2010 Corporate End User Study
Small Business Findings


                          Classification 03/28/13   Copyright 2009 Trend Micro Inc.   1
Methodology
• 1,600 surveys in total, 400 corporate computer end-users were
  surveyed online per country in four countries: U.S., Japan,
  Germany and U.K, during March 2010.
• Qualification Criteria:
   – Full-time employed, with e-mail and Internet access at work
   – Use computers over 5 hours per week at work
• Quotas were set by size and type of computer as follows:
   –   25% (n=100) large company, use desktop or workstation most often
   –   25% (n=100) large company, use a laptop or notebook most often
   –   25% (n=100) smaller company, use desktop or workstation most often
   –   25% (n=100) smaller company, use a laptop or notebook most often
• In the US, UK and Germany, the split between large and smaller
  company was made at 500 employees. In Japan, the split was
  made at 250 employees.




                                      Copyright 2009 Trend Micro Inc.
Seriousness of Computer Security Threats
  • Viruses, Trojans and data stealing malware are considered the most serious
    security threats among corporate workers in small businesses.




                              Country                                                                                       Total
                              Sample size, n=                                                                     Varies by Threat
                              Viruses                                                                                       63%
                              Trojans                                                                                       60%
                              Data Stealing Malware                                                                         59%
                              Data Leakage                                                                                  56%
                              Spyware                                                                                       55%
                              Fake Antivirus or Rogue Antivirus                                                             52%
                              Phishing                                                                                      48%
                              Spam                                                                                          40%

Q: How serious of a threat do you think each of the following are to you at work? A: Top 2 Box on 5 point scale (5= “very serious”) Base: Users aware of each type of threat.



                                                                                          Copyright 2009 Trend Micro Inc.
Company Policies to Prevent Data Leakage
• In all countries, large organizations are significantly more likely to have preventative
  policies in place than small companies.



                                                               Company Policy f or Dat a Leak age
                                                                    by Size of Company
                                                                      Small          Large                                       
                                                90%
                                                                                                                              81%
                                                80%
                                                               69%
                                                                                                71%                     
                                                70%
                                                                               61%                              60%
                                                60%                                                                 
                                                                                                          48%    47%
                                                50% 46%                  44%             44%
                                                40%

                                                30%

                                                20%

                                                10%

                                                  0%
                                                            Total             US               UK            Germany         Japan
  Q: Does your company currently have a policy for preventing data leakage?
   indicate significantly significant differences between countries or between small and large companies within countries. (z-test/t-test at 95% confidence interval).

                                                                                       Copyright 2009 Trend Micro Inc.
Training to Prevent Data Leakage
  • For those small businesses that have preventive data leak policies in place,
    employees in large companies are also significantly more likely to have received
    training on data leak prevention than those in small companies.


                                                                  Have you been t r ained on t he dat a
                                                                           leak age policy?
                                                                          Small           Large
                                                    80%                                     
                                                                                    70%
                                                    70%
                                                                    61% 
                                                    60%

                                                    50%
                                                                                                                         
                                                                                                                39%
                                                    40%
                                                                                                                                  30% 
                                                    30%

                                                    20%

                                                    10%

                                                      0%
                                                                             Yes                                             No
Q: Have you been trained on the policy for data leakage prevention? Base: End users in companies with a data leakage policy.
 indicate significantly significant differences between countries or between small and large companies within countries. (z-test/t-test at 95% confidence interval).



                                                                                           Copyright 2009 Trend Micro Inc.
Knowledge of Company Data
  • In the UK, end users in large companies are significantly more likely to indicate
    knowledge of confidential information than those in smaller companies.




                                                                Know ledge of Company Dat a
                                                                    by Size of Com pany
                                                                     Small          Large
                                                                                    
                                             80%
                                                                                   73%
                                                               70%          
                                             70%
                                                                           63%                           65%
                                                       61%                                     62%
                                             60%

                                             50%
                                                                                                                               40%
                                             40%
                                                                                                                        33%
                                             30%

                                             20%

                                             10%

                                              0%
                                                             US                  UK             Germany                      Japan
Q: Do you know what type of company data is confidential and proprietary?
 indicate significantly significant differences between size brackets or between desktop and laptop users within countries. (z-test/t-test at 95% confidence interval).


