Cybersecurity statistics about hardware
Showing 1-20 of 21 results
In the UK, 37% of respondents believe hardware security keys and device-bound passkeys are the most secure authentication methods, up from 17% in 2024 (a 20-point increase).
In the US, 34% of respondents identify hardware security keys/passkeys as the most secure option, up from 18% last year (a 16-point increase)
Only 3% of Americans believed in using a hardware security key as the most secure method, despite it being considered the most effective tool to stop phishing.
On average, IT and security decision-makers report having approximately 80 printers that are redundant or are in the process of being decommissioned within their organizations.
36% of IT and security decision-makers apply firmware updates promptly during the Ongoing Management stage.
IT teams spend 3.5 hours per printer per month managing hardware and firmware security issues.
More than half (51%) of IT and security decision-makers cannot confirm if a printer has been tampered with in the factory or in transit once it arrives.
Only 32% of IT and security decision-makers can detect security events linked to hardware-level attacks.
86% of IT and security decision-makers say data security is a barrier to printer reuse, resale, or recycling.
1-in-10 (10%) of IT and security decision-makers insist on destroying both the device and its storage drives to ensure data security.
35% of IT and security decision-makers are uncertain whether printers can be fully and safely wiped using current sanitisation solutions.
60% of IT and security decision-makers warn that a lack of collaboration between procurement, IT, and security puts their organization at risk.
1-in-4 (25%) of IT and security decision-makers believe it’s necessary to physically destroy printer storage drives.
54% of IT and security decision-makers fail to request technical documentation to validate security claims.
55% of IT and security decision-makers fail to submit vendor responses to security teams for review.
Only 38% of IT and security decision-makers say procurement, IT, and security collaborate to define printer security standards during the Supplier Selection & Onboarding stage.
42% of IT and security decision-makers fail to involve IT/security teams in vendor presentations.
Only 35% of IT and security decision-makers are able to identify vulnerable printers based on newly published hardware or firmware vulnerabilities.
Only 34% of IT and security decision-makers can track unauthorized hardware changes made by users or support teams.
70% of IT and security decision-makers are increasingly worried about offline threats, such as employees printing and mishandling sensitive company information.