% Issue security policies/Internet usage guidelines 30% 32% 34% 28% 32% Provide troubleshooting help 26% 28% 37% 14% 29% Offer education and guidance 28% 26% 15% 17% 21% IT Department can do a better job protecting 21% 14% 21% 38% 21% me IT Department can do a better job educating me 30% 39% 34% 41% 35% Q: What does your IT department do to ensure that you are protected from the threats or dangers of each? Data Stealing Malware Q: For which of the following threats do you believe your IT department can do a better job of protecting you/educating you?  indicate statistically significant differences between countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.