                                                                                           Copyright 2009 Trend Micro Inc.
Seriousness of Computer Security Threats:
 US
 • End users in the large US companies are significantly more likely to indicate data
   leakage as a serious threat than those in smaller companies.
                                                                          By Size of Com pany
                                                                                                                           69%
                                                Viruses
                                                                                                                           69%

                                                                                                                           69%
                                               Trojans
                                                                                                                    64%

                                        Data Stealing                                                             62%
                                          Malware                                                                          68%

                                    Fake Antivirus or                                                            61%
                                    Rogue Antivirus                                                                 64%

                                                                                                              58%
                                              Spyware
                                                                                                               59%

                                                                                                     49% 
                                        Data Leakage
                                                                                                                             74% 

                                                                                                   48%
                                              Phishing
                                                                                                         53%
                                                                                                                                 Small
                                                                                           39%
                                                 Spam
                                                                                             42%                                 Large

                                                       0%              20%              40%                60%                   80%

Q: How serious of a threat do you think each of the following are to you at work? A: Top 2 Box on 5 point scale (5= “very serious”) Base: Users aware of each type of threat.
 indicate significantly significant differences between size brackets or between desktop and laptop users within countries. (z-test/t-test at 95% confidence interval).


                                                                                         Copyright 2009 Trend Micro Inc.
Leakage of Company Confidential Data – Other
Employees
• Data leakage by other employees is more widely believed in large organizations in
  all countries.

                                                        Have ot her employees leak ed dat a?
                                                                by Size of Company
                                                                  Small        Large
                                                                                   
                                           30%
                                                                                  27%

                                           25%
                                                               
                                                             22%

                                           20%                                                                                
                                                                                                       16%                    16%
                                                                          15%
                                           15%
                                                       
                                                     10%                                        
                                           10%                                                                            
                                                                                                7%                        7%
                                             5%


                                             0%
                                                           US                  UK               Germany                   Japan

Q: Do you believe other employee have leaked company confidential or proprietary information outside of company?
 indicate significantly significant differences between countries on left chart or between small and large companies within countries. (z-test/t-test at 95% confidence interval).


                                                                                        Copyright 2009 Trend Micro Inc.
Small Business IT Departments: Data
  Stealing Malware
 • The most prevalent form of IT protection from data stealing malware is installing
   security software, followed by restricting Internet access and issuing security policies.
 • Japanese small company end users are more likely to indicate their IT department can
   do a better job protecting them from Data Stealing malware than those in the U.K.
 • Overall more than one third of the small company employees indicated their IT
   department can do a better job educating them about Data Stealing Malware. In the
   U.K. and Japan, this percentage rises to almost 40%.

Country                                                                             US                        UK       Germany                Japan   Total
Sample size, n=                                                                     101                       141            148               58      448
What does your IT dept do to ensure
protection?
Install security software                                                          47%                       62%            61%               59%     58%
Restrict Internet access                                                           29%                       36%            29%               34%     32%
Issue security policies/Internet usage guidelines                                  30%                       32%            34%               28%     32%
Provide troubleshooting help                                                       26%                       28%          37%                14%    29%
Offer education and guidance                                                       28%                       26%            15%               17%     21%
IT Department can do a better job protecting
                                                                                   21%                    14%              21%               38%    21%
me
IT Department can do a better job educating me                                     30%                       39%            34%               41%     35%
             Q: What does your IT department do to ensure that you are protected from the threats or dangers of each? Data Stealing Malware
             Q: For which of the following threats do you believe your IT department can do a better job of protecting you/educating you?
              indicate statistically significant differences between countries. (z-test/t-test at 95% confidence interval).
                                                                                 Copyright 2009 Trend Micro Inc.
Small Business IT Departments: Data
  Stealing Malware
 • The most prevalent form of IT protection from data stealing malware is installing
   security software, followed by restricting Internet access and issuing security policies.
 • Japanese small company end users are more likely to indicate their IT department can
   do a better job protecting them from Data Stealing malware than those in the U.K.
 • Overall more than one third of the small company employees indicated their IT
   department can do a better job educating them about Data Stealing Malware. In the
   U.K. and Japan, this percentage rises to almost 40%.

