According to a survey conducted among IT security professionals worldwide, 64 percent claimed that it was very important when enabling remote work to protect users against various forms of cyber attacks, while 20 percent saw this as being of critical importance. This need became even more prevalent following the coronavirus pandemic and ensuing lockdowns in 2020.
When enabling remote work, how important do you think it is to protect your users against phishing and cyber attacks?
Basic Account
Get to know the platform
You only have access to basic statistics.
This statistic is not included in your account.
Starter Account
The ideal entry-level account for individual users
- Instant access to 1m statistics
- Download in XLS, PDF & PNG format
- Detailed references
$199 USD / Month *
Professional Account
Full access
Business Solutions including all features.
* Prices do not include sales tax.
Other statistics that may interest you Business cyber security in the United Kingdom (UK)
Overview
5
- Premium Statistic Cybersecurity market revenues worldwide 2020-2030
- Premium Statistic Share of IT spend on cyber security in the U.S and Europe 2020-2022, by country
- Premium Statistic Estimated revenue of the cyber security sector in the UK 2017-2022
- Premium Statistic Estimated gross value added (GVA) of the cyber security sector in the UK 2017-2022
- Premium Statistic Value and number of public contracts awarded to cyber companies in the UK 2018-2022
Segment: Cyber security professionals
4
- Premium Statistic Number of cybersecurity professionals worldwide 2023, by country
- Premium Statistic Employment in the cyber security sector in the UK in 2022
- Premium Statistic United Kingdom: Cyber job postings by region 2022
- Basic Statistic Role held responsible for successful cyber attacks in the UK 2021
Companies
4
- Premium Statistic Number of cyber security firms in the UK, by company size 2022
- Premium Statistic Share of registered cyber security firms in the UK in 2022, by type of service
- Premium Statistic Volume of investment in cyber security by businesses United Kingdom 2022, by size
- Premium Statistic Money lost by companies in the UK due to cyber breaches 2022
Consumption
7
- Basic Statistic United Kingdom: Leading cyber security products and services for businesses 2021
- Basic Statistic United Kingdom: Main types of provision by cyber security firms 2021
- Premium Statistic Most common features of cybersecurity policies of businesses in the UK 2023
- Premium Statistic Share of implemented cyber security rules or controls by businesses in the UK 2023
- Premium Statistic Share of cyber security risk identification methods in businesses in the UK 2023
- Premium Statistic Cyber security policy relaxation in businesses due to telework in the UK 2021
- Premium Statistic Barriers impacting the activity of cyber security companies in the UK 2022
Breaches and incidents
6
- Premium Statistic UK frequency of data breaches experienced by businesses 2023
- Premium Statistic Impact of data breaches in UK firms 2023
- Premium Statistic Most common actions following a cybersecurity breach in the UK 2023
- Premium Statistic Recovery time taken from most disruptive cyber security breach by UK businesses 2023
- Premium Statistic Average cost of the most disruptive cyber security attack for UK businesses 2023
- Premium Statistic Average cost of cyber incidents in the UK 2021, by industry
Further related statistics
19
- Percentage of healthcare cyber attacks identified by security teams 2017-2018
- Main actions taken by firms after cyberattacks in Italy 2018
- Time needed to restore ICT systems after cyberattacks in Italy 2018
- Solutions envisioned to ensure their cyber-security of companies
- Distribution of recipients of company reports about cyberattacks in Italy 2018
- Main reasons for not reporting cyberattacks in Italy 2018
- Impact of cyber security incidents in Singapore 2016
- Number of cyberattacks in Vietnam 2021, by type
- UK companies: main drivers for information security expenditure 2015
- Effect of security threat on IT spending strategy in organizations worldwide 2019
- UK companies: share of information used to evaluate security threats 2014-2015
- healthcare cyber attacks outside of security teams detected 2018
- UK businesses: usage of cyber security governance and risk management 2015, by type
- Global IT vulnerability management market 2010-2018
- Energy consumption of Crédit Agricole S.A. Group worldwide 2016-2019, by scope
- Lotte Chemical's operating profit 2022, by business segment
- Percentage change in visitors to leading art museums worldwide 2020-2023
- Global uses of the earth's surface 2019
- Arvato Group's annual revenue 2005-2023
Further Content: You might find this interesting as well
Statistics
- Percentage of healthcare cyber attacks identified by security teams 2017-2018
- Main actions taken by firms after cyberattacks in Italy 2018
- Time needed to restore ICT systems after cyberattacks in Italy 2018
- Solutions envisioned to ensure their cyber-security of companies
- Distribution of recipients of company reports about cyberattacks in Italy 2018
- Main reasons for not reporting cyberattacks in Italy 2018
- Impact of cyber security incidents in Singapore 2016
- Number of cyberattacks in Vietnam 2021, by type
- UK companies: main drivers for information security expenditure 2015
- Effect of security threat on IT spending strategy in organizations worldwide 2019
- UK companies: share of information used to evaluate security threats 2014-2015
- healthcare cyber attacks outside of security teams detected 2018
- UK businesses: usage of cyber security governance and risk management 2015, by type
- Global IT vulnerability management market 2010-2018
- Energy consumption of Crédit Agricole S.A. Group worldwide 2016-2019, by scope
- Lotte Chemical's operating profit 2022, by business segment
- Percentage change in visitors to leading art museums worldwide 2020-2023
- Global uses of the earth's surface 2019
- Arvato Group's annual revenue 2005-2023
Check Point Software Technologies. (July 8, 2021). When enabling remote work, how important do you think it is to protect your users against phishing and cyber attacks? [Graph]. In Statista. Retrieved April 25, 2024, from https://www.statista.com/statistics/1258263/remote-work-protection-against-cyber-attacks/
Check Point Software Technologies. "When enabling remote work, how important do you think it is to protect your users against phishing and cyber attacks? ." Chart. July 8, 2021. Statista. Accessed April 25, 2024. https://www.statista.com/statistics/1258263/remote-work-protection-against-cyber-attacks/
Check Point Software Technologies. (2021). When enabling remote work, how important do you think it is to protect your users against phishing and cyber attacks? . Statista. Statista Inc.. Accessed: April 25, 2024. https://www.statista.com/statistics/1258263/remote-work-protection-against-cyber-attacks/
Check Point Software Technologies. "When Enabling Remote Work, How Important Do You Think It Is to Protect Your Users against Phishing and Cyber Attacks? ." Statista, Statista Inc., 8 Jul 2021, https://www.statista.com/statistics/1258263/remote-work-protection-against-cyber-attacks/
Check Point Software Technologies, When enabling remote work, how important do you think it is to protect your users against phishing and cyber attacks? Statista, https://www.statista.com/statistics/1258263/remote-work-protection-against-cyber-attacks/ (last visited April 25, 2024)
When enabling remote work, how important do you think it is to protect your users against phishing and cyber attacks? [Graph], Check Point Software Technologies, July 8, 2021. [Online]. Available: https://www.statista.com/statistics/1258263/remote-work-protection-against-cyber-attacks/