HomeTopicsHardware

Hardware

Cybersecurity statistics about hardware

Showing 1-20 of 21 results

In the UK, 37% of respondents believe hardware security keys and device-bound passkeys are the most secure authentication methods, up from 17% in 2024 (a 20-point increase).

In the US, 34% of respondents identify hardware security keys/passkeys as the most secure option, up from 18% last year (a 16-point increase)

Only 3% of Americans believed in using a hardware security key as the most secure method, despite it being considered the most effective tool to stop phishing.

On average, IT and security decision-makers report having approximately 80 printers that are redundant or are in the process of being decommissioned within their organizations.

36% of IT and security decision-makers apply firmware updates promptly during the Ongoing Management stage.

IT teams spend 3.5 hours per printer per month managing hardware and firmware security issues.

More than half (51%) of IT and security decision-makers cannot confirm if a printer has been tampered with in the factory or in transit once it arrives.

Only 32% of IT and security decision-makers can detect security events linked to hardware-level attacks.

86% of IT and security decision-makers say data security is a barrier to printer reuse, resale, or recycling.

1-in-10 (10%) of IT and security decision-makers insist on destroying both the device and its storage drives to ensure data security.

35% of IT and security decision-makers are uncertain whether printers can be fully and safely wiped using current sanitisation solutions.

60% of IT and security decision-makers warn that a lack of collaboration between procurement, IT, and security puts their organization at risk.

1-in-4 (25%) of IT and security decision-makers believe it’s necessary to physically destroy printer storage drives.

54% of IT and security decision-makers fail to request technical documentation to validate security claims.

55% of IT and security decision-makers fail to submit vendor responses to security teams for review.

Only 38% of IT and security decision-makers say procurement, IT, and security collaborate to define printer security standards during the Supplier Selection & Onboarding stage.

42% of IT and security decision-makers fail to involve IT/security teams in vendor presentations.

Only 35% of IT and security decision-makers are able to identify vulnerable printers based on newly published hardware or firmware vulnerabilities.

Only 34% of IT and security decision-makers can track unauthorized hardware changes made by users or support teams.

70% of IT and security decision-makers are increasingly worried about offline threats, such as employees printing and mishandling sensitive company information.