Country                                                                             US                        UK       Germany                Japan   Total
Sample size, n=                                                                     101                       141            148               58      448
What does your IT dept do to ensure
protection?
Install security software                                                          47%                       62%            61%               59%     58%
Restrict Internet access                                                           29%                       36%            29%               34%     32%
Issue security policies/Internet usage guidelines                                  30%                       32%            34%               28%     32%
Provide troubleshooting help                                                       26%                       28%          37%                14%    29%
Offer education and guidance                                                       28%                       26%            15%               17%     21%
IT Department can do a better job protecting
                                                                                   21%                    14%              21%               38%    21%
me
IT Department can do a better job educating me                                     30%                       39%            34%               41%     35%
             Q: What does your IT department do to ensure that you are protected from the threats or dangers of each? Data Stealing Malware
             Q: For which of the following threats do you believe your IT department can do a better job of protecting you/educating you?
              indicate statistically significant differences between countries. (z-test/t-test at 95% confidence interval).
                                                                                 Copyright 2009 Trend Micro Inc.

More Related Content

PPTX
Présentation 2nd screen_public
PDF
Mom vs. Machine
PPTX
Connecting and Engaging Customers Through Social Media - John Fetto
PDF
An Inconvenient PR Truth Survey Report
PPTX
District and school board leadership for academy success
PPT
Amazon Web Services
PPTX
Android Security Essentials Presentation
PPT
Way forward
Présentation 2nd screen_public
Mom vs. Machine
Connecting and Engaging Customers Through Social Media - John Fetto
An Inconvenient PR Truth Survey Report
District and school board leadership for academy success
Amazon Web Services
Android Security Essentials Presentation
Way forward

Similar to 2010 corporate end user study (20)

PPT
What's Your Business Grade?
PDF
2010 Edelman Trust Barometer - Indonesia
PPTX
Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...
PPTX
Wisdom of crowds business intelligence market study findings overview
PPSX
Mobile Devices MetaPress
PPT
Mobile ecosystem
PPTX
SMBs: Crossing the Chasm with Marketing Automation
PDF
Crossing the Chasm with Marketing Automation Webinar with ActOn and Gleanster
PPTX
Small Business Pulse Report
PDF
Peter Field - IPA DATAbank
PDF
Implications for Japan - Mobile Marketing at Mitsue Links
PDF
Trust Barometer 2010 APAC Findings
PDF
Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...
PDF
Growth (Xactly Express)
PDF
The Brandware Social Insights Playbook
PDF
Symantec 2010 Disaster Recovery Study
PDF
2011 Edelman Trust Barometer: South Korea Insights
PPTX
Global Opportunities for Social & Mobiles Games - Rex Ng, 6waves
PDF
Edelman Trust Barometer 2011 China Findings
PDF
Perspectives on Discoverability in Mobile
What's Your Business Grade?
2010 Edelman Trust Barometer - Indonesia
Sales Webinar | Leveraging Lessons Learned in 2012 to Exceed Financial Goals ...
Wisdom of crowds business intelligence market study findings overview
Mobile Devices MetaPress
Mobile ecosystem
SMBs: Crossing the Chasm with Marketing Automation
Crossing the Chasm with Marketing Automation Webinar with ActOn and Gleanster
Small Business Pulse Report
Peter Field - IPA DATAbank
Implications for Japan - Mobile Marketing at Mitsue Links
Trust Barometer 2010 APAC Findings
Lean & Agile Project Management: For Executives, Sr. Managers, & Key Decision...
Growth (Xactly Express)
The Brandware Social Insights Playbook
Symantec 2010 Disaster Recovery Study
2011 Edelman Trust Barometer: South Korea Insights
Global Opportunities for Social & Mobiles Games - Rex Ng, 6waves
Edelman Trust Barometer 2011 China Findings
Perspectives on Discoverability in Mobile
Ad

More from Andrew Wong (20)

PPT
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
PDF
Red Hat Training Briefing Hong Kong
PDF
Red Hat Training Catalog 2012
PDF
Big Data in Retail Industry
PDF
Cloud Solution Handbook for HKSMB
PPT
Oracle Social CRM Applications Strategy Overview And Roadmap
PDF
Introduction Google Script in Marketing
PDF
B2B Content Marketing Trend 2012-13
PDF
Introduction to Trend Micro Mobility Security 8
PDF
SolarWinds Network Solution Guide
PPT
Trend micro real time threat management press presentation
PPTX
Trend micro global consumer technology use & security study
PPTX
Trend micro data protection
PPT
Enterprise it consumerization survey
PPT
Trend micro smartphone consumer market research report
PDF
Introduction to Kaspersky Endpoint Security for Businesss
PPT
Introduction - The Smart Protection Network
PPT
Introduction trend micro malicious email
PPT
Trend Micro - Worry-Free Business Security 7
PDF
Introdution - Fujitsu PRIMEQUEST
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
Red Hat Training Briefing Hong Kong
Red Hat Training Catalog 2012
Big Data in Retail Industry
Cloud Solution Handbook for HKSMB
Oracle Social CRM Applications Strategy Overview And Roadmap
Introduction Google Script in Marketing
B2B Content Marketing Trend 2012-13
Introduction to Trend Micro Mobility Security 8
SolarWinds Network Solution Guide
Trend micro real time threat management press presentation
Trend micro global consumer technology use & security study
Trend micro data protection
Enterprise it consumerization survey
Trend micro smartphone consumer market research report
Introduction to Kaspersky Endpoint Security for Businesss
Introduction - The Smart Protection Network
Introduction trend micro malicious email
Trend Micro - Worry-Free Business Security 7
Introdution - Fujitsu PRIMEQUEST
Ad

Recently uploaded (20)

PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
DOCX
search engine optimization ppt fir known well about this
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
A comparative study of natural language inference in Swahili using monolingua...
Convolutional neural network based encoder-decoder for efficient real-time ob...
Abstractive summarization using multilingual text-to-text transfer transforme...
Module 1.ppt Iot fundamentals and Architecture
Custom Battery Pack Design Considerations for Performance and Safety
search engine optimization ppt fir known well about this
Getting started with AI Agents and Multi-Agent Systems
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Hindi spoken digit analysis for native and non-native speakers
1 - Historical Antecedents, Social Consideration.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
A review of recent deep learning applications in wood surface defect identifi...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Credit Without Borders: AI and Financial Inclusion in Bangladesh
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx

2010 corporate end user study

  • 1. 2010 Corporate End User Study Small Business Findings Classification 03/28/13 Copyright 2009 Trend Micro Inc. 1
  • 2. Methodology • 1,600 surveys in total, 400 corporate computer end-users were surveyed online per country in four countries: U.S., Japan, Germany and U.K, during March 2010. • Qualification Criteria: – Full-time employed, with e-mail and Internet access at work – Use computers over 5 hours per week at work • Quotas were set by size and type of computer as follows: – 25% (n=100) large company, use desktop or workstation most often – 25% (n=100) large company, use a laptop or notebook most often – 25% (n=100) smaller company, use desktop or workstation most often – 25% (n=100) smaller company, use a laptop or notebook most often • In the US, UK and Germany, the split between large and smaller company was made at 500 employees. In Japan, the split was made at 250 employees. Copyright 2009 Trend Micro Inc.
  • 3. Seriousness of Computer Security Threats • Viruses, Trojans and data stealing malware are considered the most serious security threats among corporate workers in small businesses. Country Total Sample size, n= Varies by Threat Viruses 63% Trojans 60% Data Stealing Malware 59% Data Leakage 56% Spyware 55% Fake Antivirus or Rogue Antivirus 52% Phishing 48% Spam 40% Q: How serious of a threat do you think each of the following are to you at work? A: Top 2 Box on 5 point scale (5= “very serious”) Base: Users aware of each type of threat. Copyright 2009 Trend Micro Inc.
  • 4. Company Policies to Prevent Data Leakage • In all countries, large organizations are significantly more likely to have preventative policies in place than small companies. Company Policy f or Dat a Leak age by Size of Company Small Large  90%   81% 80% 69%  71%  70% 61% 60% 60%      48% 47% 50% 46% 44% 44% 40% 30% 20% 10% 0% Total US UK Germany Japan Q: Does your company currently have a policy for preventing data leakage?  indicate significantly significant differences between countries or between small and large companies within countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 5. Training to Prevent Data Leakage • For those small businesses that have preventive data leak policies in place, employees in large companies are also significantly more likely to have received training on data leak prevention than those in small companies. Have you been t r ained on t he dat a leak age policy? Small Large 80%  70% 70% 61%  60% 50%  39% 40% 30%  30% 20% 10% 0% Yes No Q: Have you been trained on the policy for data leakage prevention? Base: End users in companies with a data leakage policy.  indicate significantly significant differences between countries or between small and large companies within countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 6. Knowledge of Company Data • In the UK, end users in large companies are significantly more likely to indicate knowledge of confidential information than those in smaller companies. Know ledge of Company Dat a by Size of Com pany Small Large  80% 73% 70%  70% 63% 65% 61% 62% 60% 50% 40% 40% 33% 30% 20% 10% 0% US UK Germany Japan Q: Do you know what type of company data is confidential and proprietary?  indicate significantly significant differences between size brackets or between desktop and laptop users within countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 7. Seriousness of Computer Security Threats: US • End users in the large US companies are significantly more likely to indicate data leakage as a serious threat than those in smaller companies. By Size of Com pany 69% Viruses 69% 69% Trojans 64% Data Stealing 62% Malware 68% Fake Antivirus or 61% Rogue Antivirus 64% 58% Spyware 59% 49%  Data Leakage 74%  48% Phishing 53% Small 39% Spam 42% Large 0% 20% 40% 60% 80% Q: How serious of a threat do you think each of the following are to you at work? A: Top 2 Box on 5 point scale (5= “very serious”) Base: Users aware of each type of threat.  indicate significantly significant differences between size brackets or between desktop and laptop users within countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 8. Leakage of Company Confidential Data – Other Employees • Data leakage by other employees is more widely believed in large organizations in all countries. Have ot her employees leak ed dat a? by Size of Company Small Large  30% 27% 25%  22% 20%    16% 16% 15% 15%  10%  10%  7% 7% 5% 0% US UK Germany Japan Q: Do you believe other employee have leaked company confidential or proprietary information outside of company?  indicate significantly significant differences between countries on left chart or between small and large companies within countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 9. Small Business IT Departments: Data Stealing Malware • The most prevalent form of IT protection from data stealing malware is installing security software, followed by restricting Internet access and issuing security policies. • Japanese small company end users are more likely to indicate their IT department can do a better job protecting them from Data Stealing malware than those in the U.K. • Overall more than one third of the small company employees indicated their IT department can do a better job educating them about Data Stealing Malware. In the U.K. and Japan, this percentage rises to almost 40%. Country US UK Germany Japan Total Sample size, n= 101 141 148 58 448 What does your IT dept do to ensure protection? Install security software 47% 62% 61% 59% 58% Restrict Internet access 29% 36% 29% 34% 32% Issue security policies/Internet usage guidelines 30% 32% 34% 28% 32% Provide troubleshooting help 26% 28% 37% 14% 29% Offer education and guidance 28% 26% 15% 17% 21% IT Department can do a better job protecting 21% 14% 21% 38% 21% me IT Department can do a better job educating me 30% 39% 34% 41% 35% Q: What does your IT department do to ensure that you are protected from the threats or dangers of each? Data Stealing Malware Q: For which of the following threats do you believe your IT department can do a better job of protecting you/educating you?  indicate statistically significant differences between countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.
  • 10. Small Business IT Departments: Data Stealing Malware • The most prevalent form of IT protection from data stealing malware is installing security software, followed by restricting Internet access and issuing security policies. • Japanese small company end users are more likely to indicate their IT department can do a better job protecting them from Data Stealing malware than those in the U.K. • Overall more than one third of the small company employees indicated their IT department can do a better job educating them about Data Stealing Malware. In the U.K. and Japan, this percentage rises to almost 40%. Country US UK Germany Japan Total Sample size, n= 101 141 148 58 448 What does your IT dept do to ensure protection? Install security software 47% 62% 61% 59% 58% Restrict Internet access 29% 36% 29% 34% 32% Issue security policies/Internet usage guidelines 30% 32% 34% 28% 32% Provide troubleshooting help 26% 28% 37% 14% 29% Offer education and guidance 28% 26% 15% 17% 21% IT Department can do a better job protecting 21% 14% 21% 38% 21% me IT Department can do a better job educating me 30% 39% 34% 41% 35% Q: What does your IT department do to ensure that you are protected from the threats or dangers of each? Data Stealing Malware Q: For which of the following threats do you believe your IT department can do a better job of protecting you/educating you?  indicate statistically significant differences between countries. (z-test/t-test at 95% confidence interval). Copyright 2009 Trend Micro Inc.